Sadržaj:
  • Machine generated contents note: 1. Introduction 1
  • 11DistributedAdaptation. 2
  • 12 Assumptions 8
  • 13 Terminology 11
  • 14 Key Contributions of this Research 12
  • 15 Road map13
  • 2. Conductor: A New Approach 15
  • 21 The Conductor Approach. 15
  • 22 The Conductor Architecture. 19
  • 23 Key Challenges 21
  • 24 Potential Pitfalls of Distributed Adaptation 23
  • 25 Conclusions 23
  • 3. Stream Interceptionand Identification. 25
  • 31 Interception in Conductor 26
  • 32 Type Identification. 32
  • 33 An Example of Interception and Identification 35
  • 34 Conclusions 35
  • 4. Selecting and Deploying Distributed Adaptations 37
  • 41 Properties of a Good Solution. 38
  • 42 Criteria for Adaptor Selection. 39
  • 43 Approaches to Distributed Adaptor Selection. 40
  • 44 Conductor's Planning Architecture. 43
  • 45 Plan Formulation. 52
  • 46 The Cost of Automatic Planning. 58
  • 47 Conclusions 59
  • 5. Securing Distributed Adaptation 61
  • 51 Design of Conductor Security 63
  • 52 Authentication Schemes 70
  • 53 Attacks and Counter measures 77
  • 54 Multiple Security Schemes. 80
  • 55 Non-Enabled Client and Server. 87
  • 56 Applicability to Other Open Architectures. 88
  • 57 Implementation 89
  • 58 Conclusions 90
  • 6. Reliability for Distributed Adaptation 93
  • 61 A New Model of Reliability. 97
  • 62 Semantic Segmentation98
  • 63 Preventing Data Loss Despite Adaptation 100
  • 64 Protecting Adaptation from Failures. 104
  • 65 Handling Multiple Failures. 113
  • 66 Semantic Segmentation for Other Transport Protocols 116
  • 67 Round-Trip Reliability. 119
  • 68 Conclusions 121
  • 7. A daptor Construction 123
  • 71 Writing Conductor Adaptors. 123
  • 72 Sample Adaptations. 133
  • 73 Challenges in Adaptor Construction. 141
  • 74 Conclusions. 144
  • 8. External Interfaces 145
  • 81 Control of Application-Transparent Adaptation 145
  • 82 An API for Adaptation-Aware Applications. 147
  • 83 External Control of Adaptation-Aware Applications 157
  • 84 Conclusions 158
  • 9. Experiences with Conductor 159
  • 91 Experim ental Setup. 159
  • 92 Effectiveness of Conductor. 160
  • 93 Data Handling Overheads. 169
  • 94 The Cost of AutomaticPlanning. 172
  • 95 The Cost of Semantic Segmentation. 174
  • 96 The Cost of Failures 176
  • 97 The Cost of Security. 178
  • 98 Initial Deployment. 184
  • 99 Conclusions 189
  • 10. Related Work 191
  • 101 Adaptation 191
  • 102 Reliability 199
  • 103 Security 202
  • 104 Conclusions 204
  • 11. Future Work 205
  • 12. Conclusions. 211
  • 121 Summary of the Problem 211
  • 122 The Conductor Solution212
  • 123 Research Contributions 212
  • 124 Broad Lessons 214
  • 125 Final Comments215.