skip to main content
article

A survey of autonomic communications

Published:01 December 2006Publication History
Skip Abstract Section

Abstract

Autonomic communications seek to improve the ability of network and services to cope with unpredicted change, including changes in topology, load, task, the physical and logical characteristics of the networks that can be accessed, and so forth. Broad-ranging autonomic solutions require designers to account for a range of end-to-end issues affecting programming models, network and contextual modeling and reasoning, decentralised algorithms, trust acquisition and maintenance---issues whose solutions may draw on approaches and results from a surprisingly broad range of disciplines. We survey the current state of autonomic communications research and identify significant emerging trends and techniques.

References

  1. Abdul-Rahman, A. 1996. The PGP trust model. http://www.cs.ucl.ac.uk/staff/F.AbdulRahman/docs/pgptrust.html.]]Google ScholarGoogle Scholar
  2. Abelson, H., Allen, D., Coore, D., Hanson, C., Homsy, G., Knight, T., Nagpal, R., Rauch, E., Sussman, G., and Weiss, R. 2000. Amorphous computing. Comm. ACM 43, 5 (May), 74--82.]] Google ScholarGoogle Scholar
  3. Ahlswede, R., Cai, N., Li, S.-Y. R., and Yeung, R. W. 2000. Network information flow. IEEE Trans. Inform. Theory 46, 4, 1204--1216.]]Google ScholarGoogle Scholar
  4. Almeida, P. S., Baquero, C., and Fonte, V. 2002. Version stamps---decentralized version vectors. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02). IEEE Computer Society, 544.]] Google ScholarGoogle Scholar
  5. Àlvarez, C., Díaz, J., Petit, J., Rolim, J., and Serna, M. 2004. Efficient and reliable high level communicatioon in deployed sensor networks. In ACM International Workshop on Mobility Management and Wireless Systems (Mobiwac'04). ACM Press, 106--110.]] Google ScholarGoogle Scholar
  6. Andersen, D. G., Balakrishnan, H., Kaashoek, M. F., and Morris, R. 2002. Resilient overlay networks. Comput. Comm. Rev. 32, 1, 66.]] Google ScholarGoogle Scholar
  7. Babaoglu, Ö., Jelasity, M., and Montresor, A. 2005a. Grassroots approach to self-management in large-scale distributed systems. In Unconventional Programming Paradigms. Lecture Notes in Computer Science, vol. 3566. Springer-Verlag, 286--296.]] Google ScholarGoogle Scholar
  8. Babaoglu, Ö., Jelasity, M., Montresor, A., Fetzer, C., Leonardi, S., van Moorsel, A. P. A., and van Steen, M., Eds. 2005b. Self-star properties in complex information systems, conceptual and practical foundations. Lecture Notes in Computer Science, vol. 3460. Springer.]] Google ScholarGoogle Scholar
  9. Babaoglu, Ö., Meling, H., and Montresor, A. 2002. A framework for the development of agent-based peer-to-peer systems. In 22nd International Conference on Distributed Computing Systems. Vienna, Austria. IEEE Computer Socity Press, 15--22.]] Google ScholarGoogle Scholar
  10. Baker, S. and Dobson, S. 2005. Comparing service-oriented and distributed object architectures. In Proceedings of the International Symposium on Distributed Objects and Applications, R. Meersman and Z. T. et al, Eds. Lecture Notes in Computer Science, vol. 3760. Springer Verlag, 631--645.]] Google ScholarGoogle Scholar
  11. Balakrishnan, H., Kaashoek, M. F., Karger, D. R., Morris, R., and Stoica, I. 2003. Looking up data in P2P systems. Comm. ACM 46, 2, 43--48.]] Google ScholarGoogle Scholar
  12. Baldoni, R., Querzoni, L., Patiño-Mart‘nez, M., and Jímenez-Peris, R. 2004. Low-load dynamic hierarchical quorums for P2P networks. Tech. rep. (Dec).]]Google ScholarGoogle Scholar
  13. Bandini, S., Manzoni, S., and Simone, C. 2002. Heterogeneous agents situated in heterogeneous spaces. Appl. Artificial Intellig. 16, 9--10 (Oct.--Dec.), 831--852.]]Google ScholarGoogle Scholar
  14. Becker, M. Y. and Sewell, P. 2004. Cassandra: Flexible trust management, applied to electronic health records. In Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW). 139--154.]] Google ScholarGoogle Scholar
  15. Birman, K. 2005. Reliable Distributed Systems Technologies, Web Services, and Applications. Springer.]] Google ScholarGoogle Scholar
  16. Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A. D. 1999. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Springer-Verlag, 185--210.]] Google ScholarGoogle Scholar
  17. BOINC Project. 2006. Berkeley open infrastructure for network computing. http://boinc.berkeley.edu/.]]Google ScholarGoogle Scholar
  18. Bonabeau, E., Dorigo, M., and Theraulaz, G. 1999. Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press.]] Google ScholarGoogle Scholar
  19. Bonatti, P. and Samarati, P. 2002. A unified framework for regulating access and information release on the web. J. Comput. Security 10, 3, 241--272.]] Google ScholarGoogle Scholar
  20. Bullock, S. and Cliff, D. 2004. Complexity and emergent behaviour in ICT systems. Tech. rep. HPL-2004-187.]]Google ScholarGoogle Scholar
  21. Byers, J., Horn, G., Luby, M., Mitzenmacher, M., and Shaver, W. 2002. FLID/DL: Congestion control for layered multicast. IEEE J. Select. Areas Comm. 20, 8 (Oct.), 1558--1570.]]Google ScholarGoogle Scholar
  22. Byers, J. W., Considine, J., Mitzenmacher, M., and Rost, S. 2004. Informed content delivery across adaptive overlay networks. IEEE/ACM Trans. Netw. 12, 5, 767--780.]] Google ScholarGoogle Scholar
  23. Cabri, G., Leonardi, L., and Zambonelli, F. 2000. Mobile-agent coordination models for internet applications. IEEE Comput. 33, 2.]] Google ScholarGoogle Scholar
  24. Cahill, V., Shand, B., Gray, E., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Bryce, C., di Marzo Serugendo, G., Seigneur, J.-M., Carbone, M., Krukow, K., Jensen, C., Chen, Y., and Nielsen, M. 2003. Using trust for secure collaboration in uncertain environments. IEEE Pervasive Comput. 2, 3 (July), 52--61.]]Google ScholarGoogle Scholar
  25. Carreras, I., Grasso, R., and Szabo, C. A. 2005. Design considerations on the CREATE-NET testbed. In Proceedings of TRIDENTCOM 2005. 44--53.]] Google ScholarGoogle Scholar
  26. Carzaniga, A., Rosenblum, D., and Wolf, A. 2001. Design and evaluation of a wide-area event notification service. ACM Trans. Comput. Syst. 19, 3 (Aug.), 332--383.]] Google ScholarGoogle Scholar
  27. Castro, M., Jones, M., Kermarrec, A., Rowstron, A., Theimer, M., Wang, H., and Wolman, A. 2003. An evaluation of scalable application-level multicast built using peer-to-peer overlays. In IEEE Infocom. San Francisco, CA. IEEE Computer Society Press.]]Google ScholarGoogle Scholar
  28. Chadwick, D., Otenko, A., and Ball, E. 2003. Role-based access control with X.509 attribute certificates. IEEE Internet Comput. 7, 2 (March/April), 62--69.]] Google ScholarGoogle Scholar
  29. Chelius, G., Jelger, C., Fleury, E., and Noel, T. 2005. IPv6 addressing scheme and self-configuration for multi-hops wireless ad hoc network. In Proceedings of the International Conference on Information Networking (ICOIN'05). Jeju, Korea.]] Google ScholarGoogle Scholar
  30. Chess, D. M., Palmer, C. C., and White, S. R. 2003. Security in an autonomic computing environment. IBM Syst. J. 42, 1, 107--118.]] Google ScholarGoogle Scholar
  31. Chlebus, B. S., Gasieniec, L., Kowalski, D. R., and Radzik, T. 2005. On the wake-up problem in radio networks. In ICALP, L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, Eds. Lecture Notes in Computer Science, vol. 3580. Springer, 347--359.]] Google ScholarGoogle Scholar
  32. Chockler, G., Keidar, I., and Vitenberg, R. 2001. Group communication specifications: A comprehensive study. ACM Comput. Surv. 33, 4, 427--469.]] Google ScholarGoogle Scholar
  33. Cholvi, V., Laderas, V., López, L., and Fernández, A. 2005. Self-adapting network topologies in congested scenarios. Physical Rev. 71, 3.]]Google ScholarGoogle Scholar
  34. Chrobak, M., Gasieniec, L., and Rytter, W. 2004. A randomized algorithm for gossiping in radio networks. Networks 43, 2, 119--124.]] Google ScholarGoogle Scholar
  35. Clark, D., Partridge, C., Ramming, J., and Wroclawski, J. 2003. A knowledge plane for the internet. In Proceedings of ACM SIGCOMM.]] Google ScholarGoogle Scholar
  36. Cohen, B. 2003. Incentives build robustness in bittorrent. http://www.bittorrent.com/bittorrentecon.pdf.]]Google ScholarGoogle Scholar
  37. Costa, D. and Hertz, A. 1997. Ants can colour graphs. J. Operation. Resear. Soc. 48, 295--305.]]Google ScholarGoogle Scholar
  38. Costa, P. and Picco, G. 2005 (to appear). Semi-probabilistic content-based publish-subscribe. In IEEE International Conference on Distributed Computing Systems (ICDCS), Columbus, OH. IEEE Computer Society Press.]] Google ScholarGoogle Scholar
  39. Coutaz, J., Crowley, J., Dobson, S., and Garlan, D. 2005. Context is key. Comm. ACM 48, 3 (March), 49--53.]] Google ScholarGoogle Scholar
  40. Curino, C., Giani, M., Giorgetta, M., Giusti, A., Murphy, A., and Picco, G. 2005. Tinylime: Bridging mobile and sensor networks through middleware. In IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai Island, Hawaii. IEEE Computer Society Press.]] Google ScholarGoogle Scholar
  41. de Bruijn, J., Lausen, H., Polleres, A., and Fensel, D. 2005. The WSML rule languages for the semantic web. In Proceedings of the W3C Workshop on Rule Languages for Interoperability. Washington, DC.]]Google ScholarGoogle Scholar
  42. de Castro, M. F., Merghem, L., Gaïti, D., and Mhamed, A. 2004. The basis for an adaptive IP QoS management. IEICE Trans. Comm. E87-B, 3 (March), 564--572.]]Google ScholarGoogle Scholar
  43. de Vergara, J., Villagré, V., and Berrocal, J. 2004. Applying the Web Ontology Language to management information definitions. IEEE Comm. Mag. 42, 7 (July), 68--74.]]Google ScholarGoogle Scholar
  44. Défago, X., Schiper, A., and Urbán, P. 2004. Total order broadcast and multicast algorithms: Taxonomy and survey. ACM Comput. Sur. 36, 4, 372--421.]] Google ScholarGoogle Scholar
  45. Dobson, S. 2005. Putting meaning into the network: Some semantic issues for the design of autonomic communications systems. In Proceedings of the 1st IFIP Workshop on Autonomic Communications (Berlin, Germany), M. Smirnov, Ed. Lecture Notes in Computer Science, vol. 3457. Springer Verlag.]] Google ScholarGoogle Scholar
  46. Dobson, S. and Nixon, P. 2004. More principled design of pervasive computing systems. In Human Computer Interaction and Interactive Systems, R. Bastide and J. Roth, Eds. Lecture Notes in Computer Science, vol. 3425. Springer Verlag.]]Google ScholarGoogle Scholar
  47. Dorigo, M. and Gambardella, L. M. 1997. Ant colonies for the travelling salesman problem. Biosystems 43, 73--81.]]Google ScholarGoogle Scholar
  48. Driver, C. and Clarke, S. 2004. Context-aware trails. IEEE Comput. 37, 8 (Aug.), 97--99.]] Google ScholarGoogle Scholar
  49. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. 1999. SPKI certificate theory. IETF RFC 2693.]] Google ScholarGoogle Scholar
  50. English, C., Terzis, S., Wagealla, W., Lowe, H., Nixon, P., and McGettrick, A. 2003a. Trust dynamics for collaborative global computing. In Proceedings of 12th IEEE International Workshop on Enabling Technologies (WETICE'03), Linz, Austria. IEEE Computer Society. 283--288.]] Google ScholarGoogle Scholar
  51. English, C., Wagealla, W., Nixon, P., Terzis, S., Lowe, H., and McGettrick, A. 2003b. Trusting collaboration in global computing systems. In Proceedings of 1st International Conference on Trust Management (iTrust'03), Heraklion, Crete, Greece. Lecture Notes in Computer Science, vol. 2692. Springer, 136--149.]]Google ScholarGoogle Scholar
  52. Esponda, F., Forrest, S., and Helman, P. 2004. A formal framework for positive and negative detection. IEEE Trans. Syst., Man, Cybernet. 34, 1 (Feb.).]]Google ScholarGoogle Scholar
  53. Eugster, P., Guerraoui, R., Kermarrec, A., and Massoulie, L. 2004. Epidemic information dissemination in distributed systems. IEEE Comput. 37, 5, 60--67.]]Google ScholarGoogle Scholar
  54. Eugster, P., Guerraoui, R., and Kouznetsov, P. 2004. D-reliable broadcast: A probabilistic measure of broadcast reliability. In IEEE International Conference on Distributed Computing Systems (ICDCS). Tokio, Japan.]] Google ScholarGoogle Scholar
  55. Eugster, P. T., Felber, P., Guerraoui, R., and Kermarrec, A.-M. 2003. The many faces of publish/subscribe. ACM Comput. Surv. 35, 2 (June), 114--131.]] Google ScholarGoogle Scholar
  56. Eugster, P. T., Guerraoui, R., Handurukande, S. B., Kouznetsov, P., and Kermarrec, A.-M. 2003. Lightweight probabilistic broadcast. ACM Trans. Comput. Syst. 21, 4, 341--374.]] Google ScholarGoogle Scholar
  57. Fernández, A., Georgiou, C., López, L., and Santos, A. 2005. Reliably executing tasks in the presence of malicious processors. In DISC, P. Fraigniaud, Ed. Lecture Notes in Computer Science, vol. 3724. Springer, 490--492.]] Google ScholarGoogle Scholar
  58. Fernández, A., Georgiou, C., López, L., and Santos, A. 2006. Reliably executing tasks in the presence of untrusted entities. In Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06). Leeds, UK.]] Google ScholarGoogle Scholar
  59. G. Picco, G. Cugola, A. M. 2003. Efficient content-based event dispatching in presence of topological reconfigurations. In Proceedings of the IEEE International Conference on Distributed Computing Systems, Providence, RI. IEEE Computer Society Press.]] Google ScholarGoogle Scholar
  60. Garg, A., Battiti, R., and Costanzi, G. 2004. Dynamic self-management of autonomic systems: The reputation, quality and credibility (RQC) scheme. In Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication (WAC). Springer-Verlag, Berlin, Germany.]]Google ScholarGoogle Scholar
  61. Gelenbe, E. 2004a. Cognitive packet network, U.S. Patent 6,804,201.]]Google ScholarGoogle Scholar
  62. Gelenbe, E. 2004b. Cognitive routing in packet networks. In ICONIP, N. R. Pal, N. Kasabov, R. K. Mudi, S. Pal, and S. K. Parui, Eds. Lecture Notes in Computer Science, vol. 3316. Springer, 625--632.]]Google ScholarGoogle Scholar
  63. Gelenbe, E. 2004c. Sensible decisions based on QoS. Comput. Manage. Science 1, 1, 1--14.]]Google ScholarGoogle Scholar
  64. Gelenbe, E., Gellman, M., Lent, R., Liu, P., and Su, P. 2004. Autonomous smart routing for network QoS. In Proceedings of the First International Conference on Autonomic Computing. IEEE Computer Society, 232--239.]] Google ScholarGoogle Scholar
  65. Gelenbe, E. and Lent, R. 2004. Power aware ad hoc cognitive packet networks. Ad Hoc Netw. J. 2, 3, 205--216.]]Google ScholarGoogle Scholar
  66. Gelenbe, E., Lent, R., and Nunez, A. 2004. Self-aware networks and quality of service. Proceedings of the IEEE 92, 9, 1479--1490.]]Google ScholarGoogle Scholar
  67. Gelenbe, E., Lent, R., and Xu, Z. 2001. Design and performance of cognitive packet networks. Perform. Evaluat. 46, 155--176.]] Google ScholarGoogle Scholar
  68. Gelenbe, E. and Nunez, A. 2003. Adaptive web service for QoS improvement. In Proceedings of IADIS International WWW/Internet Conference. Algarve, Portugal.]]Google ScholarGoogle Scholar
  69. Gkantsidis, C. and Rodriguez, P. 2005. Network coding for large scale content distribution. In IEEE/INFOCOM 2005. Miami, FL.]]Google ScholarGoogle Scholar
  70. Gonzalez, A. and Ahlers, R. 1999. Context-based representation of intelligent behaviour in training simulations. Trans. Society Comput. Simulat. Int. 15, 4 (March).]] Google ScholarGoogle Scholar
  71. Henrickcon, K., Indulska, J., and Rakotonirainy, A. 2002. Modeling context information in pervasive computing systems. In Proceedings of the 1st International Conference on Pervasive Computing Systems, F. Mattern and M. Naghshineh, Eds. Lecture Notes in Computer Science, vol. 2414. Springer Verlag.]] Google ScholarGoogle Scholar
  72. Hofmeyr, S. A. and Forrest, S. 2000. Architecture for an artificial immune system. Evolution. Computat. 8, 4, 443--473.]] Google ScholarGoogle Scholar
  73. IBM, Microsoft, BEA, RSA Security and VeriSign. 2003. Web Services Federation Language (WS-Federation). IBM, Microsoft, BEA, RSA Security and VeriSign. http://www-106.ibm.com/developerworks/webservices/library/ws-fed.]]Google ScholarGoogle Scholar
  74. Ionescu, B., Ionescu, M., Veres, S., Ionescu, D., Cuervo, F., and Luiken-Miller, M. 2005. A testbed and research network for next generation services over next generation networks. In Proceedings of TRIDENTCOM 2005. 21--31.]] Google ScholarGoogle Scholar
  75. ITU-T. 2001. The directory: Public-key and attribute certificate frameworks. ITU-T Recommendation X.509:2000(E) | ISO/IEC 9594-8:2001(E).]]Google ScholarGoogle Scholar
  76. Jelasity, M., Kowalczyk, W., and van Steen, M. November 2003. Newscast computing. Tech. rep., Vrije Universiteit IR-CS-006.]]Google ScholarGoogle Scholar
  77. Jensen, O. H. and Milner, R. 2003. Bigraphs and mobile processes. Tech. rep. UCAM-CL-TR-570, University of Cambridge Computer Laboratory.]]Google ScholarGoogle Scholar
  78. Jiménez-Peris, R., Patiño-Martínez, M., and Alonso, G. 2002. An algorithm for non-intrusive, parallel recovery of replicated data and its correctness. In Proceedings of 21st IEEE Int. Conference on Reliable Distributed Systems (SRDS'02). Osaka, Japan, 150--159.]] Google ScholarGoogle Scholar
  79. Karabulut, Y. 2003. Implementation of an agent-oriented trust management infrastructure based on a hybrid PKI model. In iTrust, P. Nixon and S. Terzis, eds. Lecture Notes in Computer Science, vol. 2692. Springer, 318--331.]]Google ScholarGoogle Scholar
  80. Kennedy, M. P., Rovatti, R., and Setti, G. 2000. Chaotic Electronics in Telecommunications. CRC Press.]] Google ScholarGoogle Scholar
  81. Kephart, J. and Chess, D. 2003. The vision of autonomic computing. IEEE Comput. 36, 1, 41--50.]] Google ScholarGoogle Scholar
  82. Koshutanski, H. and Massacci, F. 2004a. E pluribus unum: Deduction, abduction and induction, the reasoning services for access control in autonomic communication. In Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication (WAC). Springer-Verlag, Berlin, Germany.]]Google ScholarGoogle Scholar
  83. Koshutanski, H. and Massacci, F. 2004b. Interactive access control for Web Services. In Proceedings of the 19th IFIP Information Security Conference (SEC'04), Toulouse, France. Kluwer Press, 151--166.]]Google ScholarGoogle Scholar
  84. Koshutanski, H. and Massacci, F. 2004c. An interactive trust management and negotiation scheme. In Proceedings of the 2nd International Workshop on Formal Aspects in Security and Trust (FAST), Toulouse, France. Kluwer Press, 139--152.]]Google ScholarGoogle Scholar
  85. Laoutaris, N., Panagakis, A., and Stavrakakis, I. 2004a. Content distribution through autonomic content and storage management. In WAC 2004, M. Smirnov, Ed. Lecture Notes in Computer Science, vol. 3457. Springer, Berlin, Germany, 69--78.]]Google ScholarGoogle Scholar
  86. Laoutaris, N., Panagakis, A., and Stavrakakis, I. 2004b. Content distribution through autonomic content and storage management. In WAC 2004.]]Google ScholarGoogle Scholar
  87. Laoutaris, N., Telelis, O., Zissimopoulos, V., and Stavrakakis, I. 2004. Local utility aware content replication. In IFIP Networking 2005.]] Google ScholarGoogle Scholar
  88. Laoutaris, N., Telelis, O., Zissimopoulos, V., and Stavrakakis, I. 2005. Distributed selfish replication. IEEE Trans. Paral. Distrib. Syst. {under submission}.]] Google ScholarGoogle Scholar
  89. Lassila, O. and Swick, R. 1999. Resource Description Framework model and syntax specification. Tech. rep., World Wide Web Consortium.]]Google ScholarGoogle Scholar
  90. Leff, A., Wolf, J., and Yu, P. 1993. Replication algorithms in a remote caching architecture. IEEE Trans. Paral. Distrib. Syst. 4, 11 (Nov.), 1185--1204.]] Google ScholarGoogle Scholar
  91. Lewis, D., Feeney, K., Carey, K., Tiropanis, T., and Courtenage, S. 2005. Semantic-based policy engineering for autonomic systems. In Proceedings of 1st IFIP WG6.6 International Workshop on Autonomic Communication, M. Smirnow, Ed. Springer Verlag.]] Google ScholarGoogle Scholar
  92. Li, N., Mitchell, J. C., and Winsborough, W. H. 2002. Design of a role-based trust-management framework. In Proceedings of IEEE Symposium on Security and Privacy, 2002. S&P. IEEE Press.]] Google ScholarGoogle Scholar
  93. López, L., Fernández, A., and Cholvi, V. 2005. A game theoretic analysis of protocols based on fountain codes. In The 10th IEEE Symposium on Computers and Communications (ISCC'05). La Manga del Mar Menor, Spain.]] Google ScholarGoogle Scholar
  94. Luby, M. 2002. LT codes. In FOCS. IEEE Computer Society, 271.]] Google ScholarGoogle Scholar
  95. Luby, M. 2003. Fast, reliable data transport. In USENIX Symposium on Internet Technologies and Systems.]]Google ScholarGoogle Scholar
  96. Lücking, T., Mavronicolas, M., Monien, B., and Rode, M. 2004. A new model for selfish routing. In Proceedings of STACS 2004. 547--558.]]Google ScholarGoogle Scholar
  97. Madueño, M. and Vidal, J. 2005. Joint physical-MAC layer design of the broadcast channel protocol in adhoc networks. IEEE J. Select. Areas in Comm. (Special Issue on Ad-Hoc Networking).]]Google ScholarGoogle Scholar
  98. Magedanz, T., Witaszek, D., and Knuettel, K. 2005. The IMS playground at FOKUS---an open test-bed for next generation network multimedia services. In Proceedings of TRIDENTCOM 2005.]] Google ScholarGoogle Scholar
  99. Mamei, M. and Zambonelli, F. 2004. Programming pervasive and mobile computing applications with the TOTA middleware. In IEEE International Conference On Pervasive Computing (Percom) Orlando, FL. IEEE Computer Socity Press.]] Google ScholarGoogle Scholar
  100. Mamei, M., Zambonelli, F., and Leonardi, L. 2004. Co-fields: A physically inspired approach to distributed motion coordination. IEEE Pervasive Comput. 3, 2, 52--61.]] Google ScholarGoogle Scholar
  101. Mazzini, G., Rovatti, R., and Setti, G. 2000. A tensor approach to higher order expectations of chaotic trajectories---part II: Application to chaos-based DS-CDMA in multipath environements. IEEE Trans. Circuits and Syst.---Part I 47, 1584--1596.]]Google ScholarGoogle Scholar
  102. Mazzini, G., Rovatti, R., and Setti, G. 2001. Chaos-based asynchronous DS-CDMA systems and enhanced rake receivers: Measuring the improvements. IEEE Trans. Circuits Syst.---Part I 48, 12, 1445--1453.]]Google ScholarGoogle Scholar
  103. Mazzini, G., Rovatti, R., and Setti, G. 1999. Interference minimization by auto-correlation shaping in asynchronous DS-CDMA systems: Chaos-based spreading is nearly optimal. IEEE Electronics Lett. 35, 13 (June), 1054--1055.]]Google ScholarGoogle Scholar
  104. Mazzini, G., Setti, G., and Rovatti, R. 1997. Chaotic complex spreading sequences for asynchronous DS-CDMA---Part I: System modeling and results. IEEE Trans. Circuits Syst.---Part I 44, 10, 937--947.]]Google ScholarGoogle Scholar
  105. McGibney, J., Schmidt, N., and Patel, A. 2005. A service-centric model for intrusion detection in next-generation networks. Comput. Stand. Interf. 27, 5 (June), 513--520.]] Google ScholarGoogle Scholar
  106. Menezes, R. and Tolksdorf, R. 2003. A new approach to scalable linda-systems based on swarms. ACM Symposium on Applied Computer, Orlando, FL. ACM Press, 375--379.]] Google ScholarGoogle Scholar
  107. Merghem, L., Gaïti, D., and Pujolle, G. 2003. On using multi-agent systems in end to end adaptive monitoring. In Proceedings of E2EMON (End to End MONitoring) Workshop, in Conjunction with MMNS2003 (Belfast, UK). Lecture Notes in Computer Science, vol. 2839. Springer Verlag, 422--435.]]Google ScholarGoogle Scholar
  108. Merloti, P. E. 2004. Optimization algorithms inspired by biological ants and swarm behavior.]]Google ScholarGoogle Scholar
  109. Mestre, X., Fonollosa, J. R., and Pagès, A. 2003. Capacity of MIMO channels: Asymptotic evaluation under correlated fading. IEEE J. Select. Areas Comm. (Special Issue on MIMO Systems and Applications) 21, 5 (June).]]Google ScholarGoogle Scholar
  110. Michiardi, P. and Molva, R. 2002. Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of Communication and Multimedia Security Conference.]] Google ScholarGoogle Scholar
  111. Milan-Franco, J. M., Jiménez-Peris, R., Patiño-Martínez, M., and Kemme, B. 2004. Adaptive distributed middleware for database replication. In Proceedings of 5th ACM/IFIP/USENIX Middleware Conference. Toronto, Canada, 175--194.]] Google ScholarGoogle Scholar
  112. Morató, D., Magana, E., Izal, M., Aracil, J., Naranjo, F. J., Astiz, P., Alonso, U., Csabai, I., Hága, P., Simon, G., Steger, J., and Vattay, G. 2005. The European traffic observatory measurement infrastructure (ETOMIC): A testbed for universal active and passive measurements. In Proceedings of TRIDENTCOM 2005.]] Google ScholarGoogle Scholar
  113. Nakrani, S. and Tovey, C. 2004. On honey bees and dynamic server allocation in internet hosting centers. Adaptive Behavior 12, 3--4, 223--240.]] Google ScholarGoogle Scholar
  114. OASIS Security Services TC. 2004. Security Assertion Markup Language (SAML). http://www.oasis-open.org/committees/security.]]Google ScholarGoogle Scholar
  115. Omicini, A., Ricci, A., Viroli, M., Castelfranchi, C., and Tummolini, L. 2004. Coordination artifacts: Environment-based coordination for intelligent agents. International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). New York (NY).]] Google ScholarGoogle Scholar
  116. O'Neill, E., Klepal, M., Lewis, D., O'Donnell, T., O'Sullivan, D., and Pesch, D. 2005. A testbed for evaluating human interaction with ubiquitous computing environments. In Proceedings of TRIDENTCOM 2005.]] Google ScholarGoogle Scholar
  117. O'Neill, E., Lewis, D., McGlinn, K., and Dobson, S. 2006. Rapid user-centred evaluation for context-aware systems. In Proceedings of the 13th International Workshop on Design, Specification and Verification of Interactive Systems (DSVIS'06), G. Doherty and A. Blandford, Eds. Lecture Notes in Computer Science, Springer Verlag.]] Google ScholarGoogle Scholar
  118. Oreizy, P., Gorlick, M., Taylor, R., Heimbigner, D., Johnson, G., Medvidovic, N., Quilliei, A., Rosenblum, D., and Wolf, A. 1999. An architecture-based approach to self-adaptive software. IEEE Intel. Syst. 14, 3 (May/June), 54--62.]] Google ScholarGoogle Scholar
  119. Park, J. S. and Sandhu, R. 1999. RBAC on the Web by smart certificates. In Proceedings of the 4th ACM Workshop on Role-Based Access Control. ACM Press, 1--9.]] Google ScholarGoogle Scholar
  120. Picco, G., Murphy, A., and Roman, G. 2001. Lime: A middleware for logical and physical mobility. In Proceedings of the IEEE International Conference on Distributed Computing Systems, Providence, RI. IEEE Computer Society Press, 524--536.]] Google ScholarGoogle Scholar
  121. Pujolle, G., Chaouchi, H., and Gaïti, D. 2004. Beyond TCP/IP: A context-aware architecture. In Proceedings of NetCon 2004, Palma de Mallorca. Kluwer Academic Publishers, 337--347.]]Google ScholarGoogle Scholar
  122. Qiu, D. and Srikant, R. 2004. Modeling and performance analysis of bittorrent-like peer-to-peer networks. In SIGCOMM, R. Yavatkar, E. W. Zegura, and J. Rexford, Eds. ACM, 367--378.]] Google ScholarGoogle Scholar
  123. Quitadamo, R. and Zambonelli, F. 2007. Autonomic communication services: a new challenge for software agents. J. Autonom. Agents Multiagent Syst.]] Google ScholarGoogle Scholar
  124. Rao, A., Papadimitriou, C., Ratnasamy, S., Shenker, S., and Stoica, I. 2003. Geographic routing without location information. In ACM Mobicom. San Diego, CA. ACM Press.]] Google ScholarGoogle Scholar
  125. Ratsanamy, S. and al. 2002. Ght: A geographic hash table for data-centric storage. In 1st ACM International Workshop on Wireless Sensor Networks and Applications. ACM Press, Atlanta, Georgia, USA.]] Google ScholarGoogle Scholar
  126. Ratsanamy, S., Francis, P., Handley, M., and Karp, R. 2001. A scalable content-addressable network. In ACM SIGCOMM Conference, San Diego, CA. ACM Press.]] Google ScholarGoogle Scholar
  127. Rodero, L., López, L., Fernández, A., and Cholvi, V. 2006. Dante: A self-adapting peer-to-peer system. In Proceedings of the 5th International Workshop on Agents and Peer-to-Peer Computing (AP2PC06), Hakodate, Japan. Lecture Notes in Computer Science. Springer.]]Google ScholarGoogle Scholar
  128. Roman, G., Julien, C., and Huang, Q. 2002. Network abstractions for context-aware mobile computing. 24th International Conference on Software Engineering, Orlando, FL. ACM Press.]] Google ScholarGoogle Scholar
  129. Rovatti, R., Mazzini, G., and Setti, G. 2000. A tensor approach to higher order expectations of chaotic trajectories---Part I: General theory and specialization to piecewise affine Markov systems. IEEE Trans. Circuits Syst.---Part I 47, 1571--1583.]]Google ScholarGoogle Scholar
  130. Rovatti, R., Mazzini, G., and Setti, G. 2001. Enhanced rake receivers for chaos-based DS-CDMA. IEEE Trans. Circuits Syst.---Part I 48, 818--829.]]Google ScholarGoogle Scholar
  131. Rovatti, R., Mazzini, G., and Setti, G. 2004a. On the ultimate limits of chaos-based asynchronous DS-CDMA---Part I: Basic definitions and results. IEEE Trans. Circuits Syst.---Part I 52, 7, 1336--1347.]]Google ScholarGoogle Scholar
  132. Rovatti, R., Mazzini, G., and Setti, G. 2004b. On the ultimate limits of chaos-based asynchronous DS-CDMA---Part II: Analytical results and asymptotics. IEEE Trans. Circuits Syst.---Part I 52, 7, 1348--1364.]]Google ScholarGoogle Scholar
  133. Rovatti, R., Setti, G., and Mazzini, G. 1998. Chaotic complex spreading sequences for asynchronous DS-CDMA---Part II: Some theoretical performance bounds. IEEE Trans. Circuits Syst.---Part I 45, 4, 496--506.]]Google ScholarGoogle Scholar
  134. Rowstron, A. 1999. Mobile coordination: Providing fault tolerance in tuple space based coordination language. Coordination Languages and Models (Coordination'99), P. Ciancarini and P. Wolf, Eds. Lecture Notes in Computer Science, vol. 1594. Springer-Verlag, 196--210.]] Google ScholarGoogle Scholar
  135. Rowstron, A. and Druschel, P. 2001. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. 18th IFIP/ACM Conference on Distributed Systems Platforms. Heidelberg, Germany. ACM Press.]] Google ScholarGoogle Scholar
  136. Saffre, F. and Blok, H. R. 2005. SelfService---A theoretical protocol for autonomic distribution of services in P2P communities. In Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05). 528--534.]] Google ScholarGoogle Scholar
  137. Seamons, K. and Winsborough, W. 2002. Automated trust negotiation. Tech. rep., US Patent and Trademark Office. IBM Corporation, patent application filed March 7, 2000.]] Google ScholarGoogle Scholar
  138. Setti, G., Mazzini, G., Rovatti, R., and Callegari, S. 2002. Statistical modeling and design of discrete time chaotic processes: Basic finite-dimensional tools and applications. In Proceedings of the IEEE. Vol. 90. 662--690.]]Google ScholarGoogle Scholar
  139. Setti, G., Rovatti, R., and Mazzini, G. 2004. Performance of chaos-based asynchronous DS-CDMA with different pulse shapes. IEEE Comm. Lett. 8, 7 (July), 416--418.]]Google ScholarGoogle Scholar
  140. Shackleton, M., Saffre, F., Tateson, R., Bonsma, E., and Roadknight, C. 2004. Autonomic computing for pervasive ICT---A whole system perspective. BT Tech. J. 22, 3, 191--199.]] Google ScholarGoogle Scholar
  141. Siris, V. A. 2002. Resource control for elastic traffic in CDMA networks. In Proceedings of 8th ACM Conference on Mobile Computing and Networking (MOBICOM'02). Atlanta, GA.]] Google ScholarGoogle Scholar
  142. Siris, V. A., Briscoe, B., and Songhurst, D. 2002. Economic models for resource control in wireless networks. In Proceedings of IEEE Int. Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC'02).]]Google ScholarGoogle Scholar
  143. Siris, V. A. and Courcoubetis, C. 2004. Resource control for loss-sensitive traffic in CDMA networks. In Proceedings of 23rd Conference of the IEEE Communications Society (INFOCOM). Hong Kong.]]Google ScholarGoogle Scholar
  144. Spinglass Project. 2005. Spinglass: Adaptive probabilistic tools for advanced networks. http://www.cs.cornell.edu/Info/Projects/Spinglass/.]]Google ScholarGoogle Scholar
  145. Sterritt, R., Mulvenna, M., and Lawrynowicz, A. 2005. A role for contextualised knowledge in autonomic communications. In Proceedings of 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communications, M. Smirnow, Ed. Springer Verlag.]]Google ScholarGoogle Scholar
  146. Stoy, K. and Nagpal, R. 2004a. Self-reconfiguration using directed growth. In 7th International Symposium on Distributed Autonomous Robotic Systems (DARS). Toulouse, France. ACM Press, 149--160.]]Google ScholarGoogle Scholar
  147. Stoy, K. and Nagpal, R. 2004b. Self-repair through scale independent self-reconfiguration. In Proceedings of IEEE/RSJ International Conference on Robots and Systems (IROS), Sendai, Japan. IEEE Press.]]Google ScholarGoogle Scholar
  148. Strang, T., Linnhoff-Popien, C., and Frank, K. 2003. CoOL: A context ontology language to enable contextual interoperability. In Proceedings of 4th IFIP International Conferece on Distributed Applications and Interoperable Systems (DAIS'03).]]Google ScholarGoogle Scholar
  149. Takai, M., Bagrodia, R., Gerla, M., Daneshrad, B., Fitz, M. P., Srivastava, M. B., Belding-Royer, E. M., Krishnamurthy, S. V., Molle, M., Mohapatra, P., Rao, R. R., Mitra, U., Shen, C.-C., and Evans, J. B. 2005. Scalable testbed for next generation wireless networking technologies. In Proceedings of TRIDENTCOM 2005. 162--171.]] Google ScholarGoogle Scholar
  150. Tanenbaum, A. 2004. Distributed Systems, 2nd ed. Addison Wesley.]]Google ScholarGoogle Scholar
  151. Terzis, S., Wagealla, W., English, C., and Nixon, P. 2004. Trust lifecycle management in a global computing environment. In Global Computing, IST/FET International Workshop GC 2004, Rovereto, Italy. 9--12 (March), C. Priami and P. Quaglia, Eds. Lecture Notes in Computer Science, vol. 3267. 291--313.]]Google ScholarGoogle Scholar
  152. Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., and Essiari, A. 1999. Certificate-based access control for widely distributed resources. In Proceedings of 8th USENIX Security Symposium (Security'99) (23--26). 215--228.]] Google ScholarGoogle Scholar
  153. Trianni, V., Labella, T., and Dorigo, M. 2004. Evolution of direct communication for a swarm-bot performing hole avoidance. In ANTS Workshop. Brussels, Belgium.]]Google ScholarGoogle Scholar
  154. Tsarampopoulos, N., Kalavros, I., and Lalis, S. 2005. A low-cost and simple to deploy peer-to-peer wireless network based on open source linux routers. In Proceedings of TRIDENTCOM 2005.]] Google ScholarGoogle Scholar
  155. Tschudin, C., Gunningberg, P., Lundgren, H., and Nordstrom, E. 2005. Lessons from experimental MANET research. Ad Hoc Netw. J. 3, 2 (March).]] Google ScholarGoogle Scholar
  156. Tschudin, C. and Yamamoto, L. 2004. A metabolic approach to protocol resilience. In Proceedings of the 1st IFIP Workshop on Autonomic Communication (WAC'04). Berlin, Germany.]]Google ScholarGoogle Scholar
  157. Tschudin, C. F., Gunningberg, P., Lundgren, H., and Nordström, E. 2005. Lessons from experimental MANET research. Ad Hoc Netw. 3, 2 (March), 221--233.]] Google ScholarGoogle Scholar
  158. Undercoffer, J., Joshi, A., and Pinkston, J. 2003. Modeling computer attacks: An ontology for intrusion detection. In Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID'03). Pittsburgh, PA. Lecture Notes in Computer Science, vol. 2820, 113--135.]]Google ScholarGoogle Scholar
  159. Vidales, P., Mapp, G., Stajano, F., Crowcroft, J., and Bernardos, C. 2005. A practical approach for overlay systems: Deployment of overlay networks. In Proceedings of TRIDENTCOM 2005.]] Google ScholarGoogle Scholar
  160. von Rickenbach, P., Schmid, S., Wattenhofer, R., and Zollinger, A. 2005. A robust interference model for wireless ad-hoc networks. In IPDPS. IEEE Computer Society.]] Google ScholarGoogle Scholar
  161. Weiser, M. 1991. The computer for the 21st century. Scientific American 265, 3, 94--104.]]Google ScholarGoogle Scholar
  162. Weyns, D., Parunak, H., Michel, F., Holvoet, T., and Ferber, J. 2005. Environments for Multiagent Systems, State-of-the-art and Research Challenges. Lecture Notes in Artificial Intelligence, vol. 3374. Springer Verlag, Berlin, Germany.]] Google ScholarGoogle Scholar
  163. Winsborough, W. and Jacobs, J. 2003. Automated trust negotiation in attribute-based access control. In Proceedings of DARPA Information Survivability Conference and Exposition. Vol. 2. IEEE Press, 252--257.]]Google ScholarGoogle Scholar
  164. Yamazaki, T. 2005. Ubiquitous home: Real-life testbed for home context-aware services. In Proceedings of TRIDENTCOM 2005. 54--69.]] Google ScholarGoogle Scholar
  165. Yao, W. 2003. Fidelis: A policy-driven trust management framework. In 1st International Conference on Trust Management (iTrust). Lecture Notes in Computer Science, vol. 2692. Springer, 301--317.]]Google ScholarGoogle Scholar
  166. Yu, T., Winslett, M., and Seamons, K. E. 2003. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inform. Syst. Secur. (TISSEC) 6, 1, 1--42.]] Google ScholarGoogle Scholar
  167. Zambonelli, F. and Mamei, M. 2004. Spatial computing: An emerging paradigm for autonomic computing and communication. In International Workshop on Autonomic Communication. Berlin, Germany.]]Google ScholarGoogle Scholar

Index Terms

  1. A survey of autonomic communications

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Autonomous and Adaptive Systems
      ACM Transactions on Autonomous and Adaptive Systems  Volume 1, Issue 2
      December 2006
      147 pages
      ISSN:1556-4665
      EISSN:1556-4703
      DOI:10.1145/1186778
      Issue’s Table of Contents

      Copyright © 2006 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 December 2006
      Published in taas Volume 1, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader