ACM Transactions on Autonomous and Adaptive Systems, Volume 7 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 7, Number 1, April 2012

Ramachandra Kota, Nicholas Gibbins, Nicholas R. Jennings:
Decentralized approaches for self-adaptation in agent organizations. 1:1-1:28

Nicola Bicocchi
, Marco Mamei
, Franco Zambonelli
:
Self-organizing virtual macro sensors. 2:1-2:28

Mohammad Torabi Dashti
:
Efficiency of optimistic fair exchange using trusted devices. 3:1-3:18

Fabrice Saffre
, Aistis Simaitis:
Host selection through collective decision. 4:1-4:16

Anastasios Gounaris, Christos A. Yfoulis
, Norman W. Paton
:
Efficient load balancing in partitioned queries under random perturbations. 5:1-5:27

Mohamed Bakhouya
, Roy H. Campbell, Antonio Coronato
, Giuseppe De Pietro
, Anand Ranganathan:
Introduction to special section on formal methods in pervasive computing. 6:1-6:9

Razvan Popescu, Athanasios Staikopoulos, Antonio Brogi
, Peng Liu, Siobhán Clarke
:
A formalized, taxonomy-driven approach to cross-layer application adaptation. 7:1-7:30

Danny Weyns
, Sam Malek, Jesper Andersson:
FORMS: Unifying reference model for formal specification of distributed self-adaptive systems. 8:1-8:61

Franco Zambonelli
, Ben Paechter:
Introduction to the special section on pervasive adaptation. 9:1-9:2

Marcus Handte
, Gregor Schiele, Verena Majuntke, Christian Becker
, Pedro José Marrón
:
3PC: System support for adaptive peer-to-peer pervasive computing. 10:1-10:19

Ivana Dusparic, Vinny Cahill:
Autonomic multi-policy optimization in pervasive systems: Overview and evaluation. 11:1-11:25

Nikola B. Serbedzija, Stephen H. Fairclough
:
Reflective pervasive systems. 12:1-12:19

Abdelhamid Bouchachia
, Nadia Nedjah
:
Introduction to the special section on self-adaptive systems: Models and algorithms. 13:1-13:4

Emerson Loureiro, Paddy Nixon, Simon Dobson
:
Decentralized and optimal control of shared resource pools. 14:1-14:31

Hongliang Guo, Yaochu Jin
, Yan Meng:
A morphogenetic framework for self-organized multirobot pattern formation and boundary coverage. 15:1-15:23

Dominik Fisch, Martin Jänicke, Edgar Kalkowski, Bernhard Sick
:
Techniques for knowledge acquisition in dynamically changing environments. 16:1-16:25
Volume 7, Number 2, July 2012

Yufeng Wang, Akihiro Nakao
, Athanasios V. Vasilakos
:
On modeling of coevolution of strategies and structure in autonomous overlay networks. 17:1-17:23

Monica Dixit, António Casimiro
, Paolo Lollini
, Andrea Bondavalli
, Paulo Veríssimo
:
Adaptare: Supporting automatic and dependable adaptation in dynamic environments. 18:1-18:25

Carlo Combi
, Matteo Gozzi, Roberto Posenato
, Giuseppe Pozzi:
Conceptual modeling of flexible temporal workflows. 19:1-19:29

Musrrat Ali
, Millie Pant, Ajith Abraham:
Improving differential evolution algorithm by synergizing different improvement mechanisms. 20:1-20:32

Kai Zhang, Emmanuel G. Collins Jr., Dongqing Shi:
Centralized and distributed task allocation in multi-robot teams via a stochastic clustering auction. 21:1-21:22

Mario Mense, Christian Schindelhauer
:
An erasure-resilient encoding system for flexible reading and writing in storage networks. 22:1-22:16

Lifeng Sang, Anish Arora:
A shared-secret free security infrastructure for wireless networks. 23:1-23:21

Philippe Leroux, Sébastien Roy
:
Designing and optimizing swarming in a distributed base station network: Application to power control. 24:1-24:19

Stevens Le Blond, Fabrice Le Fessant, Erwan Le Merrer:
Choosing partners based on availability in P2P networks. 25:1-25:14

Shlomi Dolev
, Marina Kopeetsky:
Anonymous transactions in computer networks. 26:1-26:14

Fei Chen, Alex X. Liu, JeeHyun Hwang, Tao Xie:
First step towards automatic correction of firewall policy faults. 27:1-27:24

Sergey Legtchenko, Sébastien Monnet, Pierre Sens, Gilles Muller:
RelaxDHT: A churn-resilient replication strategy for peer-to-peer distributed hash-tables. 28:1-28:18

Franco Blanchini
, Daniele De Caneva, Pier Luca Montessoro, Davide Pierattoni:
Control-based p-persistent adaptive communication protocol. 29:1-29:18
Volume 7, Number 3, September 2012

Johannes Klinglmayr, Christian Bettstetter:
Self-organizing synchronization with inhibitory-coupled oscillators: Convergence and robustness. 30:1-30:23

Yufeng Wang, Akihiro Nakao
, Athanasios V. Vasilakos
:
Heterogeneity playing key role: Modeling and analyzing the dynamics of incentive mechanisms in autonomous networks. 31:1-31:25

Shouhuai Xu, Wenlian Lu, Li Xu:
Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights. 32:1-32:26

Mariachiara Puviani
, Giovanna Di Marzo Serugendo
, Regina Frei
, Giacomo Cabri
:
A method fragments approach to methodologies for engineering self-organizing systems. 33:1-33:25

Andres Quiroz, Manish Parashar, Nathan Gnanasambandam, Naveen Sharma:
Design and evaluation of decentralized online clustering. 34:1-34:31
Volume 7, Number 4, December 2012

Raffaele Giordanelli, Carlo Mastroianni
, Michela Meo
:
Bio-Inspired P2P Systems: The Case of Multidimensional Overlay. 35:1-35:28

Martina Maggio
, Henry Hoffmann, Alessandro Vittorio Papadopoulos
, Jacopo Panerati
, Marco D. Santambrogio
, Anant Agarwal, Alberto Leva
:
Comparison of Decision-Making Strategies for Self-Optimization in Autonomic Computing Systems. 36:1-36:32

Corina Stratan, Jan Sacha, Jeff Napper, Paolo Costa, Guillaume Pierre:
The XtreemOS Resource Selection Service. 37:1-37:32

Aly Farahat, Ali Ebnenasir:
A Lightweight Method for Automated Design of Convergence in Network Protocols. 38:1-38:36

Jeremy Pitt, Julia Schaumeier, Alexander Artikis
:
Axiomatization of Socio-Economic Principles for Self-Organizing Institutions: Concepts, Experiments and Challenges. 39:1-39:39

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







