A Simulation of the Fundamental Attributes of Autonomous Computing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 283

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 1, January 2014 | Popularity: 6.5 / 10


     

A Simulation of the Fundamental Attributes of Autonomous Computing

Sugandh Shah, Hatib Zeeshan


Abstract: Autonomous systems are able to adapt to changing environments (such as changes in the resource availability or component failures) in a way that preserves high level operational goals, such as service level objectives. This paper basically focuses on the fundamental attributes of Autonomous computing that are self-healing, self-configuring, self-optimizing and self-protecting. More specifically, the paper presents the detailed design of an Autonomic Download Manager (ADM) which simulates all the fundamental attributes of Autonomous Computing.


Keywords: Autonomous Computing AC, AC systems, self-healing, self-configuring, self-optimization, self-protection


Edition: Volume 3 Issue 1, January 2014


Pages: 257 - 259



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Sugandh Shah, Hatib Zeeshan, "A Simulation of the Fundamental Attributes of Autonomous Computing", International Journal of Science and Research (IJSR), Volume 3 Issue 1, January 2014, pp. 257-259, https://www.ijsr.net/getabstract.php?paperid=02013775, DOI: https://www.doi.org/10.21275/02013775

Similar Articles

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 108

Informative Article, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 74 - 79

Mobile Ad hoc Network

R. Marutha Veni, R. Latha

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

Downloads: 111

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2598 - 2605

Implementation of EAACK Secure Trespass on Detection System for MANETs

S. Krishna Priya, K. V. Srinivasa Rao

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1215 - 1218

Performance Analysis and Comparison of Ad Hoc Routing Protocols by the Impact of Node Density

Neha Gandotra, Dr. Rajesh Singh

Share this Article
Top