Proceedings of the 3rd Workshop on Adaptive and Reflective Middleware - 2004
DOI: 10.1145/1028613.1028629
|View full text |Cite
|
Sign up to set email alerts
|

Enabling collaborative adaptation across legacy components

Abstract: Software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adaptation. Composing a single adaptive system from existing adaptive components requires an "adaptation infrastructure" to integrate and arbitrate adaptive behaviors. This paper proposes a model for such an infrastructure and describes the design and operation of M 2 , a prototype implementation. M 2 uses a technique called transparent sh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…This poses problems towards applying them to legacy procedural systems. There have also been attempts at decoupling legacy procedural codes at runtime by wrapping [16] and reference indirection (often through message passing schemes) [40]. These schemes, however, increase overheads while LLL maintains both the simplicity and efficiency of direct reference-definition bindings.…”
Section: Related Workmentioning
confidence: 99%
“…This poses problems towards applying them to legacy procedural systems. There have also been attempts at decoupling legacy procedural codes at runtime by wrapping [16] and reference indirection (often through message passing schemes) [40]. These schemes, however, increase overheads while LLL maintains both the simplicity and efficiency of direct reference-definition bindings.…”
Section: Related Workmentioning
confidence: 99%
“…In taking initial steps in answering these questions, we build upon adaptive security [20] and collaborative adaptation [23]. The former focuses on identifying the security controls necessary to keep security requirements satisfied despite changes in the environment.…”
Section: Introductionmentioning
confidence: 99%