


default search action
ACM Transactions on Autonomous and Adaptive Systems, Volume 3
Volume 3, Number 1, March 2008
- Bhuvan Urgaonkar, Prashant J. Shenoy

, Abhishek Chandra, Pawan Goyal, Timothy Wood:
Agile dynamic provisioning of multi-tier Internet applications. 1:1-1:39 - Vincent Hilaire

, Abder Koukam
, Sebastian Rodriguez
:
An adaptative agent architecture for holonic multi-agent systems. 2:1-2:24 - Chien-Chung Shen, Ke Li, Chaiporn Jaikaeo, Vinay Sridhara:

Ant-based distributed constrained steiner tree algorithm for jointly conserving energy and bounding delay in ad hoc multicast routing. 3:1-3:27 - Erol Gelenbe, Georgia Sakellari

, Maurizio D'Arienzo
:
Admission of QoS aware users in a smart network. 4:1-4:28
Volume 3, Number 2, May 2008
- Agostino Forestiero

, Carlo Mastroianni
, Giandomenico Spezzano:
So-Grid: A self-organizing Grid featuring bio-inspired algorithms. 5:1-5:37 - Anastasios Gounaris, Christos A. Yfoulis

, Rizos Sakellariou
, Marios D. Dikaiakos:
A control theoretical approach to self-optimizing block transfer in Web service grids. 6:1-6:30 - Salvatore Garruzzo, Domenico Rosaci

:
Agent clustering based on semantic negotiation. 7:1-7:40
Volume 3, Number 3, August 2008
- Jeffrey Baumes, Hung-Ching Chen, Matthew Francisco, Mark K. Goldberg, Malik Magdon-Ismail, William A. Wallace:

ViSAGE: A Virtual Laboratory for Simulation and Analysis of Social Group Evolution. 8:1-8:35 - Hristo Koshutanski

, Fabio Massacci
:
Interactive access control for autonomic systems: From theory to implementation. 9:1-9:31 - Zhenwei Yu, Jeffrey J. P. Tsai, Thomas J. Weigert:

An adaptive automatically tuning intrusion detection system. 10:1-10:25 - Steven Y. Ko, Indranil Gupta, Yookyung Jo:

A new class of nature-inspired algorithms for self-adaptive peer-to-peer computing. 11:1-11:34
Volume 3, Number 4, November 2008
- Ajoy Kumar Datta:

Introduction to special issue on stabilization, safety, and security of distributed systems. 12:1-12:2 - Dana Angluin, James Aspnes, Michael J. Fischer, Hong Jiang:

Self-stabilizing population protocols. 13:1-13:28 - Hui Cao, Emre Ertin, Anish Arora:

MiniMax equilibrium of networked differential games. 14:1-14:21 - Johanne Cohen, Anurag Dasgupta, Sukumar Ghosh, Sébastien Tixeuil:

An exercise in selfish stabilization. 15:1-15:12 - Yoann Dieudonné, Ouiddad Labbani-Igbida, Franck Petit

:
Circle formation of weak mobile robots. 16:1-16:20 - Shlomi Dolev

, Reuven Yagel:
Self-stabilizing device drivers. 17:1-17:29 - Ehab S. Elmallah, Mohamed G. Gouda, Sandeep S. Kulkarni:

Logarithmic keying. 18:1-18:18 - Kajari Ghosh Dastidar, Ted Herman, Colette Johnen:

Safe peer-to-peer self-downloading. 19:1-19:18 - Rachid Guerraoui

, Nancy A. Lynch:
A general characterization of indulgence. 20:1-20:19

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














