Abstract is missing.
- Emergence in Organic Computing Systems: Discussion of a Controversial ConceptChristian Müller-Schloer, Bernhard Sick. 1-16 [doi]
- Managing Trust in Distributed Agent SystemsStephen S. Yau. 17-25 [doi]
- Towards a Standards-Based Autonomic Context Management SystemJadwiga Indulska, Karen Henricksen, Peizhao Hu. 26-37 [doi]
- Formal Modeling and Verification of Systems with Self-x PropertiesMatthias Güdemann, Frank Ortmeier, Wolfgang Reif. 38-47 [doi]
- A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous SystemsJunaid Ahsenali Chaudhry, Seungkyu Park. 48-56 [doi]
- Autonomic Interference Avoidance with Extended Shortest Path AlgorithmYong Cui, Hao Che, Constantino M. Lagoa, ZhiMei Zheng. 57-66 [doi]
- Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented SystemsA. Reza Haydarlou, Benno J. Overeinder, M. A. Oey, Frances M. T. Brazier. 67-77 [doi]
- From Components to Autonomic Elements Using Negotiable ContractsHervé Chang, Philippe Collet, Alain Ozanne, Nicolas Rivierre. 78-89 [doi]
- Self-configuration Via Cooperative Social BehaviorWolfgang Trumler, Robert Klaus, Theo Ungerer. 90-99 [doi]
- Towards Ontology-Based Embedded ServicesGhadi Mahmoudi, Christian Müller-Schloer. 100-112 [doi]
- TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming SystemSirui Yang, Hai Jin, Xuping Tu. 113-122 [doi]
- Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh NetworksYanxiang He, Jun Xiao, Naixue Xiong, Laurence Tianruo Yang. 123-132 [doi]
- Autonomic Group Location Update for Mobile NetworksLai Tu, Furong Wang, Fan Zhang, Jian Zhang. 133-142 [doi]
- Autonomic and Trusted Computing ParadigmsXiaolin Li, Hui Kang, Patrick Harrington, Johnson Thomas. 143-152 [doi]
- Autonomic K-Interleaving Construction Scheme for P2P Overlay NetworksKhaled Ragab, Akinori Yonezawa. 153-162 [doi]
- Self Awareness and Adaptive Traffic Signal Control System for Smart WorldLawrence Y. Deng, Dong-liang Lee. 163-172 [doi]
- Development and Runtime Support for Situation-Aware Security in Autonomic ComputingStephen S. Yau, Yisheng Yao, Min Yan. 173-182 [doi]
- A Social Network-Based Trust Model for the Semantic WebYu Zhang, Huajun Chen, Zhaohui Wu. 183-192 [doi]
- Fuzzy Model Tuning for Intrusion Detection SystemsZhenwei Yu, Jeffrey J. P. Tsai. 193-204 [doi]
- PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy SubsystemsAyman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail. 205-216 [doi]
- An Integration Framework for Trustworthy TransactionsYonghwan Lee, Dugki Min. 217-226 [doi]
- Daonity: An Experience on Enhancing Grid Security by Trusted Computing TechnologyFei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou. 227-235 [doi]
- Toward Trust Management in Autonomic and Coordination ApplicationsYuan Wang, Feng Xu, Ye Tao, Chun Cao, Jian Lü. 236-245 [doi]
- Bayesian Network Based Trust ManagementYong Wang, Vinny Cahill, Elizabeth Gray, Colin Harris, Lejian Liao. 246-257 [doi]
- An Improved Global Trust Value Computing Method in P2P SystemFajiang Yu, Huanguo Zhang, Fei Yan, Song Gao. 258-267 [doi]
- Trusted Priority Control Design for Information Networks Based on SociotechnologyNoriaki Yoshikai. 268-278 [doi]
- Autonomic Trust Management in a Component Based Software SystemZheng Yan, Ronan MacLaverty. 279-292 [doi]
- A Risk Assessment Model for Enterprise Network SecurityFu-Hong Yang, Chi-Hung Chi, Lin Liu. 293-301 [doi]
- A Security Management Framework with Roaming Coordinator for Pervasive ServicesMinsoo Lee, Sehyun Park, SungIk Jun. 302-311 [doi]
- A Dynamic Trust Model Based on Feedback Control Mechanism for P2P ApplicationsChenlin Huang, Huaping Hu, Zhiying Wang. 312-321 [doi]
- Automatic Composition of Secure WorkflowsMarc Lelarge, Zhen Liu, Anton Riabov. 322-331 [doi]
- TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live BroadcastingYun Tang, Lifeng Sun, Jian-Guang Luo, Shiqiang Yang, Yuzhuo Zhong. 332-341 [doi]
- A Group Based Reputation System for P2P NetworksHuirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng. 342-351 [doi]
- An Approach for Trusted Interoperation in a Multidomain EnvironmentYuqing Sun, Peng Pan, Xiangxu Meng. 352-361 [doi]
- Extracting Trust from Domain Analysis: A Case Study on the Wikipedia ProjectPierpaolo Dondio, Stephen Barrett, Stefan Weber, Jean-Marc Seigneur. 362-373 [doi]
- MTrust: A Reputation-Based Trust Model for a Mobile Agent SystemSuphithat Songsiri. 374-385 [doi]
- Ubisafe Computing: Vision and Challenges (I)Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde Cheng, Laurence Tianruo Yang, Runhe Huang, Qun Jin. 386-397 [doi]
- Source Authentication of Media Streaming Based on Chains of Iso-hash ClustersZhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li. 398-407 [doi]
- Self-certified Mutual Authentication and Key Exchange Protocol for Roaming ServicesXiaowen Chu, Yixin Jiang, Chuang Lin, Fujun Feng. 408-417 [doi]
- Remote Authentication with Forward SecurityZhenchuan Chai, Zhenfu Cao, Rongxing Lu. 418-427 [doi]
- A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer FactorizationLaurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn. 428-438 [doi]
- An Access-Control Policy Based on Sharing Resource Management for a Multi-domains EnvironmentHong Zhu, Sujuan Duan, Fan Hong, Kevin Lü. 439-448 [doi]
- Efficient Signcryption Without Random OraclesQianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang. 449-458 [doi]
- Two Novel Packet Marking Schemes for IP TracebackHanping Hu, Yi Wang, Lingfei Wang, Wenxuan Guo, Mingyue Ding. 459-466 [doi]
- A Novel Rate Limit Algorithm Against Meek DDoS AttacksYinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang. 467-476 [doi]
- Resistance Analysis to Intruders Evasion of a Novel Algorithm to Detect Stepping-StoneYongzhong Zhang, Jianhua Yang, Chunming Ye. 477-486 [doi]
- A New ID-Based Broadcast Encryption SchemeChen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang. 487-492 [doi]
- Automated Abduction for Computer ForensicsAndrei Doncescu, Katsumi Inoue. 493-499 [doi]
- A Framework for Specifying and Managing Security Requirements in Collaborative SystemsStephen S. Yau, Zhaoji Chen. 500-510 [doi]
- System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor NetworksWon Jay Song, Im Sook Há, Mun Kee Choi. 511-520 [doi]
- On Email Spamming Under the Shadow of Large Scale Use of Identity-Based EncryptionChristian Veigner, Chunming Rong. 521-530 [doi]
- Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme)Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, YuMin Wang. 531-540 [doi]
- A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low RatesMing Li, Shengquan Wang, Wei Zhao. 541-550 [doi]
- A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning EnvironmentYun-Long Sie, Te-Hua Wang, Hsuan-Pu Chang, Shu-Nu Chang, Timothy K. Shih. 551-560 [doi]
- FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMSJae-Woo Chang, Young-Chang Kim. 561-570 [doi]
- Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous SystemsWei Luo, Fumin Yang, Liping Pang, Xiao Qin. 571-580 [doi]
- Active Fault-Tolerant System for Open Distributed ComputingRodrigo Lanka, Kentaro Oda, Takaichi Yoshida. 581-590 [doi]
- A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory DatabasesYingyuan Xiao, Yunsheng Liu, Xiangyang Chen, Xiaofeng Liu. 591-600 [doi]
- An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm ProblemIuon-Chang Lin, Chin-Chen Chang. 601-610 [doi]