-
1
-
-
25844499675
-
Autonomic computing
-
DOI 10.1007/s11334-005-0001-5
-
R. Sterritt, "Autonomic computing," Innovations in Systems and Software Engineering, vol. 1, no. 1, pp. 79-88, 2005. (Pubitemid 41683853)
-
(2005)
Innovations in Systems and Software Engineering
, vol.1
, Issue.1
, pp. 79-88
-
-
Sterritt, R.1
-
2
-
-
33845547636
-
A survey of autonomic communications
-
DOI 10.1145/1186778.1186782
-
S. Dobson, S. Denazis, A. Fernández, D. Gaïti, E. Gelenbe, F. Massacci, P. Nixon, F. Saffre, N. Schmidt, and F. Zambonelli, "A survey of autonomic communications," ACM Trans. Autonomous and Adaptive Systems (TAAS), vol. 1, no. 2, pp. 223-259, 2006. (Pubitemid 44927162)
-
(2006)
ACM Transactions on Autonomous and Adaptive Systems
, vol.1
, Issue.2
, pp. 223-259
-
-
Dobson, S.1
Denazis, S.2
Fernandez, A.3
Gaiti, D.4
Gelenbe, E.5
Massacci, F.6
Nixon, P.7
Saffre, F.8
Schmidt, N.9
Zambonelli, F.10
-
3
-
-
25844507044
-
A concise introduction to autonomic computing
-
DOI 10.1016/j.aei.2005.05.012, PII S147403460500042X, Autonomic Computing
-
R. Sterritt, M. Parashar, H. Tianfield, and R. Unland, "A concise introduction to autonomic computing," Advanced Engineering Informatics, vol. 19, no. 3, pp. 181-187, 2005. (Pubitemid 41393957)
-
(2005)
Advanced Engineering Informatics
, vol.19
, Issue.3
, pp. 181-187
-
-
Sterritt, R.1
Parashar, M.2
Tianfield, H.3
Unland, R.4
-
4
-
-
35348872609
-
Towards autonomic management of communications networks
-
DOI 10.1109/MCOM.2007.4342833
-
B. Jennings, S. van der Meer, S. Balasubramaniam, D. Botvich, M.O. Foghlu, W. Donnelly, J. Strassner, "Towards autonomic management of communications networks," IEEE Commun. Mag., vol. 45, pp. 112-121, October 2007. (Pubitemid 47577868)
-
(2007)
IEEE Communications Magazine
, vol.45
, Issue.10
, pp. 112-121
-
-
Jennings, B.1
Van Der Meer, S.2
Balasubramaniam, S.3
Botvich, D.4
Foghlu, M.O.5
Donnelly, W.6
Strassner, J.7
-
8
-
-
33845437618
-
Bio-inspired Policy Based Management (bioPBM) for Autonomic Communication Systems
-
S. Balasubramaniam, K. Barrett, J. Strassner, W. Donnelly, and S. van der Meer, "Bio-inspired Policy Based Management (bioPBM) for Autonomic Communication Systems," in 7th IEEE workshop on Policies for Distributed Systems and Networks, 2006.
-
(2006)
7th IEEE Workshop on Policies for Distributed Systems and Networks
-
-
Balasubramaniam, S.1
Barrett, K.2
Strassner, J.3
Donnelly, W.4
Meer Der S.Van5
-
9
-
-
33749078306
-
Policy-based architecture to enable autonomic communications - A position paper
-
Las Vegas, USA, January
-
S. Davy, K. Barrett, S. Balasubramaniam, S. van der Meer, B. Jennings, and J. Strassner, "Policy-Based Architecture to Enable Autonomic Communications-A Position Paper," Proc. IEEE CCNC, special session on Autonomic Communications, Las Vegas, USA, January, 2006.
-
(2006)
Proc. IEEE CCNC, Special Session on Autonomic Communications
-
-
Davy, S.1
Barrett, K.2
Balasubramaniam, S.3
Meer Der S.Van4
Jennings, B.5
Strassner, J.6
-
10
-
-
13844256260
-
A middleware platform for a biologically inspired network architecture supporting autonomous and adaptive applications
-
DOI 10.1109/JSAC.2004.839388
-
J. Suzuki and T. Suda, "A middleware platform for a biologically inspired network architecture supporting autonomous and adaptive applications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 249-260, 2005. (Pubitemid 40245490)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.2
, pp. 249-260
-
-
Suzuki, J.1
Suda, T.2
-
12
-
-
33751002330
-
A generic architecture for autonomic service and network management
-
DOI 10.1016/j.comcom.2006.06.017, PII S014036640600226X
-
Y. Cheng, R. Farha, M. Kim, A. Leon-Garcia, and J. Won-Ki Hong, "A generic architecture for autonomic service and network management," Computer Communications, vol. 29, no. 18, pp. 3691-3709, 2006. (Pubitemid 44751131)
-
(2006)
Computer Communications
, vol.29
, Issue.18
, pp. 3691-3709
-
-
Cheng, Y.1
Farha, R.2
Kim, M.S.3
Leon-Garcia, A.4
Won-Ki Hong, J.5
-
13
-
-
34248163593
-
Dynamic connectivity management with an intelligent route service control point
-
DOI 10.1145/1162638.1162643, Proceedings of the 2006 SIGCOMM Workshop on Internet Network Management, INM'06
-
J. Van der Merwe, A. Cepleanu, K. D'Souza, B. Freeman, A. Greenberg, D. Knight, R. McMillan, D. Moloney, J. Mulligan, H. Nguyen, et al., "Dynamic connectivity management with an intelligent route service control point," in Proc. The 2006 SIGCOMM workshop on Internet network management, pp. 29-34, ACM New York, NY, USA, 2006. (Pubitemid 46719051)
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Internet Network Management, INM'06
, vol.2006
, pp. 29-34
-
-
Van Der Merwe, J.1
Cepleanu, A.2
D'Souza, K.3
Freeman, B.4
Greenberg, A.5
Knight, D.6
Mcmillan, R.7
Moloney, D.8
Mulligan, J.9
Nguyen, H.10
Nguyen, M.11
Ramarajan, A.12
Saad, S.13
Satterlee, M.14
Spencer, T.15
Toll, D.16
Zelingher, S.17
-
14
-
-
85094324897
-
Tesseract: A 4D network control plane
-
April
-
H. Yan, D. A. Maltz, T. S. E. Ng, H. Gogineni, H. Zhang, and Z. Cai, "Tesseract: A 4D network control plane," in Proc. Networked Systems Design and Implementation, April 2007.
-
(2007)
Proc. Networked Systems Design and Implementation
-
-
Yan, H.1
Maltz, D.A.2
Ng, T.S.E.3
Gogineni, H.4
Zhang, H.5
Cai, Z.6
-
15
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
M. Casado, M. Freedman, J. Pettit, N. McKeown, and S. Shenker, "Ethane: Taking control of the enterprise," in Proc. ACM SIGCOMM, 2007.
-
(2007)
Proc. ACM SIGCOMM
-
-
Casado, M.1
Freedman, M.2
Pettit, J.3
McKeown, N.4
Shenker, S.5
-
22
-
-
0003830728
-
OSI IS-IS intra-domain routing protocol
-
February
-
D. Oran, "OSI IS-IS Intra-domain Routing Protocol." RFC 1142 (Informational), February 1990.
-
(1990)
RFC 1142 (Informational)
-
-
Oran, D.1
-
23
-
-
35048851109
-
RIP version 2
-
November. Updated by RFC 4822
-
G. Malkin, "RIP Version 2." RFC 2453 (Standard), November 1998. Updated by RFC 4822.
-
(1998)
RFC 2453 (Standard)
-
-
Malkin, G.1
-
25
-
-
65249189251
-
Floodless in seattle: A scalable ethernet architecture for large enterprises
-
C. Kim, M. Caesar, and J. Rexford, "Floodless in seattle: A scalable ethernet architecture for large enterprises," in SIGCOMM, 2008.
-
(2008)
SIGCOMM
-
-
Kim, C.1
Caesar, M.2
Rexford, J.3
-
26
-
-
33750317816
-
ROFL: Routing on flat labels
-
DOI 10.1145/1151659.1159955
-
M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, and I. Stoica, "ROFL: routing on flat labels," in Proc. The 2006 conference on Applications, technologies, architectures, and protocols for computer communications, vol. 36, pp. 363-374, ACM New York, NY, USA, 2006. (Pubitemid 44623741)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 363-374
-
-
Caesar, M.1
Condie, T.2
Kannan, J.3
Lakshminarayanan, K.4
Stoica, I.5
Shenker, S.6
-
27
-
-
24344468879
-
Unmanaged internet protocol: Taming the edge network management crisis
-
B. Ford, "Unmanaged internet protocol: taming the edge network management crisis," ACM SIGCOMM Computer Communications Review, vol. 34, no. 1, pp. 93-98, 2004.
-
(2004)
ACM SIGCOMM Computer Communications Review
, vol.34
, Issue.1
, pp. 93-98
-
-
Ford, B.1
-
28
-
-
35348878060
-
-
University of Erlangen, Dept. of Computer Science, Technical Report
-
F. Dressler, "Self-Organization in Ad Hoc Networks: Overview and Classification," University of Erlangen, Dept. of Computer Science, Technical Report, vol. 7, 2006.
-
(2006)
Self-Organization in Ad Hoc Networks: Overview and Classification
, vol.7
-
-
Dressler, F.1
-
29
-
-
21244434788
-
Self-aware networks and QoS
-
DOI 10.1109/JPROC.2004.832952, Evolution of Internet Technologies
-
E. Gelenbe, R. Lent, and A. Nunez, "Self-aware networks and QoS," Proc. IEEE, vol. 92, no. 9, pp. 1478-1489, 2004. (Pubitemid 40890698)
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.9
, pp. 1478-1489
-
-
Gelenbe, E.1
Lent, R.2
Nunez, A.3
-
30
-
-
0000873984
-
AntNet: Distributed stigmergetic control for communications networks
-
G. Di Caro and M. Dorigo, "AntNet: Distributed Stigmergetic Control for Communications Networks," J. Artificial Intelligence Research, vol. 9, no. 2, pp. 317-365, 1998. (Pubitemid 128636207)
-
(1998)
Journal of Artificial Intelligence Research
, vol.9
, pp. 317-365
-
-
Di Caro, G.1
Dorigo, M.2
-
31
-
-
85034572933
-
Energy-efficient communication protocol for wireless microsensor networks
-
W. Heinzelman, A. Chandrakasan, H. Balakrishnan, and C. MIT, "Energy-efficient communication protocol for wireless microsensor networks," in System Sciences, 2000. Proc. The 33rd Annual Hawaii International Conference on, p. 10, 2000.
-
(2000)
System Sciences, 2000. Proc. The 33rd Annual Hawaii International Conference on
, pp. 10
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
Mit, C.4
-
32
-
-
10944266504
-
HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
DOI 10.1109/TMC.2004.41
-
O. Younis and S. Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks," IEEE Trans. Mobile Computing, pp. 366-379, 2004. (Pubitemid 40010934)
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
34
-
-
0001341422
-
DSR: The dynamic source routing protocol for multi-hop wireless Ad Hoc networks
-
D. Johnson, D. Maltz, J. Broch, et al., "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks," Ad Hoc Networking, vol. 5, pp. 139-172, 2001.
-
(2001)
Ad Hoc Networking
, vol.5
, pp. 139-172
-
-
Johnson, D.1
Maltz, D.2
Broch, J.3
-
36
-
-
0012580890
-
Integration of security in network routing protocols
-
B. Kumar, "Integration of security in network routing protocols," ACM SIGSAC Review, vol. 11, no. 2, pp. 18-25, 1993.
-
(1993)
ACM SIGSAC Review
, vol.11
, Issue.2
, pp. 18-25
-
-
Kumar, B.1
-
37
-
-
0030695529
-
Securing distance- vector routing protocols
-
February
-
B. Smith, S. Murthy, and J. Garcia-Luna-Aceves, "Securing Distance- Vector Routing Protocols," in NDSS, February 1997.
-
(1997)
NDSS
-
-
Smith, B.1
Murthy, S.2
Garcia-Luna-Aceves, J.3
-
38
-
-
0033357103
-
Securing ad hoc networks
-
DOI 10.1109/65.806983
-
L. Zhou and Z. Haas, "Securing ad hoc networks," Network, IEEE, vol. 13, no. 6, pp. 24-30, 1999. (Pubitemid 30526484)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
39
-
-
0035789267
-
Secure pebblenets
-
ACM New York, NY, USA
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti, "Secure pebblenets," in Proc. The 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 156-163, ACM New York, NY, USA, 2001.
-
(2001)
Proc. The 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
40
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
41
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
IEEE Computer Society
-
S. Cheung, "An efficient message authentication scheme for link state routing," in 13th Annual Computer Security Applications Conference, pp. 90-98, IEEE Computer Society, 1997.
-
(1997)
13th Annual Computer Security Applications Conference
, pp. 90-98
-
-
Cheung, S.1
-
42
-
-
0030645662
-
Reducing the cost of security in link state routing
-
R. Hauser, A. Przygienda, and G. Tsudik, "Reducing the Cost of Security in Link State Routing," in Symposium on Network and Distributed Systems Security (NDSS 97), pp. 93-99, 1997.
-
(1997)
Symposium on Network and Distributed Systems Security (NDSS 97)
, pp. 93-99
-
-
Hauser, R.1
Przygienda, A.2
Tsudik, G.3
-
43
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
DOI 10.1016/S1570-8705(03)00019-2
-
Y. Hu, D. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003. (Pubitemid 40421401)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
44
-
-
14944363872
-
Routing design in operational networks: A look from the inside
-
August
-
D. Maltz, G. Xie, J. Zhan, H. Zhang, G. Hjalmtysson, and A. Greenberg, "Routing design in operational networks: A look from the inside," in Proc. ACM SIGCOMM, August 2004.
-
(2004)
Proc. ACM SIGCOMM
-
-
Maltz, D.1
Xie, G.2
Zhan, J.3
Zhang, H.4
Hjalmtysson, G.5
Greenberg, A.6
-
45
-
-
84875570984
-
Why do Internet services fail, and what can be done about it?
-
D. Oppenheimer, A. Ganapathi, and D. A. Patterson, "Why do Internet services fail, and what can be done about it?," in Proc. USENIX Symposium on Internet Technologies and Systems, 2003.
-
(2003)
Proc. USENIX Symposium on Internet Technologies and Systems
-
-
Oppenheimer, D.1
Ganapathi, A.2
Patterson, D.A.3
-
47
-
-
84955557456
-
Hiding routing information
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson, "Hiding routing information," in Information Hiding, pp. 137-150, 1996.
-
(1996)
Information Hiding
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
48
-
-
78651073393
-
Efficient memory safety for TinyOS
-
N. Cooprider, W. Archer, E. Eide, D. Gay, and J. Regehr, "Efficient Memory Safety for TinyOS," in Proc. ACM International Conference on Embedded Networked Sensor Systems (Sensys), 2007.
-
(2007)
Proc. ACM International Conference on Embedded Networked Sensor Systems (Sensys)
-
-
Cooprider, N.1
Archer, W.2
Eide, E.3
Gay, D.4
Regehr, J.5
-
50
-
-
84055174213
-
Bounding packet dropping and injection attacks in sensor networks
-
Carnegie Mellon
-
X. Zhang, H. Chan, A. Jain, and A. Perrig, "Bounding packet dropping and injection attacks in sensor networks," Tech. Rep. CMU-Cylab-07-019, Carnegie Mellon, 2007.
-
(2007)
Tech. Rep. CMU-Cylab-07-019
-
-
Zhang, X.1
Chan, H.2
Jain, A.3
Perrig, A.4
-
55
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
December
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar, "An integrated experimental environment for distributed systems and networks," in Proc. Operating Systems Design and Implementation, pp. 255-270, December 2002.
-
(2002)
Proc. Operating Systems Design and Implementation
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
56
-
-
0742276097
-
Inside the Slammer worm
-
July-August
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer worm," IEEE Security and Privacy, vol. 1, pp. 33-39, July-August 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
57
-
-
84861270227
-
-
Technical report, Advanced Network Management Lab, Indiana University, February
-
G. Travis, E. Balas, D. Ripley, and S. Wallace, "Analysis of the "SQL Slammer" worm and its effects on Indiana University and related institutions," Technical report, Advanced Network Management Lab, Indiana University, February 2003.
-
(2003)
Analysis of the "sQL Slammer" Worm and Its Effects on Indiana University and Related Institutions
-
-
Travis, G.1
Balas, E.2
Ripley, D.3
Wallace, S.4
|