Abstract
Autonomic communications seek to improve the ability of network and services to cope with unpredicted change, including changes in topology, load, task, the physical and logical characteristics of the networks that can be accessed, and so forth. Broad-ranging autonomic solutions require designers to account for a range of end-to-end issues affecting programming models, network and contextual modeling and reasoning, decentralised algorithms, trust acquisition and maintenance---issues whose solutions may draw on approaches and results from a surprisingly broad range of disciplines. We survey the current state of autonomic communications research and identify significant emerging trends and techniques.
- Abdul-Rahman, A. 1996. The PGP trust model. http://www.cs.ucl.ac.uk/staff/F.AbdulRahman/docs/pgptrust.html.]]Google Scholar
- Abelson, H., Allen, D., Coore, D., Hanson, C., Homsy, G., Knight, T., Nagpal, R., Rauch, E., Sussman, G., and Weiss, R. 2000. Amorphous computing. Comm. ACM 43, 5 (May), 74--82.]] Google Scholar
- Ahlswede, R., Cai, N., Li, S.-Y. R., and Yeung, R. W. 2000. Network information flow. IEEE Trans. Inform. Theory 46, 4, 1204--1216.]]Google Scholar
- Almeida, P. S., Baquero, C., and Fonte, V. 2002. Version stamps---decentralized version vectors. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02). IEEE Computer Society, 544.]] Google Scholar
- Àlvarez, C., Díaz, J., Petit, J., Rolim, J., and Serna, M. 2004. Efficient and reliable high level communicatioon in deployed sensor networks. In ACM International Workshop on Mobility Management and Wireless Systems (Mobiwac'04). ACM Press, 106--110.]] Google Scholar
- Andersen, D. G., Balakrishnan, H., Kaashoek, M. F., and Morris, R. 2002. Resilient overlay networks. Comput. Comm. Rev. 32, 1, 66.]] Google Scholar
- Babaoglu, Ö., Jelasity, M., and Montresor, A. 2005a. Grassroots approach to self-management in large-scale distributed systems. In Unconventional Programming Paradigms. Lecture Notes in Computer Science, vol. 3566. Springer-Verlag, 286--296.]] Google Scholar
- Babaoglu, Ö., Jelasity, M., Montresor, A., Fetzer, C., Leonardi, S., van Moorsel, A. P. A., and van Steen, M., Eds. 2005b. Self-star properties in complex information systems, conceptual and practical foundations. Lecture Notes in Computer Science, vol. 3460. Springer.]] Google Scholar
- Babaoglu, Ö., Meling, H., and Montresor, A. 2002. A framework for the development of agent-based peer-to-peer systems. In 22nd International Conference on Distributed Computing Systems. Vienna, Austria. IEEE Computer Socity Press, 15--22.]] Google Scholar
- Baker, S. and Dobson, S. 2005. Comparing service-oriented and distributed object architectures. In Proceedings of the International Symposium on Distributed Objects and Applications, R. Meersman and Z. T. et al, Eds. Lecture Notes in Computer Science, vol. 3760. Springer Verlag, 631--645.]] Google Scholar
- Balakrishnan, H., Kaashoek, M. F., Karger, D. R., Morris, R., and Stoica, I. 2003. Looking up data in P2P systems. Comm. ACM 46, 2, 43--48.]] Google Scholar
- Baldoni, R., Querzoni, L., Patiño-Mart‘nez, M., and Jímenez-Peris, R. 2004. Low-load dynamic hierarchical quorums for P2P networks. Tech. rep. (Dec).]]Google Scholar
- Bandini, S., Manzoni, S., and Simone, C. 2002. Heterogeneous agents situated in heterogeneous spaces. Appl. Artificial Intellig. 16, 9--10 (Oct.--Dec.), 831--852.]]Google Scholar
- Becker, M. Y. and Sewell, P. 2004. Cassandra: Flexible trust management, applied to electronic health records. In Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW). 139--154.]] Google Scholar
- Birman, K. 2005. Reliable Distributed Systems Technologies, Web Services, and Applications. Springer.]] Google Scholar
- Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A. D. 1999. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Springer-Verlag, 185--210.]] Google Scholar
- BOINC Project. 2006. Berkeley open infrastructure for network computing. http://boinc.berkeley.edu/.]]Google Scholar
- Bonabeau, E., Dorigo, M., and Theraulaz, G. 1999. Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press.]] Google Scholar
- Bonatti, P. and Samarati, P. 2002. A unified framework for regulating access and information release on the web. J. Comput. Security 10, 3, 241--272.]] Google Scholar
- Bullock, S. and Cliff, D. 2004. Complexity and emergent behaviour in ICT systems. Tech. rep. HPL-2004-187.]]Google Scholar
- Byers, J., Horn, G., Luby, M., Mitzenmacher, M., and Shaver, W. 2002. FLID/DL: Congestion control for layered multicast. IEEE J. Select. Areas Comm. 20, 8 (Oct.), 1558--1570.]]Google Scholar
- Byers, J. W., Considine, J., Mitzenmacher, M., and Rost, S. 2004. Informed content delivery across adaptive overlay networks. IEEE/ACM Trans. Netw. 12, 5, 767--780.]] Google Scholar
- Cabri, G., Leonardi, L., and Zambonelli, F. 2000. Mobile-agent coordination models for internet applications. IEEE Comput. 33, 2.]] Google Scholar
- Cahill, V., Shand, B., Gray, E., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Bryce, C., di Marzo Serugendo, G., Seigneur, J.-M., Carbone, M., Krukow, K., Jensen, C., Chen, Y., and Nielsen, M. 2003. Using trust for secure collaboration in uncertain environments. IEEE Pervasive Comput. 2, 3 (July), 52--61.]]Google Scholar
- Carreras, I., Grasso, R., and Szabo, C. A. 2005. Design considerations on the CREATE-NET testbed. In Proceedings of TRIDENTCOM 2005. 44--53.]] Google Scholar
- Carzaniga, A., Rosenblum, D., and Wolf, A. 2001. Design and evaluation of a wide-area event notification service. ACM Trans. Comput. Syst. 19, 3 (Aug.), 332--383.]] Google Scholar
- Castro, M., Jones, M., Kermarrec, A., Rowstron, A., Theimer, M., Wang, H., and Wolman, A. 2003. An evaluation of scalable application-level multicast built using peer-to-peer overlays. In IEEE Infocom. San Francisco, CA. IEEE Computer Society Press.]]Google Scholar
- Chadwick, D., Otenko, A., and Ball, E. 2003. Role-based access control with X.509 attribute certificates. IEEE Internet Comput. 7, 2 (March/April), 62--69.]] Google Scholar
- Chelius, G., Jelger, C., Fleury, E., and Noel, T. 2005. IPv6 addressing scheme and self-configuration for multi-hops wireless ad hoc network. In Proceedings of the International Conference on Information Networking (ICOIN'05). Jeju, Korea.]] Google Scholar
- Chess, D. M., Palmer, C. C., and White, S. R. 2003. Security in an autonomic computing environment. IBM Syst. J. 42, 1, 107--118.]] Google Scholar
- Chlebus, B. S., Gasieniec, L., Kowalski, D. R., and Radzik, T. 2005. On the wake-up problem in radio networks. In ICALP, L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, Eds. Lecture Notes in Computer Science, vol. 3580. Springer, 347--359.]] Google Scholar
- Chockler, G., Keidar, I., and Vitenberg, R. 2001. Group communication specifications: A comprehensive study. ACM Comput. Surv. 33, 4, 427--469.]] Google Scholar
- Cholvi, V., Laderas, V., López, L., and Fernández, A. 2005. Self-adapting network topologies in congested scenarios. Physical Rev. 71, 3.]]Google Scholar
- Chrobak, M., Gasieniec, L., and Rytter, W. 2004. A randomized algorithm for gossiping in radio networks. Networks 43, 2, 119--124.]] Google Scholar
- Clark, D., Partridge, C., Ramming, J., and Wroclawski, J. 2003. A knowledge plane for the internet. In Proceedings of ACM SIGCOMM.]] Google Scholar
- Cohen, B. 2003. Incentives build robustness in bittorrent. http://www.bittorrent.com/bittorrentecon.pdf.]]Google Scholar
- Costa, D. and Hertz, A. 1997. Ants can colour graphs. J. Operation. Resear. Soc. 48, 295--305.]]Google Scholar
- Costa, P. and Picco, G. 2005 (to appear). Semi-probabilistic content-based publish-subscribe. In IEEE International Conference on Distributed Computing Systems (ICDCS), Columbus, OH. IEEE Computer Society Press.]] Google Scholar
- Coutaz, J., Crowley, J., Dobson, S., and Garlan, D. 2005. Context is key. Comm. ACM 48, 3 (March), 49--53.]] Google Scholar
- Curino, C., Giani, M., Giorgetta, M., Giusti, A., Murphy, A., and Picco, G. 2005. Tinylime: Bridging mobile and sensor networks through middleware. In IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai Island, Hawaii. IEEE Computer Society Press.]] Google Scholar
- de Bruijn, J., Lausen, H., Polleres, A., and Fensel, D. 2005. The WSML rule languages for the semantic web. In Proceedings of the W3C Workshop on Rule Languages for Interoperability. Washington, DC.]]Google Scholar
- de Castro, M. F., Merghem, L., Gaïti, D., and Mhamed, A. 2004. The basis for an adaptive IP QoS management. IEICE Trans. Comm. E87-B, 3 (March), 564--572.]]Google Scholar
- de Vergara, J., Villagré, V., and Berrocal, J. 2004. Applying the Web Ontology Language to management information definitions. IEEE Comm. Mag. 42, 7 (July), 68--74.]]Google Scholar
- Défago, X., Schiper, A., and Urbán, P. 2004. Total order broadcast and multicast algorithms: Taxonomy and survey. ACM Comput. Sur. 36, 4, 372--421.]] Google Scholar
- Dobson, S. 2005. Putting meaning into the network: Some semantic issues for the design of autonomic communications systems. In Proceedings of the 1st IFIP Workshop on Autonomic Communications (Berlin, Germany), M. Smirnov, Ed. Lecture Notes in Computer Science, vol. 3457. Springer Verlag.]] Google Scholar
- Dobson, S. and Nixon, P. 2004. More principled design of pervasive computing systems. In Human Computer Interaction and Interactive Systems, R. Bastide and J. Roth, Eds. Lecture Notes in Computer Science, vol. 3425. Springer Verlag.]]Google Scholar
- Dorigo, M. and Gambardella, L. M. 1997. Ant colonies for the travelling salesman problem. Biosystems 43, 73--81.]]Google Scholar
- Driver, C. and Clarke, S. 2004. Context-aware trails. IEEE Comput. 37, 8 (Aug.), 97--99.]] Google Scholar
- Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. 1999. SPKI certificate theory. IETF RFC 2693.]] Google Scholar
- English, C., Terzis, S., Wagealla, W., Lowe, H., Nixon, P., and McGettrick, A. 2003a. Trust dynamics for collaborative global computing. In Proceedings of 12th IEEE International Workshop on Enabling Technologies (WETICE'03), Linz, Austria. IEEE Computer Society. 283--288.]] Google Scholar
- English, C., Wagealla, W., Nixon, P., Terzis, S., Lowe, H., and McGettrick, A. 2003b. Trusting collaboration in global computing systems. In Proceedings of 1st International Conference on Trust Management (iTrust'03), Heraklion, Crete, Greece. Lecture Notes in Computer Science, vol. 2692. Springer, 136--149.]]Google Scholar
- Esponda, F., Forrest, S., and Helman, P. 2004. A formal framework for positive and negative detection. IEEE Trans. Syst., Man, Cybernet. 34, 1 (Feb.).]]Google Scholar
- Eugster, P., Guerraoui, R., Kermarrec, A., and Massoulie, L. 2004. Epidemic information dissemination in distributed systems. IEEE Comput. 37, 5, 60--67.]]Google Scholar
- Eugster, P., Guerraoui, R., and Kouznetsov, P. 2004. D-reliable broadcast: A probabilistic measure of broadcast reliability. In IEEE International Conference on Distributed Computing Systems (ICDCS). Tokio, Japan.]] Google Scholar
- Eugster, P. T., Felber, P., Guerraoui, R., and Kermarrec, A.-M. 2003. The many faces of publish/subscribe. ACM Comput. Surv. 35, 2 (June), 114--131.]] Google Scholar
- Eugster, P. T., Guerraoui, R., Handurukande, S. B., Kouznetsov, P., and Kermarrec, A.-M. 2003. Lightweight probabilistic broadcast. ACM Trans. Comput. Syst. 21, 4, 341--374.]] Google Scholar
- Fernández, A., Georgiou, C., López, L., and Santos, A. 2005. Reliably executing tasks in the presence of malicious processors. In DISC, P. Fraigniaud, Ed. Lecture Notes in Computer Science, vol. 3724. Springer, 490--492.]] Google Scholar
- Fernández, A., Georgiou, C., López, L., and Santos, A. 2006. Reliably executing tasks in the presence of untrusted entities. In Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06). Leeds, UK.]] Google Scholar
- G. Picco, G. Cugola, A. M. 2003. Efficient content-based event dispatching in presence of topological reconfigurations. In Proceedings of the IEEE International Conference on Distributed Computing Systems, Providence, RI. IEEE Computer Society Press.]] Google Scholar
- Garg, A., Battiti, R., and Costanzi, G. 2004. Dynamic self-management of autonomic systems: The reputation, quality and credibility (RQC) scheme. In Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication (WAC). Springer-Verlag, Berlin, Germany.]]Google Scholar
- Gelenbe, E. 2004a. Cognitive packet network, U.S. Patent 6,804,201.]]Google Scholar
- Gelenbe, E. 2004b. Cognitive routing in packet networks. In ICONIP, N. R. Pal, N. Kasabov, R. K. Mudi, S. Pal, and S. K. Parui, Eds. Lecture Notes in Computer Science, vol. 3316. Springer, 625--632.]]Google Scholar
- Gelenbe, E. 2004c. Sensible decisions based on QoS. Comput. Manage. Science 1, 1, 1--14.]]Google Scholar
- Gelenbe, E., Gellman, M., Lent, R., Liu, P., and Su, P. 2004. Autonomous smart routing for network QoS. In Proceedings of the First International Conference on Autonomic Computing. IEEE Computer Society, 232--239.]] Google Scholar
- Gelenbe, E. and Lent, R. 2004. Power aware ad hoc cognitive packet networks. Ad Hoc Netw. J. 2, 3, 205--216.]]Google Scholar
- Gelenbe, E., Lent, R., and Nunez, A. 2004. Self-aware networks and quality of service. Proceedings of the IEEE 92, 9, 1479--1490.]]Google Scholar
- Gelenbe, E., Lent, R., and Xu, Z. 2001. Design and performance of cognitive packet networks. Perform. Evaluat. 46, 155--176.]] Google Scholar
- Gelenbe, E. and Nunez, A. 2003. Adaptive web service for QoS improvement. In Proceedings of IADIS International WWW/Internet Conference. Algarve, Portugal.]]Google Scholar
- Gkantsidis, C. and Rodriguez, P. 2005. Network coding for large scale content distribution. In IEEE/INFOCOM 2005. Miami, FL.]]Google Scholar
- Gonzalez, A. and Ahlers, R. 1999. Context-based representation of intelligent behaviour in training simulations. Trans. Society Comput. Simulat. Int. 15, 4 (March).]] Google Scholar
- Henrickcon, K., Indulska, J., and Rakotonirainy, A. 2002. Modeling context information in pervasive computing systems. In Proceedings of the 1st International Conference on Pervasive Computing Systems, F. Mattern and M. Naghshineh, Eds. Lecture Notes in Computer Science, vol. 2414. Springer Verlag.]] Google Scholar
- Hofmeyr, S. A. and Forrest, S. 2000. Architecture for an artificial immune system. Evolution. Computat. 8, 4, 443--473.]] Google Scholar
- IBM, Microsoft, BEA, RSA Security and VeriSign. 2003. Web Services Federation Language (WS-Federation). IBM, Microsoft, BEA, RSA Security and VeriSign. http://www-106.ibm.com/developerworks/webservices/library/ws-fed.]]Google Scholar
- Ionescu, B., Ionescu, M., Veres, S., Ionescu, D., Cuervo, F., and Luiken-Miller, M. 2005. A testbed and research network for next generation services over next generation networks. In Proceedings of TRIDENTCOM 2005. 21--31.]] Google Scholar
- ITU-T. 2001. The directory: Public-key and attribute certificate frameworks. ITU-T Recommendation X.509:2000(E) | ISO/IEC 9594-8:2001(E).]]Google Scholar
- Jelasity, M., Kowalczyk, W., and van Steen, M. November 2003. Newscast computing. Tech. rep., Vrije Universiteit IR-CS-006.]]Google Scholar
- Jensen, O. H. and Milner, R. 2003. Bigraphs and mobile processes. Tech. rep. UCAM-CL-TR-570, University of Cambridge Computer Laboratory.]]Google Scholar
- Jiménez-Peris, R., Patiño-Martínez, M., and Alonso, G. 2002. An algorithm for non-intrusive, parallel recovery of replicated data and its correctness. In Proceedings of 21st IEEE Int. Conference on Reliable Distributed Systems (SRDS'02). Osaka, Japan, 150--159.]] Google Scholar
- Karabulut, Y. 2003. Implementation of an agent-oriented trust management infrastructure based on a hybrid PKI model. In iTrust, P. Nixon and S. Terzis, eds. Lecture Notes in Computer Science, vol. 2692. Springer, 318--331.]]Google Scholar
- Kennedy, M. P., Rovatti, R., and Setti, G. 2000. Chaotic Electronics in Telecommunications. CRC Press.]] Google Scholar
- Kephart, J. and Chess, D. 2003. The vision of autonomic computing. IEEE Comput. 36, 1, 41--50.]] Google Scholar
- Koshutanski, H. and Massacci, F. 2004a. E pluribus unum: Deduction, abduction and induction, the reasoning services for access control in autonomic communication. In Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication (WAC). Springer-Verlag, Berlin, Germany.]]Google Scholar
- Koshutanski, H. and Massacci, F. 2004b. Interactive access control for Web Services. In Proceedings of the 19th IFIP Information Security Conference (SEC'04), Toulouse, France. Kluwer Press, 151--166.]]Google Scholar
- Koshutanski, H. and Massacci, F. 2004c. An interactive trust management and negotiation scheme. In Proceedings of the 2nd International Workshop on Formal Aspects in Security and Trust (FAST), Toulouse, France. Kluwer Press, 139--152.]]Google Scholar
- Laoutaris, N., Panagakis, A., and Stavrakakis, I. 2004a. Content distribution through autonomic content and storage management. In WAC 2004, M. Smirnov, Ed. Lecture Notes in Computer Science, vol. 3457. Springer, Berlin, Germany, 69--78.]]Google Scholar
- Laoutaris, N., Panagakis, A., and Stavrakakis, I. 2004b. Content distribution through autonomic content and storage management. In WAC 2004.]]Google Scholar
- Laoutaris, N., Telelis, O., Zissimopoulos, V., and Stavrakakis, I. 2004. Local utility aware content replication. In IFIP Networking 2005.]] Google Scholar
- Laoutaris, N., Telelis, O., Zissimopoulos, V., and Stavrakakis, I. 2005. Distributed selfish replication. IEEE Trans. Paral. Distrib. Syst. {under submission}.]] Google Scholar
- Lassila, O. and Swick, R. 1999. Resource Description Framework model and syntax specification. Tech. rep., World Wide Web Consortium.]]Google Scholar
- Leff, A., Wolf, J., and Yu, P. 1993. Replication algorithms in a remote caching architecture. IEEE Trans. Paral. Distrib. Syst. 4, 11 (Nov.), 1185--1204.]] Google Scholar
- Lewis, D., Feeney, K., Carey, K., Tiropanis, T., and Courtenage, S. 2005. Semantic-based policy engineering for autonomic systems. In Proceedings of 1st IFIP WG6.6 International Workshop on Autonomic Communication, M. Smirnow, Ed. Springer Verlag.]] Google Scholar
- Li, N., Mitchell, J. C., and Winsborough, W. H. 2002. Design of a role-based trust-management framework. In Proceedings of IEEE Symposium on Security and Privacy, 2002. S&P. IEEE Press.]] Google Scholar
- López, L., Fernández, A., and Cholvi, V. 2005. A game theoretic analysis of protocols based on fountain codes. In The 10th IEEE Symposium on Computers and Communications (ISCC'05). La Manga del Mar Menor, Spain.]] Google Scholar
- Luby, M. 2002. LT codes. In FOCS. IEEE Computer Society, 271.]] Google Scholar
- Luby, M. 2003. Fast, reliable data transport. In USENIX Symposium on Internet Technologies and Systems.]]Google Scholar
- Lücking, T., Mavronicolas, M., Monien, B., and Rode, M. 2004. A new model for selfish routing. In Proceedings of STACS 2004. 547--558.]]Google Scholar
- Madueño, M. and Vidal, J. 2005. Joint physical-MAC layer design of the broadcast channel protocol in adhoc networks. IEEE J. Select. Areas in Comm. (Special Issue on Ad-Hoc Networking).]]Google Scholar
- Magedanz, T., Witaszek, D., and Knuettel, K. 2005. The IMS playground at FOKUS---an open test-bed for next generation network multimedia services. In Proceedings of TRIDENTCOM 2005.]] Google Scholar
- Mamei, M. and Zambonelli, F. 2004. Programming pervasive and mobile computing applications with the TOTA middleware. In IEEE International Conference On Pervasive Computing (Percom) Orlando, FL. IEEE Computer Socity Press.]] Google Scholar
- Mamei, M., Zambonelli, F., and Leonardi, L. 2004. Co-fields: A physically inspired approach to distributed motion coordination. IEEE Pervasive Comput. 3, 2, 52--61.]] Google Scholar
- Mazzini, G., Rovatti, R., and Setti, G. 2000. A tensor approach to higher order expectations of chaotic trajectories---part II: Application to chaos-based DS-CDMA in multipath environements. IEEE Trans. Circuits and Syst.---Part I 47, 1584--1596.]]Google Scholar
- Mazzini, G., Rovatti, R., and Setti, G. 2001. Chaos-based asynchronous DS-CDMA systems and enhanced rake receivers: Measuring the improvements. IEEE Trans. Circuits Syst.---Part I 48, 12, 1445--1453.]]Google Scholar
- Mazzini, G., Rovatti, R., and Setti, G. 1999. Interference minimization by auto-correlation shaping in asynchronous DS-CDMA systems: Chaos-based spreading is nearly optimal. IEEE Electronics Lett. 35, 13 (June), 1054--1055.]]Google Scholar
- Mazzini, G., Setti, G., and Rovatti, R. 1997. Chaotic complex spreading sequences for asynchronous DS-CDMA---Part I: System modeling and results. IEEE Trans. Circuits Syst.---Part I 44, 10, 937--947.]]Google Scholar
- McGibney, J., Schmidt, N., and Patel, A. 2005. A service-centric model for intrusion detection in next-generation networks. Comput. Stand. Interf. 27, 5 (June), 513--520.]] Google Scholar
- Menezes, R. and Tolksdorf, R. 2003. A new approach to scalable linda-systems based on swarms. ACM Symposium on Applied Computer, Orlando, FL. ACM Press, 375--379.]] Google Scholar
- Merghem, L., Gaïti, D., and Pujolle, G. 2003. On using multi-agent systems in end to end adaptive monitoring. In Proceedings of E2EMON (End to End MONitoring) Workshop, in Conjunction with MMNS2003 (Belfast, UK). Lecture Notes in Computer Science, vol. 2839. Springer Verlag, 422--435.]]Google Scholar
- Merloti, P. E. 2004. Optimization algorithms inspired by biological ants and swarm behavior.]]Google Scholar
- Mestre, X., Fonollosa, J. R., and Pagès, A. 2003. Capacity of MIMO channels: Asymptotic evaluation under correlated fading. IEEE J. Select. Areas Comm. (Special Issue on MIMO Systems and Applications) 21, 5 (June).]]Google Scholar
- Michiardi, P. and Molva, R. 2002. Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of Communication and Multimedia Security Conference.]] Google Scholar
- Milan-Franco, J. M., Jiménez-Peris, R., Patiño-Martínez, M., and Kemme, B. 2004. Adaptive distributed middleware for database replication. In Proceedings of 5th ACM/IFIP/USENIX Middleware Conference. Toronto, Canada, 175--194.]] Google Scholar
- Morató, D., Magana, E., Izal, M., Aracil, J., Naranjo, F. J., Astiz, P., Alonso, U., Csabai, I., Hága, P., Simon, G., Steger, J., and Vattay, G. 2005. The European traffic observatory measurement infrastructure (ETOMIC): A testbed for universal active and passive measurements. In Proceedings of TRIDENTCOM 2005.]] Google Scholar
- Nakrani, S. and Tovey, C. 2004. On honey bees and dynamic server allocation in internet hosting centers. Adaptive Behavior 12, 3--4, 223--240.]] Google Scholar
- OASIS Security Services TC. 2004. Security Assertion Markup Language (SAML). http://www.oasis-open.org/committees/security.]]Google Scholar
- Omicini, A., Ricci, A., Viroli, M., Castelfranchi, C., and Tummolini, L. 2004. Coordination artifacts: Environment-based coordination for intelligent agents. International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). New York (NY).]] Google Scholar
- O'Neill, E., Klepal, M., Lewis, D., O'Donnell, T., O'Sullivan, D., and Pesch, D. 2005. A testbed for evaluating human interaction with ubiquitous computing environments. In Proceedings of TRIDENTCOM 2005.]] Google Scholar
- O'Neill, E., Lewis, D., McGlinn, K., and Dobson, S. 2006. Rapid user-centred evaluation for context-aware systems. In Proceedings of the 13th International Workshop on Design, Specification and Verification of Interactive Systems (DSVIS'06), G. Doherty and A. Blandford, Eds. Lecture Notes in Computer Science, Springer Verlag.]] Google Scholar
- Oreizy, P., Gorlick, M., Taylor, R., Heimbigner, D., Johnson, G., Medvidovic, N., Quilliei, A., Rosenblum, D., and Wolf, A. 1999. An architecture-based approach to self-adaptive software. IEEE Intel. Syst. 14, 3 (May/June), 54--62.]] Google Scholar
- Park, J. S. and Sandhu, R. 1999. RBAC on the Web by smart certificates. In Proceedings of the 4th ACM Workshop on Role-Based Access Control. ACM Press, 1--9.]] Google Scholar
- Picco, G., Murphy, A., and Roman, G. 2001. Lime: A middleware for logical and physical mobility. In Proceedings of the IEEE International Conference on Distributed Computing Systems, Providence, RI. IEEE Computer Society Press, 524--536.]] Google Scholar
- Pujolle, G., Chaouchi, H., and Gaïti, D. 2004. Beyond TCP/IP: A context-aware architecture. In Proceedings of NetCon 2004, Palma de Mallorca. Kluwer Academic Publishers, 337--347.]]Google Scholar
- Qiu, D. and Srikant, R. 2004. Modeling and performance analysis of bittorrent-like peer-to-peer networks. In SIGCOMM, R. Yavatkar, E. W. Zegura, and J. Rexford, Eds. ACM, 367--378.]] Google Scholar
- Quitadamo, R. and Zambonelli, F. 2007. Autonomic communication services: a new challenge for software agents. J. Autonom. Agents Multiagent Syst.]] Google Scholar
- Rao, A., Papadimitriou, C., Ratnasamy, S., Shenker, S., and Stoica, I. 2003. Geographic routing without location information. In ACM Mobicom. San Diego, CA. ACM Press.]] Google Scholar
- Ratsanamy, S. and al. 2002. Ght: A geographic hash table for data-centric storage. In 1st ACM International Workshop on Wireless Sensor Networks and Applications. ACM Press, Atlanta, Georgia, USA.]] Google Scholar
- Ratsanamy, S., Francis, P., Handley, M., and Karp, R. 2001. A scalable content-addressable network. In ACM SIGCOMM Conference, San Diego, CA. ACM Press.]] Google Scholar
- Rodero, L., López, L., Fernández, A., and Cholvi, V. 2006. Dante: A self-adapting peer-to-peer system. In Proceedings of the 5th International Workshop on Agents and Peer-to-Peer Computing (AP2PC06), Hakodate, Japan. Lecture Notes in Computer Science. Springer.]]Google Scholar
- Roman, G., Julien, C., and Huang, Q. 2002. Network abstractions for context-aware mobile computing. 24th International Conference on Software Engineering, Orlando, FL. ACM Press.]] Google Scholar
- Rovatti, R., Mazzini, G., and Setti, G. 2000. A tensor approach to higher order expectations of chaotic trajectories---Part I: General theory and specialization to piecewise affine Markov systems. IEEE Trans. Circuits Syst.---Part I 47, 1571--1583.]]Google Scholar
- Rovatti, R., Mazzini, G., and Setti, G. 2001. Enhanced rake receivers for chaos-based DS-CDMA. IEEE Trans. Circuits Syst.---Part I 48, 818--829.]]Google Scholar
- Rovatti, R., Mazzini, G., and Setti, G. 2004a. On the ultimate limits of chaos-based asynchronous DS-CDMA---Part I: Basic definitions and results. IEEE Trans. Circuits Syst.---Part I 52, 7, 1336--1347.]]Google Scholar
- Rovatti, R., Mazzini, G., and Setti, G. 2004b. On the ultimate limits of chaos-based asynchronous DS-CDMA---Part II: Analytical results and asymptotics. IEEE Trans. Circuits Syst.---Part I 52, 7, 1348--1364.]]Google Scholar
- Rovatti, R., Setti, G., and Mazzini, G. 1998. Chaotic complex spreading sequences for asynchronous DS-CDMA---Part II: Some theoretical performance bounds. IEEE Trans. Circuits Syst.---Part I 45, 4, 496--506.]]Google Scholar
- Rowstron, A. 1999. Mobile coordination: Providing fault tolerance in tuple space based coordination language. Coordination Languages and Models (Coordination'99), P. Ciancarini and P. Wolf, Eds. Lecture Notes in Computer Science, vol. 1594. Springer-Verlag, 196--210.]] Google Scholar
- Rowstron, A. and Druschel, P. 2001. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. 18th IFIP/ACM Conference on Distributed Systems Platforms. Heidelberg, Germany. ACM Press.]] Google Scholar
- Saffre, F. and Blok, H. R. 2005. SelfService---A theoretical protocol for autonomic distribution of services in P2P communities. In Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05). 528--534.]] Google Scholar
- Seamons, K. and Winsborough, W. 2002. Automated trust negotiation. Tech. rep., US Patent and Trademark Office. IBM Corporation, patent application filed March 7, 2000.]] Google Scholar
- Setti, G., Mazzini, G., Rovatti, R., and Callegari, S. 2002. Statistical modeling and design of discrete time chaotic processes: Basic finite-dimensional tools and applications. In Proceedings of the IEEE. Vol. 90. 662--690.]]Google Scholar
- Setti, G., Rovatti, R., and Mazzini, G. 2004. Performance of chaos-based asynchronous DS-CDMA with different pulse shapes. IEEE Comm. Lett. 8, 7 (July), 416--418.]]Google Scholar
- Shackleton, M., Saffre, F., Tateson, R., Bonsma, E., and Roadknight, C. 2004. Autonomic computing for pervasive ICT---A whole system perspective. BT Tech. J. 22, 3, 191--199.]] Google Scholar
- Siris, V. A. 2002. Resource control for elastic traffic in CDMA networks. In Proceedings of 8th ACM Conference on Mobile Computing and Networking (MOBICOM'02). Atlanta, GA.]] Google Scholar
- Siris, V. A., Briscoe, B., and Songhurst, D. 2002. Economic models for resource control in wireless networks. In Proceedings of IEEE Int. Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC'02).]]Google Scholar
- Siris, V. A. and Courcoubetis, C. 2004. Resource control for loss-sensitive traffic in CDMA networks. In Proceedings of 23rd Conference of the IEEE Communications Society (INFOCOM). Hong Kong.]]Google Scholar
- Spinglass Project. 2005. Spinglass: Adaptive probabilistic tools for advanced networks. http://www.cs.cornell.edu/Info/Projects/Spinglass/.]]Google Scholar
- Sterritt, R., Mulvenna, M., and Lawrynowicz, A. 2005. A role for contextualised knowledge in autonomic communications. In Proceedings of 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communications, M. Smirnow, Ed. Springer Verlag.]]Google Scholar
- Stoy, K. and Nagpal, R. 2004a. Self-reconfiguration using directed growth. In 7th International Symposium on Distributed Autonomous Robotic Systems (DARS). Toulouse, France. ACM Press, 149--160.]]Google Scholar
- Stoy, K. and Nagpal, R. 2004b. Self-repair through scale independent self-reconfiguration. In Proceedings of IEEE/RSJ International Conference on Robots and Systems (IROS), Sendai, Japan. IEEE Press.]]Google Scholar
- Strang, T., Linnhoff-Popien, C., and Frank, K. 2003. CoOL: A context ontology language to enable contextual interoperability. In Proceedings of 4th IFIP International Conferece on Distributed Applications and Interoperable Systems (DAIS'03).]]Google Scholar
- Takai, M., Bagrodia, R., Gerla, M., Daneshrad, B., Fitz, M. P., Srivastava, M. B., Belding-Royer, E. M., Krishnamurthy, S. V., Molle, M., Mohapatra, P., Rao, R. R., Mitra, U., Shen, C.-C., and Evans, J. B. 2005. Scalable testbed for next generation wireless networking technologies. In Proceedings of TRIDENTCOM 2005. 162--171.]] Google Scholar
- Tanenbaum, A. 2004. Distributed Systems, 2nd ed. Addison Wesley.]]Google Scholar
- Terzis, S., Wagealla, W., English, C., and Nixon, P. 2004. Trust lifecycle management in a global computing environment. In Global Computing, IST/FET International Workshop GC 2004, Rovereto, Italy. 9--12 (March), C. Priami and P. Quaglia, Eds. Lecture Notes in Computer Science, vol. 3267. 291--313.]]Google Scholar
- Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., and Essiari, A. 1999. Certificate-based access control for widely distributed resources. In Proceedings of 8th USENIX Security Symposium (Security'99) (23--26). 215--228.]] Google Scholar
- Trianni, V., Labella, T., and Dorigo, M. 2004. Evolution of direct communication for a swarm-bot performing hole avoidance. In ANTS Workshop. Brussels, Belgium.]]Google Scholar
- Tsarampopoulos, N., Kalavros, I., and Lalis, S. 2005. A low-cost and simple to deploy peer-to-peer wireless network based on open source linux routers. In Proceedings of TRIDENTCOM 2005.]] Google Scholar
- Tschudin, C., Gunningberg, P., Lundgren, H., and Nordstrom, E. 2005. Lessons from experimental MANET research. Ad Hoc Netw. J. 3, 2 (March).]] Google Scholar
- Tschudin, C. and Yamamoto, L. 2004. A metabolic approach to protocol resilience. In Proceedings of the 1st IFIP Workshop on Autonomic Communication (WAC'04). Berlin, Germany.]]Google Scholar
- Tschudin, C. F., Gunningberg, P., Lundgren, H., and Nordström, E. 2005. Lessons from experimental MANET research. Ad Hoc Netw. 3, 2 (March), 221--233.]] Google Scholar
- Undercoffer, J., Joshi, A., and Pinkston, J. 2003. Modeling computer attacks: An ontology for intrusion detection. In Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID'03). Pittsburgh, PA. Lecture Notes in Computer Science, vol. 2820, 113--135.]]Google Scholar
- Vidales, P., Mapp, G., Stajano, F., Crowcroft, J., and Bernardos, C. 2005. A practical approach for overlay systems: Deployment of overlay networks. In Proceedings of TRIDENTCOM 2005.]] Google Scholar
- von Rickenbach, P., Schmid, S., Wattenhofer, R., and Zollinger, A. 2005. A robust interference model for wireless ad-hoc networks. In IPDPS. IEEE Computer Society.]] Google Scholar
- Weiser, M. 1991. The computer for the 21st century. Scientific American 265, 3, 94--104.]]Google Scholar
- Weyns, D., Parunak, H., Michel, F., Holvoet, T., and Ferber, J. 2005. Environments for Multiagent Systems, State-of-the-art and Research Challenges. Lecture Notes in Artificial Intelligence, vol. 3374. Springer Verlag, Berlin, Germany.]] Google Scholar
- Winsborough, W. and Jacobs, J. 2003. Automated trust negotiation in attribute-based access control. In Proceedings of DARPA Information Survivability Conference and Exposition. Vol. 2. IEEE Press, 252--257.]]Google Scholar
- Yamazaki, T. 2005. Ubiquitous home: Real-life testbed for home context-aware services. In Proceedings of TRIDENTCOM 2005. 54--69.]] Google Scholar
- Yao, W. 2003. Fidelis: A policy-driven trust management framework. In 1st International Conference on Trust Management (iTrust). Lecture Notes in Computer Science, vol. 2692. Springer, 301--317.]]Google Scholar
- Yu, T., Winslett, M., and Seamons, K. E. 2003. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inform. Syst. Secur. (TISSEC) 6, 1, 1--42.]] Google Scholar
- Zambonelli, F. and Mamei, M. 2004. Spatial computing: An emerging paradigm for autonomic computing and communication. In International Workshop on Autonomic Communication. Berlin, Germany.]]Google Scholar
Index Terms
- A survey of autonomic communications
Recommendations
Autonomic Re-configuration of Pervasive Supervision Services
EMERGING '09: Proceedings of the 2009 First International Conference on Emerging Network IntelligenceThis paper describes a supervision system for autonomic distributed systems (e.g., a cloud computing environment). It is designed as a supplementary service and is structured as an ensemble of components that implement an autonomic control loop, which ...
Towards autonomic networks
AN'06: Proceedings of the First IFIP TC6 international conference on Autonomic NetworkingAutonomic networking set a challenge for the research community to engineer systems and architectures that will increase the QoS and robustness of future network architectures. However, our experience is that so far the autonomic network research ...
Building autonomic components: the selflets approach
ASE'08: Proceedings of the 23rd IEEE/ACM International Conference on Automated Software EngineeringAutonomic computing is an emergent field aiming at the development of large-scale, self-managing, distributed component-based systems. This paper presents the model and the architecture of an autonomic computing element called SelfLet, which is a ...
Comments