skip to main content
article

A survey of autonomic communications

Published: 01 December 2006 Publication History

Abstract

Autonomic communications seek to improve the ability of network and services to cope with unpredicted change, including changes in topology, load, task, the physical and logical characteristics of the networks that can be accessed, and so forth. Broad-ranging autonomic solutions require designers to account for a range of end-to-end issues affecting programming models, network and contextual modeling and reasoning, decentralised algorithms, trust acquisition and maintenance---issues whose solutions may draw on approaches and results from a surprisingly broad range of disciplines. We survey the current state of autonomic communications research and identify significant emerging trends and techniques.

References

[1]
Abdul-Rahman, A. 1996. The PGP trust model. http://www.cs.ucl.ac.uk/staff/F.AbdulRahman/docs/pgptrust.html.]]
[2]
Abelson, H., Allen, D., Coore, D., Hanson, C., Homsy, G., Knight, T., Nagpal, R., Rauch, E., Sussman, G., and Weiss, R. 2000. Amorphous computing. Comm. ACM 43, 5 (May), 74--82.]]
[3]
Ahlswede, R., Cai, N., Li, S.-Y. R., and Yeung, R. W. 2000. Network information flow. IEEE Trans. Inform. Theory 46, 4, 1204--1216.]]
[4]
Almeida, P. S., Baquero, C., and Fonte, V. 2002. Version stamps---decentralized version vectors. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02). IEEE Computer Society, 544.]]
[5]
Àlvarez, C., Díaz, J., Petit, J., Rolim, J., and Serna, M. 2004. Efficient and reliable high level communicatioon in deployed sensor networks. In ACM International Workshop on Mobility Management and Wireless Systems (Mobiwac'04). ACM Press, 106--110.]]
[6]
Andersen, D. G., Balakrishnan, H., Kaashoek, M. F., and Morris, R. 2002. Resilient overlay networks. Comput. Comm. Rev. 32, 1, 66.]]
[7]
Babaoglu, Ö., Jelasity, M., and Montresor, A. 2005a. Grassroots approach to self-management in large-scale distributed systems. In Unconventional Programming Paradigms. Lecture Notes in Computer Science, vol. 3566. Springer-Verlag, 286--296.]]
[8]
Babaoglu, Ö., Jelasity, M., Montresor, A., Fetzer, C., Leonardi, S., van Moorsel, A. P. A., and van Steen, M., Eds. 2005b. Self-star properties in complex information systems, conceptual and practical foundations. Lecture Notes in Computer Science, vol. 3460. Springer.]]
[9]
Babaoglu, Ö., Meling, H., and Montresor, A. 2002. A framework for the development of agent-based peer-to-peer systems. In 22nd International Conference on Distributed Computing Systems. Vienna, Austria. IEEE Computer Socity Press, 15--22.]]
[10]
Baker, S. and Dobson, S. 2005. Comparing service-oriented and distributed object architectures. In Proceedings of the International Symposium on Distributed Objects and Applications, R. Meersman and Z. T. et al, Eds. Lecture Notes in Computer Science, vol. 3760. Springer Verlag, 631--645.]]
[11]
Balakrishnan, H., Kaashoek, M. F., Karger, D. R., Morris, R., and Stoica, I. 2003. Looking up data in P2P systems. Comm. ACM 46, 2, 43--48.]]
[12]
Baldoni, R., Querzoni, L., Patiño-Mart‘nez, M., and Jímenez-Peris, R. 2004. Low-load dynamic hierarchical quorums for P2P networks. Tech. rep. (Dec).]]
[13]
Bandini, S., Manzoni, S., and Simone, C. 2002. Heterogeneous agents situated in heterogeneous spaces. Appl. Artificial Intellig. 16, 9--10 (Oct.--Dec.), 831--852.]]
[14]
Becker, M. Y. and Sewell, P. 2004. Cassandra: Flexible trust management, applied to electronic health records. In Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW). 139--154.]]
[15]
Birman, K. 2005. Reliable Distributed Systems Technologies, Web Services, and Applications. Springer.]]
[16]
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A. D. 1999. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Springer-Verlag, 185--210.]]
[17]
BOINC Project. 2006. Berkeley open infrastructure for network computing. http://boinc.berkeley.edu/.]]
[18]
Bonabeau, E., Dorigo, M., and Theraulaz, G. 1999. Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press.]]
[19]
Bonatti, P. and Samarati, P. 2002. A unified framework for regulating access and information release on the web. J. Comput. Security 10, 3, 241--272.]]
[20]
Bullock, S. and Cliff, D. 2004. Complexity and emergent behaviour in ICT systems. Tech. rep. HPL-2004-187.]]
[21]
Byers, J., Horn, G., Luby, M., Mitzenmacher, M., and Shaver, W. 2002. FLID/DL: Congestion control for layered multicast. IEEE J. Select. Areas Comm. 20, 8 (Oct.), 1558--1570.]]
[22]
Byers, J. W., Considine, J., Mitzenmacher, M., and Rost, S. 2004. Informed content delivery across adaptive overlay networks. IEEE/ACM Trans. Netw. 12, 5, 767--780.]]
[23]
Cabri, G., Leonardi, L., and Zambonelli, F. 2000. Mobile-agent coordination models for internet applications. IEEE Comput. 33, 2.]]
[24]
Cahill, V., Shand, B., Gray, E., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Bryce, C., di Marzo Serugendo, G., Seigneur, J.-M., Carbone, M., Krukow, K., Jensen, C., Chen, Y., and Nielsen, M. 2003. Using trust for secure collaboration in uncertain environments. IEEE Pervasive Comput. 2, 3 (July), 52--61.]]
[25]
Carreras, I., Grasso, R., and Szabo, C. A. 2005. Design considerations on the CREATE-NET testbed. In Proceedings of TRIDENTCOM 2005. 44--53.]]
[26]
Carzaniga, A., Rosenblum, D., and Wolf, A. 2001. Design and evaluation of a wide-area event notification service. ACM Trans. Comput. Syst. 19, 3 (Aug.), 332--383.]]
[27]
Castro, M., Jones, M., Kermarrec, A., Rowstron, A., Theimer, M., Wang, H., and Wolman, A. 2003. An evaluation of scalable application-level multicast built using peer-to-peer overlays. In IEEE Infocom. San Francisco, CA. IEEE Computer Society Press.]]
[28]
Chadwick, D., Otenko, A., and Ball, E. 2003. Role-based access control with X.509 attribute certificates. IEEE Internet Comput. 7, 2 (March/April), 62--69.]]
[29]
Chelius, G., Jelger, C., Fleury, E., and Noel, T. 2005. IPv6 addressing scheme and self-configuration for multi-hops wireless ad hoc network. In Proceedings of the International Conference on Information Networking (ICOIN'05). Jeju, Korea.]]
[30]
Chess, D. M., Palmer, C. C., and White, S. R. 2003. Security in an autonomic computing environment. IBM Syst. J. 42, 1, 107--118.]]
[31]
Chlebus, B. S., Gasieniec, L., Kowalski, D. R., and Radzik, T. 2005. On the wake-up problem in radio networks. In ICALP, L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, Eds. Lecture Notes in Computer Science, vol. 3580. Springer, 347--359.]]
[32]
Chockler, G., Keidar, I., and Vitenberg, R. 2001. Group communication specifications: A comprehensive study. ACM Comput. Surv. 33, 4, 427--469.]]
[33]
Cholvi, V., Laderas, V., López, L., and Fernández, A. 2005. Self-adapting network topologies in congested scenarios. Physical Rev. 71, 3.]]
[34]
Chrobak, M., Gasieniec, L., and Rytter, W. 2004. A randomized algorithm for gossiping in radio networks. Networks 43, 2, 119--124.]]
[35]
Clark, D., Partridge, C., Ramming, J., and Wroclawski, J. 2003. A knowledge plane for the internet. In Proceedings of ACM SIGCOMM.]]
[36]
Cohen, B. 2003. Incentives build robustness in bittorrent. http://www.bittorrent.com/bittorrentecon.pdf.]]
[37]
Costa, D. and Hertz, A. 1997. Ants can colour graphs. J. Operation. Resear. Soc. 48, 295--305.]]
[38]
Costa, P. and Picco, G. 2005 (to appear). Semi-probabilistic content-based publish-subscribe. In IEEE International Conference on Distributed Computing Systems (ICDCS), Columbus, OH. IEEE Computer Society Press.]]
[39]
Coutaz, J., Crowley, J., Dobson, S., and Garlan, D. 2005. Context is key. Comm. ACM 48, 3 (March), 49--53.]]
[40]
Curino, C., Giani, M., Giorgetta, M., Giusti, A., Murphy, A., and Picco, G. 2005. Tinylime: Bridging mobile and sensor networks through middleware. In IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai Island, Hawaii. IEEE Computer Society Press.]]
[41]
de Bruijn, J., Lausen, H., Polleres, A., and Fensel, D. 2005. The WSML rule languages for the semantic web. In Proceedings of the W3C Workshop on Rule Languages for Interoperability. Washington, DC.]]
[42]
de Castro, M. F., Merghem, L., Gaïti, D., and Mhamed, A. 2004. The basis for an adaptive IP QoS management. IEICE Trans. Comm. E87-B, 3 (March), 564--572.]]
[43]
de Vergara, J., Villagré, V., and Berrocal, J. 2004. Applying the Web Ontology Language to management information definitions. IEEE Comm. Mag. 42, 7 (July), 68--74.]]
[44]
Défago, X., Schiper, A., and Urbán, P. 2004. Total order broadcast and multicast algorithms: Taxonomy and survey. ACM Comput. Sur. 36, 4, 372--421.]]
[45]
Dobson, S. 2005. Putting meaning into the network: Some semantic issues for the design of autonomic communications systems. In Proceedings of the 1st IFIP Workshop on Autonomic Communications (Berlin, Germany), M. Smirnov, Ed. Lecture Notes in Computer Science, vol. 3457. Springer Verlag.]]
[46]
Dobson, S. and Nixon, P. 2004. More principled design of pervasive computing systems. In Human Computer Interaction and Interactive Systems, R. Bastide and J. Roth, Eds. Lecture Notes in Computer Science, vol. 3425. Springer Verlag.]]
[47]
Dorigo, M. and Gambardella, L. M. 1997. Ant colonies for the travelling salesman problem. Biosystems 43, 73--81.]]
[48]
Driver, C. and Clarke, S. 2004. Context-aware trails. IEEE Comput. 37, 8 (Aug.), 97--99.]]
[49]
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. 1999. SPKI certificate theory. IETF RFC 2693.]]
[50]
English, C., Terzis, S., Wagealla, W., Lowe, H., Nixon, P., and McGettrick, A. 2003a. Trust dynamics for collaborative global computing. In Proceedings of 12th IEEE International Workshop on Enabling Technologies (WETICE'03), Linz, Austria. IEEE Computer Society. 283--288.]]
[51]
English, C., Wagealla, W., Nixon, P., Terzis, S., Lowe, H., and McGettrick, A. 2003b. Trusting collaboration in global computing systems. In Proceedings of 1st International Conference on Trust Management (iTrust'03), Heraklion, Crete, Greece. Lecture Notes in Computer Science, vol. 2692. Springer, 136--149.]]
[52]
Esponda, F., Forrest, S., and Helman, P. 2004. A formal framework for positive and negative detection. IEEE Trans. Syst., Man, Cybernet. 34, 1 (Feb.).]]
[53]
Eugster, P., Guerraoui, R., Kermarrec, A., and Massoulie, L. 2004. Epidemic information dissemination in distributed systems. IEEE Comput. 37, 5, 60--67.]]
[54]
Eugster, P., Guerraoui, R., and Kouznetsov, P. 2004. D-reliable broadcast: A probabilistic measure of broadcast reliability. In IEEE International Conference on Distributed Computing Systems (ICDCS). Tokio, Japan.]]
[55]
Eugster, P. T., Felber, P., Guerraoui, R., and Kermarrec, A.-M. 2003. The many faces of publish/subscribe. ACM Comput. Surv. 35, 2 (June), 114--131.]]
[56]
Eugster, P. T., Guerraoui, R., Handurukande, S. B., Kouznetsov, P., and Kermarrec, A.-M. 2003. Lightweight probabilistic broadcast. ACM Trans. Comput. Syst. 21, 4, 341--374.]]
[57]
Fernández, A., Georgiou, C., López, L., and Santos, A. 2005. Reliably executing tasks in the presence of malicious processors. In DISC, P. Fraigniaud, Ed. Lecture Notes in Computer Science, vol. 3724. Springer, 490--492.]]
[58]
Fernández, A., Georgiou, C., López, L., and Santos, A. 2006. Reliably executing tasks in the presence of untrusted entities. In Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06). Leeds, UK.]]
[59]
G. Picco, G. Cugola, A. M. 2003. Efficient content-based event dispatching in presence of topological reconfigurations. In Proceedings of the IEEE International Conference on Distributed Computing Systems, Providence, RI. IEEE Computer Society Press.]]
[60]
Garg, A., Battiti, R., and Costanzi, G. 2004. Dynamic self-management of autonomic systems: The reputation, quality and credibility (RQC) scheme. In Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication (WAC). Springer-Verlag, Berlin, Germany.]]
[61]
Gelenbe, E. 2004a. Cognitive packet network, U.S. Patent 6,804,201.]]
[62]
Gelenbe, E. 2004b. Cognitive routing in packet networks. In ICONIP, N. R. Pal, N. Kasabov, R. K. Mudi, S. Pal, and S. K. Parui, Eds. Lecture Notes in Computer Science, vol. 3316. Springer, 625--632.]]
[63]
Gelenbe, E. 2004c. Sensible decisions based on QoS. Comput. Manage. Science 1, 1, 1--14.]]
[64]
Gelenbe, E., Gellman, M., Lent, R., Liu, P., and Su, P. 2004. Autonomous smart routing for network QoS. In Proceedings of the First International Conference on Autonomic Computing. IEEE Computer Society, 232--239.]]
[65]
Gelenbe, E. and Lent, R. 2004. Power aware ad hoc cognitive packet networks. Ad Hoc Netw. J. 2, 3, 205--216.]]
[66]
Gelenbe, E., Lent, R., and Nunez, A. 2004. Self-aware networks and quality of service. Proceedings of the IEEE 92, 9, 1479--1490.]]
[67]
Gelenbe, E., Lent, R., and Xu, Z. 2001. Design and performance of cognitive packet networks. Perform. Evaluat. 46, 155--176.]]
[68]
Gelenbe, E. and Nunez, A. 2003. Adaptive web service for QoS improvement. In Proceedings of IADIS International WWW/Internet Conference. Algarve, Portugal.]]
[69]
Gkantsidis, C. and Rodriguez, P. 2005. Network coding for large scale content distribution. In IEEE/INFOCOM 2005. Miami, FL.]]
[70]
Gonzalez, A. and Ahlers, R. 1999. Context-based representation of intelligent behaviour in training simulations. Trans. Society Comput. Simulat. Int. 15, 4 (March).]]
[71]
Henrickcon, K., Indulska, J., and Rakotonirainy, A. 2002. Modeling context information in pervasive computing systems. In Proceedings of the 1st International Conference on Pervasive Computing Systems, F. Mattern and M. Naghshineh, Eds. Lecture Notes in Computer Science, vol. 2414. Springer Verlag.]]
[72]
Hofmeyr, S. A. and Forrest, S. 2000. Architecture for an artificial immune system. Evolution. Computat. 8, 4, 443--473.]]
[73]
IBM, Microsoft, BEA, RSA Security and VeriSign. 2003. Web Services Federation Language (WS-Federation). IBM, Microsoft, BEA, RSA Security and VeriSign. http://www-106.ibm.com/developerworks/webservices/library/ws-fed.]]
[74]
Ionescu, B., Ionescu, M., Veres, S., Ionescu, D., Cuervo, F., and Luiken-Miller, M. 2005. A testbed and research network for next generation services over next generation networks. In Proceedings of TRIDENTCOM 2005. 21--31.]]
[75]
ITU-T. 2001. The directory: Public-key and attribute certificate frameworks. ITU-T Recommendation X.509:2000(E) | ISO/IEC 9594-8:2001(E).]]
[76]
Jelasity, M., Kowalczyk, W., and van Steen, M. November 2003. Newscast computing. Tech. rep., Vrije Universiteit IR-CS-006.]]
[77]
Jensen, O. H. and Milner, R. 2003. Bigraphs and mobile processes. Tech. rep. UCAM-CL-TR-570, University of Cambridge Computer Laboratory.]]
[78]
Jiménez-Peris, R., Patiño-Martínez, M., and Alonso, G. 2002. An algorithm for non-intrusive, parallel recovery of replicated data and its correctness. In Proceedings of 21st IEEE Int. Conference on Reliable Distributed Systems (SRDS'02). Osaka, Japan, 150--159.]]
[79]
Karabulut, Y. 2003. Implementation of an agent-oriented trust management infrastructure based on a hybrid PKI model. In iTrust, P. Nixon and S. Terzis, eds. Lecture Notes in Computer Science, vol. 2692. Springer, 318--331.]]
[80]
Kennedy, M. P., Rovatti, R., and Setti, G. 2000. Chaotic Electronics in Telecommunications. CRC Press.]]
[81]
Kephart, J. and Chess, D. 2003. The vision of autonomic computing. IEEE Comput. 36, 1, 41--50.]]
[82]
Koshutanski, H. and Massacci, F. 2004a. E pluribus unum: Deduction, abduction and induction, the reasoning services for access control in autonomic communication. In Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication (WAC). Springer-Verlag, Berlin, Germany.]]
[83]
Koshutanski, H. and Massacci, F. 2004b. Interactive access control for Web Services. In Proceedings of the 19th IFIP Information Security Conference (SEC'04), Toulouse, France. Kluwer Press, 151--166.]]
[84]
Koshutanski, H. and Massacci, F. 2004c. An interactive trust management and negotiation scheme. In Proceedings of the 2nd International Workshop on Formal Aspects in Security and Trust (FAST), Toulouse, France. Kluwer Press, 139--152.]]
[85]
Laoutaris, N., Panagakis, A., and Stavrakakis, I. 2004a. Content distribution through autonomic content and storage management. In WAC 2004, M. Smirnov, Ed. Lecture Notes in Computer Science, vol. 3457. Springer, Berlin, Germany, 69--78.]]
[86]
Laoutaris, N., Panagakis, A., and Stavrakakis, I. 2004b. Content distribution through autonomic content and storage management. In WAC 2004.]]
[87]
Laoutaris, N., Telelis, O., Zissimopoulos, V., and Stavrakakis, I. 2004. Local utility aware content replication. In IFIP Networking 2005.]]
[88]
Laoutaris, N., Telelis, O., Zissimopoulos, V., and Stavrakakis, I. 2005. Distributed selfish replication. IEEE Trans. Paral. Distrib. Syst. {under submission}.]]
[89]
Lassila, O. and Swick, R. 1999. Resource Description Framework model and syntax specification. Tech. rep., World Wide Web Consortium.]]
[90]
Leff, A., Wolf, J., and Yu, P. 1993. Replication algorithms in a remote caching architecture. IEEE Trans. Paral. Distrib. Syst. 4, 11 (Nov.), 1185--1204.]]
[91]
Lewis, D., Feeney, K., Carey, K., Tiropanis, T., and Courtenage, S. 2005. Semantic-based policy engineering for autonomic systems. In Proceedings of 1st IFIP WG6.6 International Workshop on Autonomic Communication, M. Smirnow, Ed. Springer Verlag.]]
[92]
Li, N., Mitchell, J. C., and Winsborough, W. H. 2002. Design of a role-based trust-management framework. In Proceedings of IEEE Symposium on Security and Privacy, 2002. S&P. IEEE Press.]]
[93]
López, L., Fernández, A., and Cholvi, V. 2005. A game theoretic analysis of protocols based on fountain codes. In The 10th IEEE Symposium on Computers and Communications (ISCC'05). La Manga del Mar Menor, Spain.]]
[94]
Luby, M. 2002. LT codes. In FOCS. IEEE Computer Society, 271.]]
[95]
Luby, M. 2003. Fast, reliable data transport. In USENIX Symposium on Internet Technologies and Systems.]]
[96]
Lücking, T., Mavronicolas, M., Monien, B., and Rode, M. 2004. A new model for selfish routing. In Proceedings of STACS 2004. 547--558.]]
[97]
Madueño, M. and Vidal, J. 2005. Joint physical-MAC layer design of the broadcast channel protocol in adhoc networks. IEEE J. Select. Areas in Comm. (Special Issue on Ad-Hoc Networking).]]
[98]
Magedanz, T., Witaszek, D., and Knuettel, K. 2005. The IMS playground at FOKUS---an open test-bed for next generation network multimedia services. In Proceedings of TRIDENTCOM 2005.]]
[99]
Mamei, M. and Zambonelli, F. 2004. Programming pervasive and mobile computing applications with the TOTA middleware. In IEEE International Conference On Pervasive Computing (Percom) Orlando, FL. IEEE Computer Socity Press.]]
[100]
Mamei, M., Zambonelli, F., and Leonardi, L. 2004. Co-fields: A physically inspired approach to distributed motion coordination. IEEE Pervasive Comput. 3, 2, 52--61.]]
[101]
Mazzini, G., Rovatti, R., and Setti, G. 2000. A tensor approach to higher order expectations of chaotic trajectories---part II: Application to chaos-based DS-CDMA in multipath environements. IEEE Trans. Circuits and Syst.---Part I 47, 1584--1596.]]
[102]
Mazzini, G., Rovatti, R., and Setti, G. 2001. Chaos-based asynchronous DS-CDMA systems and enhanced rake receivers: Measuring the improvements. IEEE Trans. Circuits Syst.---Part I 48, 12, 1445--1453.]]
[103]
Mazzini, G., Rovatti, R., and Setti, G. 1999. Interference minimization by auto-correlation shaping in asynchronous DS-CDMA systems: Chaos-based spreading is nearly optimal. IEEE Electronics Lett. 35, 13 (June), 1054--1055.]]
[104]
Mazzini, G., Setti, G., and Rovatti, R. 1997. Chaotic complex spreading sequences for asynchronous DS-CDMA---Part I: System modeling and results. IEEE Trans. Circuits Syst.---Part I 44, 10, 937--947.]]
[105]
McGibney, J., Schmidt, N., and Patel, A. 2005. A service-centric model for intrusion detection in next-generation networks. Comput. Stand. Interf. 27, 5 (June), 513--520.]]
[106]
Menezes, R. and Tolksdorf, R. 2003. A new approach to scalable linda-systems based on swarms. ACM Symposium on Applied Computer, Orlando, FL. ACM Press, 375--379.]]
[107]
Merghem, L., Gaïti, D., and Pujolle, G. 2003. On using multi-agent systems in end to end adaptive monitoring. In Proceedings of E2EMON (End to End MONitoring) Workshop, in Conjunction with MMNS2003 (Belfast, UK). Lecture Notes in Computer Science, vol. 2839. Springer Verlag, 422--435.]]
[108]
Merloti, P. E. 2004. Optimization algorithms inspired by biological ants and swarm behavior.]]
[109]
Mestre, X., Fonollosa, J. R., and Pagès, A. 2003. Capacity of MIMO channels: Asymptotic evaluation under correlated fading. IEEE J. Select. Areas Comm. (Special Issue on MIMO Systems and Applications) 21, 5 (June).]]
[110]
Michiardi, P. and Molva, R. 2002. Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of Communication and Multimedia Security Conference.]]
[111]
Milan-Franco, J. M., Jiménez-Peris, R., Patiño-Martínez, M., and Kemme, B. 2004. Adaptive distributed middleware for database replication. In Proceedings of 5th ACM/IFIP/USENIX Middleware Conference. Toronto, Canada, 175--194.]]
[112]
Morató, D., Magana, E., Izal, M., Aracil, J., Naranjo, F. J., Astiz, P., Alonso, U., Csabai, I., Hága, P., Simon, G., Steger, J., and Vattay, G. 2005. The European traffic observatory measurement infrastructure (ETOMIC): A testbed for universal active and passive measurements. In Proceedings of TRIDENTCOM 2005.]]
[113]
Nakrani, S. and Tovey, C. 2004. On honey bees and dynamic server allocation in internet hosting centers. Adaptive Behavior 12, 3--4, 223--240.]]
[114]
OASIS Security Services TC. 2004. Security Assertion Markup Language (SAML). http://www.oasis-open.org/committees/security.]]
[115]
Omicini, A., Ricci, A., Viroli, M., Castelfranchi, C., and Tummolini, L. 2004. Coordination artifacts: Environment-based coordination for intelligent agents. International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). New York (NY).]]
[116]
O'Neill, E., Klepal, M., Lewis, D., O'Donnell, T., O'Sullivan, D., and Pesch, D. 2005. A testbed for evaluating human interaction with ubiquitous computing environments. In Proceedings of TRIDENTCOM 2005.]]
[117]
O'Neill, E., Lewis, D., McGlinn, K., and Dobson, S. 2006. Rapid user-centred evaluation for context-aware systems. In Proceedings of the 13th International Workshop on Design, Specification and Verification of Interactive Systems (DSVIS'06), G. Doherty and A. Blandford, Eds. Lecture Notes in Computer Science, Springer Verlag.]]
[118]
Oreizy, P., Gorlick, M., Taylor, R., Heimbigner, D., Johnson, G., Medvidovic, N., Quilliei, A., Rosenblum, D., and Wolf, A. 1999. An architecture-based approach to self-adaptive software. IEEE Intel. Syst. 14, 3 (May/June), 54--62.]]
[119]
Park, J. S. and Sandhu, R. 1999. RBAC on the Web by smart certificates. In Proceedings of the 4th ACM Workshop on Role-Based Access Control. ACM Press, 1--9.]]
[120]
Picco, G., Murphy, A., and Roman, G. 2001. Lime: A middleware for logical and physical mobility. In Proceedings of the IEEE International Conference on Distributed Computing Systems, Providence, RI. IEEE Computer Society Press, 524--536.]]
[121]
Pujolle, G., Chaouchi, H., and Gaïti, D. 2004. Beyond TCP/IP: A context-aware architecture. In Proceedings of NetCon 2004, Palma de Mallorca. Kluwer Academic Publishers, 337--347.]]
[122]
Qiu, D. and Srikant, R. 2004. Modeling and performance analysis of bittorrent-like peer-to-peer networks. In SIGCOMM, R. Yavatkar, E. W. Zegura, and J. Rexford, Eds. ACM, 367--378.]]
[123]
Quitadamo, R. and Zambonelli, F. 2007. Autonomic communication services: a new challenge for software agents. J. Autonom. Agents Multiagent Syst.]]
[124]
Rao, A., Papadimitriou, C., Ratnasamy, S., Shenker, S., and Stoica, I. 2003. Geographic routing without location information. In ACM Mobicom. San Diego, CA. ACM Press.]]
[125]
Ratsanamy, S. and al. 2002. Ght: A geographic hash table for data-centric storage. In 1st ACM International Workshop on Wireless Sensor Networks and Applications. ACM Press, Atlanta, Georgia, USA.]]
[126]
Ratsanamy, S., Francis, P., Handley, M., and Karp, R. 2001. A scalable content-addressable network. In ACM SIGCOMM Conference, San Diego, CA. ACM Press.]]
[127]
Rodero, L., López, L., Fernández, A., and Cholvi, V. 2006. Dante: A self-adapting peer-to-peer system. In Proceedings of the 5th International Workshop on Agents and Peer-to-Peer Computing (AP2PC06), Hakodate, Japan. Lecture Notes in Computer Science. Springer.]]
[128]
Roman, G., Julien, C., and Huang, Q. 2002. Network abstractions for context-aware mobile computing. 24th International Conference on Software Engineering, Orlando, FL. ACM Press.]]
[129]
Rovatti, R., Mazzini, G., and Setti, G. 2000. A tensor approach to higher order expectations of chaotic trajectories---Part I: General theory and specialization to piecewise affine Markov systems. IEEE Trans. Circuits Syst.---Part I 47, 1571--1583.]]
[130]
Rovatti, R., Mazzini, G., and Setti, G. 2001. Enhanced rake receivers for chaos-based DS-CDMA. IEEE Trans. Circuits Syst.---Part I 48, 818--829.]]
[131]
Rovatti, R., Mazzini, G., and Setti, G. 2004a. On the ultimate limits of chaos-based asynchronous DS-CDMA---Part I: Basic definitions and results. IEEE Trans. Circuits Syst.---Part I 52, 7, 1336--1347.]]
[132]
Rovatti, R., Mazzini, G., and Setti, G. 2004b. On the ultimate limits of chaos-based asynchronous DS-CDMA---Part II: Analytical results and asymptotics. IEEE Trans. Circuits Syst.---Part I 52, 7, 1348--1364.]]
[133]
Rovatti, R., Setti, G., and Mazzini, G. 1998. Chaotic complex spreading sequences for asynchronous DS-CDMA---Part II: Some theoretical performance bounds. IEEE Trans. Circuits Syst.---Part I 45, 4, 496--506.]]
[134]
Rowstron, A. 1999. Mobile coordination: Providing fault tolerance in tuple space based coordination language. Coordination Languages and Models (Coordination'99), P. Ciancarini and P. Wolf, Eds. Lecture Notes in Computer Science, vol. 1594. Springer-Verlag, 196--210.]]
[135]
Rowstron, A. and Druschel, P. 2001. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. 18th IFIP/ACM Conference on Distributed Systems Platforms. Heidelberg, Germany. ACM Press.]]
[136]
Saffre, F. and Blok, H. R. 2005. SelfService---A theoretical protocol for autonomic distribution of services in P2P communities. In Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05). 528--534.]]
[137]
Seamons, K. and Winsborough, W. 2002. Automated trust negotiation. Tech. rep., US Patent and Trademark Office. IBM Corporation, patent application filed March 7, 2000.]]
[138]
Setti, G., Mazzini, G., Rovatti, R., and Callegari, S. 2002. Statistical modeling and design of discrete time chaotic processes: Basic finite-dimensional tools and applications. In Proceedings of the IEEE. Vol. 90. 662--690.]]
[139]
Setti, G., Rovatti, R., and Mazzini, G. 2004. Performance of chaos-based asynchronous DS-CDMA with different pulse shapes. IEEE Comm. Lett. 8, 7 (July), 416--418.]]
[140]
Shackleton, M., Saffre, F., Tateson, R., Bonsma, E., and Roadknight, C. 2004. Autonomic computing for pervasive ICT---A whole system perspective. BT Tech. J. 22, 3, 191--199.]]
[141]
Siris, V. A. 2002. Resource control for elastic traffic in CDMA networks. In Proceedings of 8th ACM Conference on Mobile Computing and Networking (MOBICOM'02). Atlanta, GA.]]
[142]
Siris, V. A., Briscoe, B., and Songhurst, D. 2002. Economic models for resource control in wireless networks. In Proceedings of IEEE Int. Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC'02).]]
[143]
Siris, V. A. and Courcoubetis, C. 2004. Resource control for loss-sensitive traffic in CDMA networks. In Proceedings of 23rd Conference of the IEEE Communications Society (INFOCOM). Hong Kong.]]
[144]
Spinglass Project. 2005. Spinglass: Adaptive probabilistic tools for advanced networks. http://www.cs.cornell.edu/Info/Projects/Spinglass/.]]
[145]
Sterritt, R., Mulvenna, M., and Lawrynowicz, A. 2005. A role for contextualised knowledge in autonomic communications. In Proceedings of 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communications, M. Smirnow, Ed. Springer Verlag.]]
[146]
Stoy, K. and Nagpal, R. 2004a. Self-reconfiguration using directed growth. In 7th International Symposium on Distributed Autonomous Robotic Systems (DARS). Toulouse, France. ACM Press, 149--160.]]
[147]
Stoy, K. and Nagpal, R. 2004b. Self-repair through scale independent self-reconfiguration. In Proceedings of IEEE/RSJ International Conference on Robots and Systems (IROS), Sendai, Japan. IEEE Press.]]
[148]
Strang, T., Linnhoff-Popien, C., and Frank, K. 2003. CoOL: A context ontology language to enable contextual interoperability. In Proceedings of 4th IFIP International Conferece on Distributed Applications and Interoperable Systems (DAIS'03).]]
[149]
Takai, M., Bagrodia, R., Gerla, M., Daneshrad, B., Fitz, M. P., Srivastava, M. B., Belding-Royer, E. M., Krishnamurthy, S. V., Molle, M., Mohapatra, P., Rao, R. R., Mitra, U., Shen, C.-C., and Evans, J. B. 2005. Scalable testbed for next generation wireless networking technologies. In Proceedings of TRIDENTCOM 2005. 162--171.]]
[150]
Tanenbaum, A. 2004. Distributed Systems, 2nd ed. Addison Wesley.]]
[151]
Terzis, S., Wagealla, W., English, C., and Nixon, P. 2004. Trust lifecycle management in a global computing environment. In Global Computing, IST/FET International Workshop GC 2004, Rovereto, Italy. 9--12 (March), C. Priami and P. Quaglia, Eds. Lecture Notes in Computer Science, vol. 3267. 291--313.]]
[152]
Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., and Essiari, A. 1999. Certificate-based access control for widely distributed resources. In Proceedings of 8th USENIX Security Symposium (Security'99) (23--26). 215--228.]]
[153]
Trianni, V., Labella, T., and Dorigo, M. 2004. Evolution of direct communication for a swarm-bot performing hole avoidance. In ANTS Workshop. Brussels, Belgium.]]
[154]
Tsarampopoulos, N., Kalavros, I., and Lalis, S. 2005. A low-cost and simple to deploy peer-to-peer wireless network based on open source linux routers. In Proceedings of TRIDENTCOM 2005.]]
[155]
Tschudin, C., Gunningberg, P., Lundgren, H., and Nordstrom, E. 2005. Lessons from experimental MANET research. Ad Hoc Netw. J. 3, 2 (March).]]
[156]
Tschudin, C. and Yamamoto, L. 2004. A metabolic approach to protocol resilience. In Proceedings of the 1st IFIP Workshop on Autonomic Communication (WAC'04). Berlin, Germany.]]
[157]
Tschudin, C. F., Gunningberg, P., Lundgren, H., and Nordström, E. 2005. Lessons from experimental MANET research. Ad Hoc Netw. 3, 2 (March), 221--233.]]
[158]
Undercoffer, J., Joshi, A., and Pinkston, J. 2003. Modeling computer attacks: An ontology for intrusion detection. In Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID'03). Pittsburgh, PA. Lecture Notes in Computer Science, vol. 2820, 113--135.]]
[159]
Vidales, P., Mapp, G., Stajano, F., Crowcroft, J., and Bernardos, C. 2005. A practical approach for overlay systems: Deployment of overlay networks. In Proceedings of TRIDENTCOM 2005.]]
[160]
von Rickenbach, P., Schmid, S., Wattenhofer, R., and Zollinger, A. 2005. A robust interference model for wireless ad-hoc networks. In IPDPS. IEEE Computer Society.]]
[161]
Weiser, M. 1991. The computer for the 21st century. Scientific American 265, 3, 94--104.]]
[162]
Weyns, D., Parunak, H., Michel, F., Holvoet, T., and Ferber, J. 2005. Environments for Multiagent Systems, State-of-the-art and Research Challenges. Lecture Notes in Artificial Intelligence, vol. 3374. Springer Verlag, Berlin, Germany.]]
[163]
Winsborough, W. and Jacobs, J. 2003. Automated trust negotiation in attribute-based access control. In Proceedings of DARPA Information Survivability Conference and Exposition. Vol. 2. IEEE Press, 252--257.]]
[164]
Yamazaki, T. 2005. Ubiquitous home: Real-life testbed for home context-aware services. In Proceedings of TRIDENTCOM 2005. 54--69.]]
[165]
Yao, W. 2003. Fidelis: A policy-driven trust management framework. In 1st International Conference on Trust Management (iTrust). Lecture Notes in Computer Science, vol. 2692. Springer, 301--317.]]
[166]
Yu, T., Winslett, M., and Seamons, K. E. 2003. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inform. Syst. Secur. (TISSEC) 6, 1, 1--42.]]
[167]
Zambonelli, F. and Mamei, M. 2004. Spatial computing: An emerging paradigm for autonomic computing and communication. In International Workshop on Autonomic Communication. Berlin, Germany.]]

Cited By

View all
  • (2024)Generative AI for Self-Adaptive Systems: State of the Art and Research RoadmapACM Transactions on Autonomous and Adaptive Systems10.1145/368680319:3(1-60)Online publication date: 30-Sep-2024
  • (2024)Adaptation in Edge Computing: A Review on Design Principles and Research ChallengesACM Transactions on Autonomous and Adaptive Systems10.1145/366420019:3(1-43)Online publication date: 30-Sep-2024
  • (2024)Automating Pipelines of A/B Tests with Population Split Using Self-Adaptation and Machine LearningProceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems10.1145/3643915.3644087(84-97)Online publication date: 15-Apr-2024
  • Show More Cited By

Index Terms

  1. A survey of autonomic communications

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Autonomous and Adaptive Systems
    ACM Transactions on Autonomous and Adaptive Systems  Volume 1, Issue 2
    December 2006
    147 pages
    ISSN:1556-4665
    EISSN:1556-4703
    DOI:10.1145/1186778
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 December 2006
    Published in TAAS Volume 1, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tag

    1. Autonomic communication

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)44
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Generative AI for Self-Adaptive Systems: State of the Art and Research RoadmapACM Transactions on Autonomous and Adaptive Systems10.1145/368680319:3(1-60)Online publication date: 30-Sep-2024
    • (2024)Adaptation in Edge Computing: A Review on Design Principles and Research ChallengesACM Transactions on Autonomous and Adaptive Systems10.1145/366420019:3(1-43)Online publication date: 30-Sep-2024
    • (2024)Automating Pipelines of A/B Tests with Population Split Using Self-Adaptation and Machine LearningProceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems10.1145/3643915.3644087(84-97)Online publication date: 15-Apr-2024
    • (2024)Towards Real-Time Aggregate ComputingLeveraging Applications of Formal Methods, Verification and Validation. Rigorous Engineering of Collective Adaptive Systems10.1007/978-3-031-75107-3_4(49-68)Online publication date: 27-Oct-2024
    • (2024)An Enhanced Exchange Operator for XCCoordination Models and Languages10.1007/978-3-031-62697-5_8(129-145)Online publication date: 17-Jun-2024
    • (2023)Runtime verification of self-adaptive multi-agent system using probabilistic timed automataJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-23239745:6(10305-10322)Online publication date: 1-Jan-2023
    • (2023)SMACS: A framework for formal verification of complex adaptive systemsOpen Computer Science10.1515/comp-2022-027513:1Online publication date: 25-May-2023
    • (2023)ActivFORMS: A Formally Founded Model-based Approach to Engineer Self-adaptive SystemsACM Transactions on Software Engineering and Methodology10.1145/352258532:1(1-48)Online publication date: 13-Feb-2023
    • (2023)Toward Autonomic Internet of Things: Recent Advances, Evaluation Criteria, and Future Research DirectionsIEEE Internet of Things Journal10.1109/JIOT.2023.328535910:16(14725-14748)Online publication date: 15-Aug-2023
    • (2023)A Survey on Intent-Based NetworkingIEEE Communications Surveys & Tutorials10.1109/COMST.2022.321591925:1(625-655)Online publication date: 1-Jan-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media