@techreport{Hershey1999, title = {On Respecting Interdependence Between Queuing Policy and Message Value}, author = {John Hershey and Stephen Bush}, year = {1999}, month = {Dec}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based}, researchr = {https://researchr.org/publication/Hershey1999}, cites = {0}, citedby = {0}, institution = {General Electric Research and Development}, number = {99CRD151}, } @inproceedings{Bush2003h, title = {Extended Abstract: Complexity and Vulnerability Analysis}, author = {Stephen Bush}, year = {2003}, month = {Jun}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, protocol, points-to analysis, analysis, Kolmogorov complexity, data-flow, source-to-source, data-flow analysis, open-source}, researchr = {https://researchr.org/publication/Bush2003h}, cites = {0}, citedby = {0}, booktitle = {Complexity and Inference}, } @inproceedings{Bush1999b, title = {Active Virtual Network Management Prediction}, author = {Stephen Bush}, year = {1999}, month = {May}, url = {http://www.research.ge.com/~bushsf}, researchr = {https://researchr.org/publication/Bush1999b}, cites = {0}, citedby = {0}, booktitle = {PADS '99}, } @article{Bush2005m:0, title = {An Active Model-Based Prototype for Predictive Network Management}, author = {Stephen Bush and Sanjay Goel}, year = {2005}, month = {Nov}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, protocol, architecture, systematic-approach}, researchr = {https://researchr.org/publication/Bush2005m%3A0}, cites = {0}, citedby = {0}, journal = {IEEE Journal on Selected Areas in Communications Journal}, volume = {23}, number = {10}, } @techreport{Bush2006, title = {Nano-Communications: A New Field? An Exploration into a Carbon Nanotube Communication Network}, author = {Stephen Bush and Yun Li}, year = {2006}, month = {February}, url = {http://www.research.ge.com/\~{}bushsf/pdfpapers/2006GRC066\_Final\_ver.pdf}, tags = {layout, meta-model, protocol, graph-rewriting, information models, Meta-Environment, rewriting, routing, systematic-approach}, researchr = {https://researchr.org/publication/Bush2006}, cites = {0}, citedby = {0}, institution = {GE Global Research}, number = {2006GRC066}, } @article{Bush1996b, title = {Mobile ATM Buffer Capacity Analysis}, author = {Stephen Bush and Joseph B. Evans and Victor Frost}, year = {1996}, month = {February}, url = {http://www.crd.ge.com/people/bush}, tags = {points-to analysis, analysis, source-to-source, Meta-Environment, mobile, open-source, meta-objects}, researchr = {https://researchr.org/publication/Bush1996b}, cites = {0}, citedby = {0}, journal = {ACM-Baltzer Mobile Networks and Nomadic Applications (NOMAD)}, volume = {1}, number = {1}, } @inproceedings{Bush1996:0, title = {A Control and Management Network for Wireless ATM Systems}, author = {Stephen Bush and Sunil Jagannath and Joseph B. Evans and Victor Frost}, year = {1996}, month = {June}, url = {http://www-ee.uta.edu/organizations/commsoc/commsoft.html}, tags = {control systems, design, mobile}, researchr = {https://researchr.org/publication/Bush1996%3A0}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the International Communications Conference '96}, } @article{Bush2005g, title = {A Simple Metric for Ad Hoc Network Adaptation}, author = {Stephen Bush}, year = {2005}, month = {Dec}, url = {http://www.research.ge.com/~bushsf}, tags = {optimization, generic programming, program optimization, design}, researchr = {https://researchr.org/publication/Bush2005g}, cites = {0}, citedby = {0}, journal = {IEEE Journal on Selected Areas in Communications Journal}, volume = {23}, number = {12}, } @article{Bush1999, title = {Brittle System Analysis}, author = {Stephen Bush and John Hershey and Kirby Vosburgh}, year = {1999}, month = {Apr}, url = {http://www.research.ge.com/~bushsf}, tags = {operating system, analysis}, researchr = {https://researchr.org/publication/Bush1999}, cites = {0}, citedby = {0}, } @book{Bush2001, title = {Active Networks and Active Network Management: A Proactive Management Framework}, author = {Stephen Bush and Amit B. Kulkarni}, year = {2001}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, application framework, meta-model, modeling, architecture, model-driven development, source-to-source, security, e-science, information models, Meta-Environment, taxonomy, open-source}, researchr = {https://researchr.org/publication/Bush2001}, cites = {0}, citedby = {0}, publisher = {Kluwer Academic/Plenum Publishers}, isbn = {0-306-46560-4}, } @inproceedings{Bush2001a:0, title = {Thought Communication}, author = {Stephen Bush and Amit B. Kulkarni}, year = {2001}, month = {Mar}, url = {http://www.hpcc.gov/iwg/lsn/lsn-workshop-12mar01/}, researchr = {https://researchr.org/publication/Bush2001a%3A0}, cites = {0}, citedby = {0}, booktitle = {Workshop on New Visions for Large-Scale Networks: Research and Applications}, } @inproceedings{Bush2002, title = {Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance}, author = {Stephen Bush}, year = {2002}, month = {May}, tags = {optimization, rule-based, protocol, analysis, static analysis, Kolmogorov complexity}, researchr = {https://researchr.org/publication/Bush2002}, cites = {0}, citedby = {0}, booktitle = {IEEE Computer Society Press, Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002)}, } @inproceedings{Goel2003:0, title = {Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches}, author = {Sanjay Goel and Stephen Bush}, year = {2003}, month = {Nov}, url = {http://www.research.ge.com/~bushsf/pdfpapers/ImmunoComplexity.pdf}, tags = {rule-based, meta-model, Kolmogorov complexity, security, compiler, information models, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/Goel2003%3A0}, cites = {0}, citedby = {0}, booktitle = {Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003}, } @article{Bush2003n:0, title = {Genetically Induced Communication Network Fault Tolerance}, author = {Stephen Bush}, year = {2003}, month = {Nov}, url = {http://www.research.ge.com/~bushsf}, tags = {meta programming, protocol, architecture, programming paradigms, code generation, programming, genetic programming, type theory, Meta-Environment}, researchr = {https://researchr.org/publication/Bush2003n%3A0}, cites = {0}, citedby = {0}, journal = {Complexity Journal}, volume = {9}, number = {2}, } @inproceedings{BushS05, title = {The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance}, author = {Stephen Bush and Nathan Smith}, year = {2005}, researchr = {https://researchr.org/publication/BushS05}, cites = {0}, citedby = {0}, pages = {495-501}, booktitle = {icwn}, } @article{Bush03, title = {Genetically induced communication network fault tolerance}, author = {Stephen Bush}, year = {2003}, doi = {10.1002/cplx.20002}, url = {http://dx.doi.org/10.1002/cplx.20002}, researchr = {https://researchr.org/publication/Bush03}, cites = {0}, citedby = {0}, journal = {complexity}, volume = {9}, number = {2}, pages = {19-33}, } @article{BushG05, title = {An active model-based prototype for predictive network management}, author = {Stephen Bush and Sanjay Goel}, year = {2005}, doi = {10.1109/JSAC.2005.854108}, url = {http://doi.ieeecomputersociety.org/10.1109/JSAC.2005.854108}, tags = {rule-based}, researchr = {https://researchr.org/publication/BushG05}, cites = {0}, citedby = {0}, journal = {jsac}, volume = {23}, number = {10}, pages = {2049-2057}, } @article{BushK07, title = {Special issue: advances in resource-constrained device networking}, author = {Stephen Bush and Amit B. Kulkarni}, year = {2007}, doi = {10.1002/wcm.531}, url = {http://dx.doi.org/10.1002/wcm.531}, researchr = {https://researchr.org/publication/BushK07}, cites = {0}, citedby = {0}, journal = {wicomm}, volume = {7}, number = {7}, pages = {821-822}, } @inproceedings{Bush2003i:0, title = {Extended Abstract: Complexity and Vulnerability Analysis}, author = {Stephen Bush}, year = {2003}, month = {Jun}, url = {http://dimacs.rutgers.edu/Workshops/Inference/abstracts.html}, tags = {rule-based, protocol, points-to analysis, analysis, Kolmogorov complexity, data-flow, source-to-source, data-flow analysis, open-source}, researchr = {https://researchr.org/publication/Bush2003i%3A0}, cites = {0}, citedby = {0}, booktitle = {Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003}, } @unpublished{Bush:0, title = {Information Warfare Strategy and Control Analysis}, author = {Stephen Bush and Bruce Barnett}, year = {1999}, url = {http://www.research.ge.com/~bushsf/pdfpapers/nvaprecis.pdf}, note = {White Paper}, tags = {discovery, analysis, data-flow, security, access control, data-flow analysis}, researchr = {https://researchr.org/publication/Bush%3A0}, cites = {0}, citedby = {0}, } @phdthesis{Bush1997b:0, title = {The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network}, author = {Stephen Bush}, year = {1997}, month = {Aug}, url = {http://www.ittc.ukans.edu/RDRN/documents/}, tags = {optimization, caching, design research, analysis, constraints, Meta-Environment, design, mobile}, researchr = {https://researchr.org/publication/Bush1997b%3A0}, cites = {0}, citedby = {0}, school = {University of Kansas}, } @article{Bush2005g:0, title = {A Simple Metric for Ad Hoc Network Adaptation}, author = {Stephen Bush}, year = {2005}, month = {Dec}, url = {http://www.research.ge.com/~bushsf}, tags = {optimization, generic programming, program optimization, design}, researchr = {https://researchr.org/publication/Bush2005g%3A0}, cites = {0}, citedby = {0}, journal = {IEEE Journal on Selected Areas in Communications Journal}, volume = {23}, number = {12}, } @unpublished{Bush2009d:0, title = {A Quantitative Approach to Measuring Assurance with Uncertainty in Data Provenance}, author = {Stephen Bush and Abha Moitra and Andrew Crapo and Bruce Barnett and Stephen J. Dill}, year = {2009}, note = {Sent to Steve Dill for PIRA approval to publish}, tags = {application framework, data-flow, security, logic, systematic-approach}, researchr = {https://researchr.org/publication/Bush2009d%3A0}, cites = {0}, citedby = {0}, } @techreport{Kulkarni2001a:0, title = {Detecting Distributed Denial-of-Service Attacks using Kolmogorov Complexity Metrics}, author = {Amit B. Kulkarni and Stephen Bush and Scott C. Evans}, year = {2001}, month = {Dec}, url = {http://www.research.ge.com/~bushsf/ftn/2001crd176.pdf}, tags = {rule-based, Kolmogorov complexity, data-flow, rules, C++, type theory, systematic-approach}, researchr = {https://researchr.org/publication/Kulkarni2001a%3A0}, cites = {0}, citedby = {0}, institution = {GE Global Research Center}, number = {2001CRD176}, } @inproceedings{Bush2005d:0, title = {Sync and Swarm Behavior for Sensor Networks}, author = {Stephen Bush}, year = {2005}, month = {Jun}, url = {http://www.research.ge.com/~bushsf}, tags = {power consumption, synchronization, meta-model, Meta-Environment}, researchr = {https://researchr.org/publication/Bush2005d%3A0}, cites = {0}, citedby = {0}, booktitle = {Joint IEEE Communications Society and Aerospace Chapter Presentation}, } @techreport{Bush1998, title = {A Security Vulnerability Assessment Technique and Model}, author = {Stephen Bush and Bruce Barnett}, year = {1998}, month = {Jan}, url = {http://www.research.ge.com/~bushsf}, tags = {discovery, data-flow, security}, researchr = {https://researchr.org/publication/Bush1998}, cites = {0}, citedby = {0}, institution = {General Electric Corporate Research and Development Center}, number = {98CRD028}, } @inproceedings{Bush2001a, title = {Thought Communication}, author = {Stephen Bush and Amit B. Kulkarni}, year = {2001}, month = {Mar}, url = {http://www.hpcc.gov/iwg/lsn/lsn-workshop-12mar01/}, researchr = {https://researchr.org/publication/Bush2001a}, cites = {0}, citedby = {0}, booktitle = {Workshop on New Visions for Large-Scale Networks: Research and Applications}, } @inproceedings{Bush2000, title = {Active Jitter Control}, author = {Stephen Bush and Amit Kulkarni and Scott Evans and Luiz Galup}, year = {2000}, month = {Feb}, url = {http://www.research.ge.com/~bushsf}, tags = {data validation, data-flow}, researchr = {https://researchr.org/publication/Bush2000}, cites = {0}, citedby = {0}, booktitle = {7th International IS\&N Conference, Intelligence in Services and Networks (ISN) '00, Kavouri, Athens, Greece}, } @inproceedings{Bush1999b:0, title = {Active Virtual Network Management Prediction}, author = {Stephen Bush}, year = {1999}, month = {May}, url = {http://www.research.ge.com/~bushsf}, researchr = {https://researchr.org/publication/Bush1999b%3A0}, cites = {0}, citedby = {0}, booktitle = {PADS '99}, } @article{Bush2009f:0, title = {Wireless ad hoc nanoscale networking - industry perspectives}, author = {Stephen Bush}, year = {2009}, doi = {10.1109/MWC.2009.5300295}, tags = {wireless sensor networks}, researchr = {https://researchr.org/publication/Bush2009f%3A0}, cites = {0}, citedby = {0}, journal = {IEEE_M_WC}, volume = {16}, number = {5}, } @inproceedings{Bush2003a, title = {On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate Semantic Types}, author = {Stephen Bush and Todd Hughes}, year = {2003}, month = {Nov}, url = {http://www.research.ge.com/~bushsf}, tags = {data validation, rule-based, analysis, type system, Kolmogorov complexity, data-flow, data-flow analysis, incremental}, researchr = {https://researchr.org/publication/Bush2003a}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the SFI Workshop on Resilient and Adaptive Defense of Computing Networks 2003}, } @techreport{Hershey1999:0, title = {On Respecting Interdependence Between Queuing Policy and Message Value}, author = {John Hershey and Stephen Bush}, year = {1999}, month = {Dec}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based}, researchr = {https://researchr.org/publication/Hershey1999%3A0}, cites = {0}, citedby = {0}, institution = {General Electric Research and Development}, number = {99CRD151}, } @inproceedings{GaltierMCBK01, title = {Predicting and Controlling Resource Usage in a Heterogeneous Active Network}, author = {Virginie Galtier and Kevin L. Mills and Yannick Carlinet and Stephen Bush and Amit B. Kulkarni}, year = {2001}, url = {http://csdl.computer.org/comp/proceedings/ams/2001/1528/00/15280035abs.htm}, researchr = {https://researchr.org/publication/GaltierMCBK01}, cites = {0}, citedby = {0}, pages = {35-44}, booktitle = {ieeeams}, } @article{Goel2004a:0, title = {Biological Models of Security for Virus Propagation in Computer Networks}, author = {Sanjay Goel and Stephen Bush}, year = {2004}, month = {Dec}, url = {http://www.research.ge.com/~bushsf}, tags = {control systems, rule-based, meta-model, modeling, security, Meta-Environment}, researchr = {https://researchr.org/publication/Goel2004a%3A0}, cites = {0}, citedby = {0}, journal = {;Login;}, volume = {29}, number = {6}, } @inproceedings{Bush2000a:0, title = {Islands of Near-Perfect Self-Prediction}, author = {Stephen Bush}, year = {2000}, month = {Jan}, url = {http://www.research.ge.com/~bushsf/an/vwsim00.pdf}, tags = {meta-model, modeling, Meta-Environment, process modeling}, researchr = {https://researchr.org/publication/Bush2000a%3A0}, cites = {0}, citedby = {0}, booktitle = {Proceedings of VWsim'00: Virtual Worlds and Simulation Conference, WMC'00: 2000 SCS Western Multi-Conference, San Diego, SCS (2000)}, } @techreport{Bush2001d:0, title = {Complexity-Based Information Assurance}, author = {Stephen Bush and S. C. Evans}, year = {2001}, month = {Oct}, tags = {rule-based, Java, design complexity, C++, security, Meta-Environment, design}, researchr = {https://researchr.org/publication/Bush2001d%3A0}, cites = {0}, citedby = {0}, institution = {GE Global Research Center}, number = {2001CRD084}, } @techreport{Bush2006b, title = {Network Characteristics of Carbon Nanotubes: A Graph Eigenspectrum Approach and Tool Using Mathematica}, author = {Stephen Bush and Yun Li}, year = {2006}, url = {http://www.research.ge.com/~bushsf/pdfpapers/2006GRC023_Final_ver.pdf}, tags = {rule-based, layout, meta-model, analysis, data-flow, graph-rewriting, Meta-Environment, rewriting, data-flow analysis, routing, process modeling, systematic-approach}, researchr = {https://researchr.org/publication/Bush2006b}, cites = {0}, citedby = {0}, institution = {GE Global Research}, number = {2006GRC023}, } @article{Bush1999a, title = {Network Management of Predictive Mobile Networks}, author = {Stephen Bush and Victor S. Frost and Joseph B. Evans}, year = {1999}, month = {Jun}, url = {http://www.crd.ge.com/people/bush}, tags = {deployment, mobile}, researchr = {https://researchr.org/publication/Bush1999a}, cites = {0}, citedby = {0}, journal = {Journal of Network and Systems Management}, volume = {7}, number = {2}, } @article{Bush2004, title = {Genetically Induced Communication Network Fault Tolerance}, author = {Stephen Bush}, year = {2003}, doi = {10.1002/cplx.20002}, url = {http://www.research.ge.com/~bushsf/pdfpapers/ComplexityJournal.pdf}, tags = {meta programming, protocol, architecture, programming paradigms, code generation, programming, genetic programming, type theory, Meta-Environment}, researchr = {https://researchr.org/publication/Bush2004}, cites = {0}, citedby = {0}, journal = {Complexity Special Issue: "Resilient \& Adaptive Defense of Computing Networks"}, volume = {9}, number = {2}, } @inproceedings{BalasubramaniamBWDSB07, title = {Applying compartmentalisation techniques to communication protocols of biological Nano and MEMS devices}, author = {Sasitharan Balasubramaniam and Dmitri Botvich and Frank Walsh and William Donnelly and Sergey Sergeyev and Stephen Bush}, year = {2007}, doi = {10.1109/BROADNETS.2007.4550450}, url = {http://dx.doi.org/10.1109/BROADNETS.2007.4550450}, tags = {protocol}, researchr = {https://researchr.org/publication/BalasubramaniamBWDSB07}, cites = {0}, citedby = {0}, pages = {323-325}, booktitle = {broadnets}, } @techreport{Kulkarni2000:0, title = {Active Network Management, Kolmogorov Complexity, and Streptichrons}, author = {Amit B. Kulkarni and Stephen Bush}, year = {2000}, month = {dec}, url = {http://www.research.ge.com/~bushsf}, tags = {meta-model, modeling, architecture, network, Kolmogorov complexity, Meta-Environment}, researchr = {https://researchr.org/publication/Kulkarni2000%3A0}, cites = {0}, citedby = {0}, institution = {General Electric Corporate Research and Development}, number = {2000CRD107}, } @article{Bush2003o, title = {Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches}, author = {Stephen Bush and Sanjay Goel}, year = {2003}, month = {Nov}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, meta-model, Kolmogorov complexity, security, compiler, information models, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/Bush2003o}, cites = {0}, citedby = {0}, journal = {Complexity Journal}, volume = {9}, number = {2}, } @inproceedings{Kulkarni2001b, title = {Active Network Management and Kolmogorov Complexity}, author = {Amit B. Kulkarni and Stephen Bush}, year = {2001}, month = {Apr}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, Kolmogorov complexity}, researchr = {https://researchr.org/publication/Kulkarni2001b}, cites = {0}, citedby = {0}, booktitle = {Proceedings of IEEE OpenArch 2001}, } @inproceedings{Bush2005a:0, title = {The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance}, author = {Stephen Bush and Nathan Smith}, year = {2005}, month = {Jun}, url = {http://www.research.ge.com/~bushsf}, tags = {wireless, meta-model, Meta-Environment, routing}, researchr = {https://researchr.org/publication/Bush2005a%3A0}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the 2005 International Conference on Wireless Networks (ICWN-05)}, } @inproceedings{Bush2003h:0, title = {Extended Abstract: Complexity and Vulnerability Analysis}, author = {Stephen Bush}, year = {2003}, month = {Jun}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, protocol, points-to analysis, analysis, Kolmogorov complexity, data-flow, source-to-source, data-flow analysis, open-source}, researchr = {https://researchr.org/publication/Bush2003h%3A0}, cites = {0}, citedby = {0}, booktitle = {Complexity and Inference}, } @phdthesis{Bush1997b, title = {The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network}, author = {Stephen Bush}, year = {1997}, month = {Aug}, url = {http://www.ittc.ukans.edu/RDRN/documents/}, tags = {optimization, caching, design research, analysis, constraints, Meta-Environment, design, mobile}, researchr = {https://researchr.org/publication/Bush1997b}, cites = {0}, citedby = {0}, school = {University of Kansas}, } @article{Bush2005m, title = {An Active Model-Based Prototype for Predictive Network Management}, author = {Stephen Bush and Sanjay Goel}, year = {2005}, month = {Nov}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, protocol, architecture, systematic-approach}, researchr = {https://researchr.org/publication/Bush2005m}, cites = {0}, citedby = {0}, journal = {IEEE Journal on Selected Areas in Communications Journal}, volume = {23}, number = {10}, } @unpublished{Bush2009d, title = {A Quantitative Approach to Measuring Assurance with Uncertainty in Data Provenance}, author = {Stephen Bush and Abha Moitra and Andrew Crapo and Bruce Barnett and Stephen J. Dill}, year = {2009}, note = {Sent to Steve Dill for PIRA approval to publish}, tags = {application framework, data-flow, security, logic, systematic-approach}, researchr = {https://researchr.org/publication/Bush2009d}, cites = {0}, citedby = {0}, } @article{Bush1997a:0, title = {A Control and Management Network for Wireless ATM Systems}, author = {Stephen Bush and Sunil Jagannath and Joseph B. Evans and Victor Frost and Gary Minden and K. Sam Shanmugan}, year = {1997}, url = {http://www.research.ge.com/~bushsf}, tags = {control systems, rule-based, deployment, network, reuse, design, mobile}, researchr = {https://researchr.org/publication/Bush1997a%3A0}, cites = {0}, citedby = {0}, journal = {ACM-Baltzer Wireless Networks (WINET)}, volume = {3}, } @techreport{Bush2001b, title = {Kolmogorov Complexity for Information Assurance}, author = {Stephen Bush and Scott C. Evans}, year = {2001}, url = {http://www.research.ge.com/~bushsf}, tags = {Kolmogorov complexity, C++}, researchr = {https://researchr.org/publication/Bush2001b}, cites = {0}, citedby = {0}, institution = {General Electric Corporate Research and Development}, number = {2001CRD148}, } @inproceedings{Bush2000a, title = {Islands of Near-Perfect Self-Prediction}, author = {Stephen Bush}, year = {2000}, month = {Jan}, url = {http://www.research.ge.com/~bushsf/an/vwsim00.pdf}, tags = {meta-model, modeling, Meta-Environment, process modeling}, researchr = {https://researchr.org/publication/Bush2000a}, cites = {0}, citedby = {0}, booktitle = {Proceedings of VWsim'00: Virtual Worlds and Simulation Conference, WMC'00: 2000 SCS Western Multi-Conference, San Diego, SCS (2000)}, } @inproceedings{Bush2002:0, title = {Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance}, author = {Stephen Bush}, year = {2002}, month = {May}, tags = {optimization, rule-based, protocol, analysis, static analysis, Kolmogorov complexity}, researchr = {https://researchr.org/publication/Bush2002%3A0}, cites = {0}, citedby = {0}, booktitle = {IEEE Computer Society Press, Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002)}, } @techreport{Bush2001d, title = {Complexity-Based Information Assurance}, author = {Stephen Bush and S. C. Evans}, year = {2001}, month = {Oct}, tags = {rule-based, Java, design complexity, C++, security, Meta-Environment, design}, researchr = {https://researchr.org/publication/Bush2001d}, cites = {0}, citedby = {0}, institution = {GE Global Research Center}, number = {2001CRD084}, } @techreport{Kulkarni2000, title = {Active Network Management, Kolmogorov Complexity, and Streptichrons}, author = {Amit B. Kulkarni and Stephen Bush}, year = {2000}, month = {dec}, url = {http://www.research.ge.com/~bushsf}, tags = {meta-model, modeling, architecture, Kolmogorov complexity, Meta-Environment}, researchr = {https://researchr.org/publication/Kulkarni2000}, cites = {0}, citedby = {0}, institution = {General Electric Corporate Research and Development}, number = {2000CRD107}, } @inproceedings{Bush2005d, title = {Sync and Swarm Behavior for Sensor Networks}, author = {Stephen Bush}, year = {2005}, month = {Jun}, url = {http://www.research.ge.com/~bushsf}, tags = {power consumption, synchronization, meta-model, Meta-Environment}, researchr = {https://researchr.org/publication/Bush2005d}, cites = {0}, citedby = {0}, booktitle = {Joint IEEE Communications Society and Aerospace Chapter Presentation}, } @inproceedings{Bush2002b:0, title = {Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance}, author = {Stephen Bush}, year = {2002}, month = {May}, url = {http://www.research.ge.com/~bushsf/ftn/005-FINAL.pdf}, tags = {optimization, protocol, analysis, static analysis, Kolmogorov complexity}, researchr = {https://researchr.org/publication/Bush2002b%3A0}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE) May 29-30, 2002, San Francisco, California, USA}, } @inproceedings{Bush2000:0, title = {Active Jitter Control}, author = {Stephen Bush and Amit Kulkarni and Scott Evans and Luiz Galup}, year = {2000}, month = {Feb}, url = {http://www.research.ge.com/~bushsf}, tags = {data validation, data-flow}, researchr = {https://researchr.org/publication/Bush2000%3A0}, cites = {0}, citedby = {0}, booktitle = {7th International IS\&N Conference, Intelligence in Services and Networks (ISN) '00, Kavouri, Athens, Greece}, } @article{BushF99, title = {A Framework for Predictive Network Management of Predictive Mobile Networks}, author = {Stephen Bush and Victor S. Frost}, year = {1999}, url = {http://www.cstp.umkc.edu/jnsm/vols/vol07_abs/07-2-bush.html}, tags = {mobile}, researchr = {https://researchr.org/publication/BushF99}, cites = {0}, citedby = {0}, journal = {jnsm}, volume = {7}, number = {2}, pages = {225-246}, } @techreport{Bush2001b:0, title = {Kolmogorov Complexity for Information Assurance}, author = {Stephen Bush and Scott C. Evans}, year = {2001}, url = {http://www.research.ge.com/~bushsf}, tags = {Kolmogorov complexity, C++}, researchr = {https://researchr.org/publication/Bush2001b%3A0}, cites = {0}, citedby = {0}, institution = {General Electric Corporate Research and Development}, number = {2001CRD148}, } @techreport{Kulkarni2001a, title = {Detecting Distributed Denial-of-Service Attacks using Kolmogorov Complexity Metrics}, author = {Amit B. Kulkarni and Stephen Bush and Scott C. Evans}, year = {2001}, month = {Dec}, url = {http://www.research.ge.com/~bushsf/ftn/2001crd176.pdf}, tags = {rule-based, Kolmogorov complexity, data-flow, rules, C++, type theory, systematic-approach}, researchr = {https://researchr.org/publication/Kulkarni2001a}, cites = {0}, citedby = {0}, institution = {GE Global Research Center}, number = {2001CRD176}, } @article{GoelB03:0, title = {Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches}, author = {Sanjay Goel and Stephen Bush}, year = {2003}, doi = {10.1002/cplx.20004}, url = {http://dx.doi.org/10.1002/cplx.20004}, tags = {Kolmogorov complexity, security, systematic-approach}, researchr = {https://researchr.org/publication/GoelB03%3A0}, cites = {0}, citedby = {0}, journal = {complexity}, volume = {9}, number = {2}, pages = {54-73}, } @article{Bush2009f, title = {Wireless ad hoc nanoscale networking - industry perspectives}, author = {Stephen Bush}, year = {2009}, doi = {10.1109/MWC.2009.5300295}, tags = {wireless sensor networks}, researchr = {https://researchr.org/publication/Bush2009f}, cites = {0}, citedby = {0}, journal = {IEEE_M_WC}, volume = {16}, number = {5}, } @article{BushEF96, title = {Mobile ATM Buffer Capacity Analysis}, author = {Stephen Bush and Joseph B. Evans and Victor Frost}, year = {1996}, tags = {analysis, mobile}, researchr = {https://researchr.org/publication/BushEF96}, cites = {0}, citedby = {0}, journal = {monet}, volume = {1}, number = {1}, pages = {67-73}, } @techreport{Bush2006b:0, title = {Network Characteristics of Carbon Nanotubes: A Graph Eigenspectrum Approach and Tool Using Mathematica}, author = {Stephen Bush and Yun Li}, year = {2006}, url = {http://www.research.ge.com/~bushsf/pdfpapers/2006GRC023_Final_ver.pdf}, tags = {rule-based, layout, meta-model, analysis, data-flow, graph-rewriting, Meta-Environment, rewriting, data-flow analysis, routing, process modeling, systematic-approach}, researchr = {https://researchr.org/publication/Bush2006b%3A0}, cites = {0}, citedby = {0}, institution = {GE Global Research}, number = {2006GRC023}, } @inproceedings{Bush2005h, title = {Low-Energy Network Time Synchronization as an Emergent Property}, author = {Stephen Bush}, year = {2005}, month = {Oct}, url = {http://www.research.ge.com/~bushsf}, tags = {synchronization, wireless sensor networks, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/Bush2005h}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the Fourteenth International Conference on Computer Communications and Networks (IEEE ICCCN)}, } @article{Goel2004a, title = {Biological Models of Security for Virus Propagation in Computer Networks}, author = {Sanjay Goel and Stephen Bush}, year = {2004}, month = {Dec}, url = {http://www.research.ge.com/~bushsf}, tags = {control systems, rule-based, meta-model, modeling, security, Meta-Environment}, researchr = {https://researchr.org/publication/Goel2004a}, cites = {0}, citedby = {0}, journal = {;Login;}, volume = {29}, number = {6}, } @article{Bush2003n, title = {Genetically Induced Communication Network Fault Tolerance}, author = {Stephen Bush}, year = {2003}, month = {Nov}, url = {http://www.research.ge.com/~bushsf}, tags = {meta programming, protocol, architecture, programming paradigms, code generation, programming, genetic programming, type theory, Meta-Environment}, researchr = {https://researchr.org/publication/Bush2003n}, cites = {0}, citedby = {0}, journal = {Complexity Journal}, volume = {9}, number = {2}, } @inproceedings{Bush2005a, title = {The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance}, author = {Stephen Bush and Nathan Smith}, year = {2005}, month = {Jun}, url = {http://www.research.ge.com/~bushsf}, tags = {wireless, meta-model, network, Meta-Environment, routing, performance, motion prediction}, researchr = {https://researchr.org/publication/Bush2005a}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the 2005 International Conference on Wireless Networks (ICWN-05)}, } @inproceedings{Kulkarni2001b:0, title = {Active Network Management and Kolmogorov Complexity}, author = {Amit B. Kulkarni and Stephen Bush}, year = {2001}, month = {Apr}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, Kolmogorov complexity, information theory}, researchr = {https://researchr.org/publication/Kulkarni2001b%3A0}, cites = {0}, citedby = {0}, booktitle = {Proceedings of IEEE OpenArch 2001}, } @techreport{Bush2006a:0, title = {Characteristics of Carbon Nanotube Networks: The Impact of a Metallic Nanotube on a CNT Network}, author = {Stephen Bush and Yun Li}, year = {2006}, month = {June}, url = {http://www.research.ge.com/~bushsf/pdfpapers/2006GRC397_final_ver.pdf}, tags = {rule-based, layout, analysis, rules, design}, researchr = {https://researchr.org/publication/Bush2006a%3A0}, cites = {0}, citedby = {0}, institution = {GE Global Research}, number = {2006GRC397}, } @article{BushJSEFMS97, title = {A control and management network for wireless ATM systems}, author = {Stephen Bush and Sunil Jagannath and Ricardo Sanchez and Joseph B. Evans and Victor S. Frost and Gary J. Minden and K. Sam Shanmugan}, year = {1997}, doi = {10.1023/A:1019117603571}, url = {http://dx.doi.org/10.1023/A:1019117603571}, tags = {control systems}, researchr = {https://researchr.org/publication/BushJSEFMS97}, cites = {0}, citedby = {0}, journal = {winet}, volume = {3}, number = {4}, pages = {267-283}, } @unpublished{Bush, title = {Information Warfare Strategy and Control Analysis}, author = {Stephen Bush and Bruce Barnett}, year = {1999}, url = {http://www.research.ge.com/~bushsf/pdfpapers/nvaprecis.pdf}, note = {White Paper}, tags = {discovery, analysis, data-flow, security, access control, data-flow analysis}, researchr = {https://researchr.org/publication/Bush}, cites = {0}, citedby = {0}, } @article{Bush1997a, title = {A Control and Management Network for Wireless ATM Systems}, author = {Stephen Bush and Sunil Jagannath and Joseph B. Evans and Victor Frost and Gary Minden and K. Sam Shanmugan}, year = {1997}, url = {http://www.research.ge.com/~bushsf}, tags = {control systems, rule-based, deployment, network, reuse, design, mobile}, researchr = {https://researchr.org/publication/Bush1997a}, cites = {0}, citedby = {0}, journal = {ACM-Baltzer Wireless Networks (WINET)}, volume = {3}, } @techreport{Bush1998:0, title = {A Security Vulnerability Assessment Technique and Model}, author = {Stephen Bush and Bruce Barnett}, year = {1998}, month = {Jan}, url = {http://www.research.ge.com/~bushsf}, tags = {discovery, data-flow, security}, researchr = {https://researchr.org/publication/Bush1998%3A0}, cites = {0}, citedby = {0}, institution = {General Electric Corporate Research and Development Center}, number = {98CRD028}, } @article{Bush05:0, title = {A simple metric for ad hoc network adaptation}, author = {Stephen Bush}, year = {2005}, doi = {10.1109/JSAC.2005.857204}, url = {http://doi.ieeecomputersociety.org/10.1109/JSAC.2005.857204}, researchr = {https://researchr.org/publication/Bush05%3A0}, cites = {0}, citedby = {0}, journal = {jsac}, volume = {23}, number = {12}, pages = {2272-2287}, } @inproceedings{Bush2005h:0, title = {Low-Energy Network Time Synchronization as an Emergent Property}, author = {Stephen Bush}, year = {2005}, month = {Oct}, url = {http://www.research.ge.com/~bushsf}, tags = {synchronization, wireless sensor networks, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/Bush2005h%3A0}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the Fourteenth International Conference on Computer Communications and Networks (IEEE ICCCN)}, } @inproceedings{Bush2003a:0, title = {On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate Semantic Types}, author = {Stephen Bush and Todd Hughes}, year = {2003}, month = {Nov}, url = {http://www.research.ge.com/~bushsf}, tags = {data validation, rule-based, analysis, type system, Kolmogorov complexity, data-flow, data-flow analysis, incremental}, researchr = {https://researchr.org/publication/Bush2003a%3A0}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the SFI Workshop on Resilient and Adaptive Defense of Computing Networks 2003}, } @techreport{Bush2006a, title = {Characteristics of Carbon Nanotube Networks: The Impact of a Metallic Nanotube on a CNT Network}, author = {Stephen Bush and Yun Li}, year = {2006}, month = {June}, url = {http://www.research.ge.com/~bushsf/pdfpapers/2006GRC397_final_ver.pdf}, tags = {rule-based, layout, analysis, rules, design}, researchr = {https://researchr.org/publication/Bush2006a}, cites = {0}, citedby = {0}, institution = {GE Global Research}, number = {2006GRC397}, } @inproceedings{Bush02, title = {Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance}, author = {Stephen Bush}, year = {2002}, url = {http://csdl.computer.org/comp/proceedings/dance/2002/1564/00/15640534abs.htm}, tags = {optimization}, researchr = {https://researchr.org/publication/Bush02}, cites = {0}, citedby = {0}, pages = {534}, booktitle = {dance}, } @inproceedings{Bush2002b, title = {Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance}, author = {Stephen Bush}, year = {2002}, month = {May}, url = {http://www.research.ge.com/~bushsf/ftn/005-FINAL.pdf}, tags = {optimization, protocol, analysis, static analysis, Kolmogorov complexity}, researchr = {https://researchr.org/publication/Bush2002b}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE) May 29-30, 2002, San Francisco, California, USA}, } @inproceedings{Bush1996, title = {A Control and Management Network for Wireless ATM Systems}, author = {Stephen Bush and Sunil Jagannath and Joseph B. Evans and Victor Frost}, year = {1996}, month = {June}, url = {http://www-ee.uta.edu/organizations/commsoc/commsoft.html}, tags = {control systems, design, mobile}, researchr = {https://researchr.org/publication/Bush1996}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the International Communications Conference '96}, } @inproceedings{Goel2003, title = {Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches}, author = {Sanjay Goel and Stephen Bush}, year = {2003}, month = {Nov}, url = {http://www.research.ge.com/~bushsf/pdfpapers/ImmunoComplexity.pdf}, tags = {rule-based, meta-model, Kolmogorov complexity, security, compiler, information models, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/Goel2003}, cites = {0}, citedby = {0}, booktitle = {Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003}, } @article{Bush1999a:0, title = {Network Management of Predictive Mobile Networks}, author = {Stephen Bush and Victor S. Frost and Joseph B. Evans}, year = {1999}, month = {Jun}, url = {http://www.crd.ge.com/people/bush}, tags = {deployment, network, mobile}, researchr = {https://researchr.org/publication/Bush1999a%3A0}, cites = {0}, citedby = {0}, journal = {Journal of Network and Systems Management}, volume = {7}, number = {2}, } @book{Bush2001:0, title = {Active Networks and Active Network Management: A Proactive Management Framework}, author = {Stephen Bush and Amit B. Kulkarni}, year = {2001}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, application framework, meta-model, modeling, architecture, model-driven development, source-to-source, security, e-science, information models, Meta-Environment, taxonomy, open-source}, researchr = {https://researchr.org/publication/Bush2001%3A0}, cites = {0}, citedby = {0}, publisher = {Kluwer Academic/Plenum Publishers}, isbn = {0-306-46560-4}, } @article{Bush1996b:0, title = {Mobile ATM Buffer Capacity Analysis}, author = {Stephen Bush and Joseph B. Evans and Victor Frost}, year = {1996}, month = {February}, url = {http://www.crd.ge.com/people/bush}, tags = {points-to analysis, analysis, source-to-source, Meta-Environment, buffer, mobile, open-source}, researchr = {https://researchr.org/publication/Bush1996b%3A0}, cites = {0}, citedby = {0}, journal = {ACM-Baltzer Mobile Networks and Nomadic Applications (NOMAD)}, volume = {1}, number = {1}, } @article{Bush1999:0, title = {Brittle System Analysis}, author = {Stephen Bush and John Hershey and Kirby Vosburgh}, year = {1999}, month = {Apr}, url = {http://www.research.ge.com/~bushsf}, tags = {operating system, analysis}, researchr = {https://researchr.org/publication/Bush1999%3A0}, cites = {0}, citedby = {0}, } @article{KulkarniB06, title = {Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics}, author = {Amit B. Kulkarni and Stephen Bush}, year = {2006}, doi = {10.1007/s10922-005-9016-3}, url = {http://dx.doi.org/10.1007/s10922-005-9016-3}, tags = {Kolmogorov complexity}, researchr = {https://researchr.org/publication/KulkarniB06}, cites = {0}, citedby = {0}, journal = {jnsm}, volume = {14}, number = {1}, pages = {69-80}, } @inproceedings{Bush2003i, title = {Extended Abstract: Complexity and Vulnerability Analysis}, author = {Stephen Bush}, year = {2003}, month = {Jun}, url = {http://dimacs.rutgers.edu/Workshops/Inference/abstracts.html}, tags = {rule-based, protocol, points-to analysis, analysis, Kolmogorov complexity, data-flow, source-to-source, data-flow analysis, open-source}, researchr = {https://researchr.org/publication/Bush2003i}, cites = {0}, citedby = {0}, booktitle = {Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003}, } @article{Bush2003o:0, title = {Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches}, author = {Stephen Bush and Sanjay Goel}, year = {2003}, month = {Nov}, url = {http://www.research.ge.com/~bushsf}, tags = {rule-based, meta-model, Kolmogorov complexity, security, compiler, information models, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/Bush2003o%3A0}, cites = {0}, citedby = {0}, journal = {Complexity Journal}, volume = {9}, number = {2}, } @article{Bush2004:0, title = {Genetically Induced Communication Network Fault Tolerance}, author = {Stephen Bush}, year = {2003}, doi = {10.1002/cplx.20002}, url = {http://www.research.ge.com/~bushsf/pdfpapers/ComplexityJournal.pdf}, tags = {meta programming, protocol, architecture, programming paradigms, code generation, programming, genetic programming, type theory, Meta-Environment}, researchr = {https://researchr.org/publication/Bush2004%3A0}, cites = {0}, citedby = {0}, journal = {Complexity Special Issue: "Resilient \& Adaptive Defense of Computing Networks"}, volume = {9}, number = {2}, } @techreport{Bush2006:0, title = {Nano-Communications: A New Field? An Exploration into a Carbon Nanotube Communication Network}, author = {Stephen Bush and Yun Li}, year = {2006}, month = {February}, url = {http://www.research.ge.com/\~{}bushsf/pdfpapers/2006GRC066\_Final\_ver.pdf}, tags = {layout, meta-model, protocol, graph-rewriting, information models, Meta-Environment, rewriting, routing, systematic-approach}, researchr = {https://researchr.org/publication/Bush2006%3A0}, cites = {0}, citedby = {0}, institution = {GE Global Research}, number = {2006GRC066}, }