Abstract is missing.
- Error in Self-Stabilizing Spanning-Tree Estimation of Collective StateYuanqiu Mo, Jacob Beal, Soura Dasgupta. 1-6 [doi]
- Model-Driven Engineering of Decentralized Control in Cyber-Physical SystemsMirko D'Angelo, Mauro Caporuscio, Annalisa Napolitano. 7-12 [doi]
- Parameterisation and Optimisation Patterns for MAPE-K Feedback LoopsVerena Klös, Thomas Göthel, Sabine Glesner. 13-18 [doi]
- Towards a Domain Specific Language for Engineering Collective Adaptive SystemsAntonio Bucchiarone, Antonio Cicchetti, Martina de Sanctis. 19-26 [doi]
- Towards a Foundational API for Resilient Distributed Systems DesignMatteo Francia, Danilo Pianini, Jacob Beal, Mirko Viroli. 27-32 [doi]
- The Principled Violation of Policy: Norm Flexibilization in Open Self-Organising SystemsDavid Burth Kurka, Jeremy Pitt. 33-38 [doi]
- RoleDiSCo: A Middleware Architecture and Implementation for Coordinated On-Demand Composition of Smart Service Systems in Decentralized EnvironmentsMarkus Wutzler, Thomas Springer, Alexander Schill. 39-44 [doi]
- For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open SystemsJeremy Pitt, Emma Hart. 45-50 [doi]
- Configuration Management for QoS Adaptation in Multi-Vehicle Cruise Control SystemsArun Adiththan, Kaliappa Ravindran. 51-56 [doi]
- Predicting Coalition Formation in South China Sea Disputes: An Analysis with an Agent-Based ModelLi Ding. 57-63 [doi]
- Instance-Based Learning for Hybrid PlanningAshutosh Pandey 0002, Bradley R. Schmerl, David Garlan. 64-69 [doi]
- Towards Large-Scale Material-Integrated Computing: Self-Adaptive Materials and AgentsStefan Bosse, Dirk Lehmhus. 70-78 [doi]
- Distributive Justice for Fair Auto-Adaptive Clusters of Connected VehiclesJulian Pedro Garbiso, Ada Diaconescu, Marceau Coupechoux, Jeremy Pitt, Bertrand Leroy. 79-84 [doi]
- Smart-CPR: Self-Organisation and Self-Governance in the Sharing EconomyDavid Burth Kurka, Jeremy Pitt. 85-90 [doi]
- Social and Asocial Learning in Collective Action Problems: The Rise and Fall of Socially-Beneficial BehaviourPeter R. Lewis, Anikó Ekárt. 91-96 [doi]
- Knowledge Management Processes and Design Principles for Self-Governing Socio-Technical SystemsJeremy Pitt, Josiah Ober, Ada Diaconescu. 97-102 [doi]
- Situation-Based Autonomic Management of Automobile Cruise Control SystemsArun Adiththan, Kaliappa Ravindran, Ramesh S.. 103-108 [doi]
- Learning to Learn: Dynamic Runtime Exploitation of Various Knowledge Sources and Machine Learning ParadigmsAdrian Calma, Daniel Kottke, Bernhard Sick, Sven Tomforde. 109-116 [doi]
- Integration by Negotiated Behavior RestrictionsChristopher Landauer, Kirstie L. Bellman. 117-121 [doi]
- Adapting Compliance of Security Requirements in Multi-Tenant ApplicationsSarra M. Alqahtani, Xinchi He, Rose F. Gamble. 122-129 [doi]
- Managing a Posteriori FederationsCraig A. Lee. 130-131 [doi]
- Cue Integration by Similarity Rank List Coding - Application to Invariant Object RecognitionRaul Grieben, Rolf P. Würtz. 132-137 [doi]
- System Discovery through Neocortical Architectures and Experimental PlayJacob S. Everist. 138 [doi]
- Ensuring Appropriate Use of Computational Resources in Interwoven SystemsPhyllis R. Nelson. 139-143 [doi]
- Models and Methods for a High Autonomy, Self-Improving Surgical Training SystemJerzy W. Rozenblit. 144-145 [doi]
- The SISSY Challenge: Expected and Unexpected IntegrationKirstie L. Bellman. 146-147 [doi]
- Self-Integrating and Self-Improving Systems Must Be Socially SensitivePeter R. Lewis. 148 [doi]
- Workflow Automation for Partially Hosted Cloud ServicesHanin Abubaker, Khaled Salah. 149-154 [doi]
- BDLaaS: Big Data Lab as a Service for Experimenting Big Data SolutionYehia Taher, Rafiqul Haque, Mohand-Said Hacid. 155-159 [doi]
- Autonomic Cross-Layer Management of Cloud SystemsCihan Tunc, Farah Fargo, Youssif B. Al-Nashif, Salim Hariri. 160-165 [doi]
- Autonomic Fall Detection SystemAhmet Turan Özdemir, Cihan Tunc, Salim Hariri. 166-170 [doi]
- Enabling Multi-Level Data Fault Tolerance on Software-Defined Storage SystemShuo-Han Chen, Yung-Chun Chang, Tseng-Yi Chen, Min-Hong Shen, Hsin-Wen Wei, Tsan-sheng Hsu, Wei Kuan Shih. 171-174 [doi]
- Into the Storm: Descrying Optimal Configurations Using Genetic Algorithms and Bayesian OptimizationMichael Trotter, Guyue Liu, Timothy Wood. 175-180 [doi]
- A Host-Independent Supervised Machine Learning Approach to Automated Overload Detection in Virtual Machine WorkloadsEli M. Dow, Jeanna N. Matthews. 181-186 [doi]
- An Incremental Approach to Data Integration in Presence of Access Control PoliciesMokhtar Sellami 0002, Mohand-Said Hacid, Mohamed Mohsen Gammoudi. 187-190 [doi]
- FID: A Faster Image Distribution System for Docker PlatformWang Kangjin, Yang Yong, Li Ying, Luo Hanmei, Ma Lin. 191-198 [doi]
- In Search of the Ideal Storage Configuration for Docker ContainersVasily Tarasov, Lukas Rupprecht, Dimitris Skourtis, Amit Warke, Dean Hildebrand, Mohamed Mohamed, NagaPramod Mandagere, Wenji Li, Raju Rangaswami, Ming Zhao 0002. 199-206 [doi]
- Auto-Scaling of Containers: The Impact of Relative and Absolute MetricsEmiliano Casalicchio, Vanessa Perciballi. 207-214 [doi]
- Quality of Service Models for Microservices and Their Integration into the SWITCH IDEPolona Stefanic, Matej Cigale, Andrew Jones, Vlado Stankovski. 215-218 [doi]
- SWITCH-ing from Multi-Tenant to Event-Driven Videoconferencing ServicesJernej Trnkoczy, Uros Pascinski, Sandi Gec, Vlado Stankovski. 219-226 [doi]
- Integrating Short History for Improving Clustering Based Network Traffic Anomaly DetectionJuliette Dromard, Philippe Owezarski. 227-234 [doi]
- Tracing Distributed Data Stream Processing SystemsZoltan Zvara, Péter G. N. Szabó, Gábor Hermann, András A. Benczúr. 235-242 [doi]
- Fraud Analysis Approaches in the Age of Big Data - A Review of State of the ArtSara Makki, Rafiqul Haque, Yehia Taher, Zainab Assaghir, Gregory Ditzler, Mohand-Said Hacid, Hassan Zeineddine. 243-250 [doi]
- Analysis of Service-Oriented DBMS OrganizationWoong Sul, Heon Young Yeom, Kwangil Cho, Hyungsoo Jung. 251-256 [doi]
- A Case Study of Leveraging High-Throughput Distributed Message Queue System for Many-Task Computing on HadoopCao Ngoc Nguyen, Jik-Soo Kim, Jaehwan Lee, Soonwook Hwang. 257-262 [doi]
- Performance Optimization of Communication Subsystem in Scale-Out Distributed StorageUiseok Song, Bodon Jeong, Sungyong Park, Kwonyong Lee. 263-268 [doi]
- OMBM: Optimized Memory Bandwidth Management for Ensuring QoS and High Server UtilizationHanul Sung, Jeesoo Min, Sujin Ha, Hyeonsang Eom. 269-276 [doi]
- ZonFS: A Storage Class Memory File System with Memory Zone Partitioning on LinuxJang Woong Kim, Jae-Hoon Kim, Awais Khan, Youngjae Kim, Sungyong Park. 277-282 [doi]
- SuperMan: A Novel System for Storing and Retrieving Scientific-Simulation Provenance for Efficient Job Executions on Computing ClustersYoung-Kyoon Suh, Jin Ma. 283-288 [doi]
- A Study on Optimal Scheduling Using High-Bandwidth Memory of Knights Landing ProcessorSeungwoo Rho, Geunchul Park, Jik-Soo Kim, Seoyoung Kim, Dukyun Nam. 289-294 [doi]
- A Hybrid Cloud Resource Clustering Method Using Analysis of Application CharacteristicsYoori Oh, Yoonhee Kim. 295-300 [doi]
- A Scattering Technique for Protecting Cryptographic Keys in the CloudFatma Mohamed, Bushra AlBelooshi, Khaled Salah, Chan Yeob Yeun, Ernesto Damiani. 301-306 [doi]
- Cloud Security Automation FrameworkCihan Tunc, Salim Hariri, Mheni Merzouki, Charif Mahmoudi, Frederic J. de Vaulx, Jaafar Chbili, Robert Bohn, Abdella Battou. 307-312 [doi]
- Cyber Security Assistant: Design OverviewCarla Sayan, Salim Hariri, George Ball. 313-317 [doi]
- Real-Time IRC Threat Detection FrameworkSicong Shao, Cihan Tunc, Pratik Satam, Salim Hariri. 318-323 [doi]
- Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection SystemJesus Pacheco, Xiaoyang Zhu, Youakim Badr, Salim Hariri. 324-328 [doi]
- Identifying the Cyber Attack Origin with Partial Observation: A Linear Regression Based ApproachMohammed Lalou, Hamamache Kheddouci, Salim Hariri. 329-333 [doi]
- AnomalyDetect: Anomaly Detection for Preserving Availability of Virtualized Cloud ServicesMichael Anthony August, Mamadou H. Diallo, Christopher T. Graves, Scott M. Slayback, Dillon Glasser. 334-340 [doi]
- Trends towards Bio-Inspired Security Countermeasures for Cloud EnvironmentsSiyakha N. Mthunzi, Elhadj Benkhelifa. 341-347 [doi]
- DDDAMS-Based Border Surveillance and Crowd Control via Aerostats, UAVs, and Ground SensorsSeunghan Lee, Sara Minaeian, Yifei Yuan, Jian Liu, Young Jun Son. 348-351 [doi]
- Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design OverviewSalim Hariri, Cihan Tunc, Youakim Badr. 352-356 [doi]
- Pulsar: Enabling Dynamic Data-Driven IoT ApplicationsEduard Gibert Renart, Daniel Balouek-Thomert, Manish Parashar. 357-359 [doi]
- High Performance Machine Learning (HPML) Framework to Support DDDAS Decision Support Systems: Design OverviewGregory Ditzler, Salim Hariri, Ali Akoglu. 360-362 [doi]
- Cybersecurity Policies and Their Impact on Dynamic Data Driven Application SystemsConrad S. Tucker, Mathew Burrows, Kevin Lesniak, Samuel Klein. 363-365 [doi]
- Hybrid Planning in Self-Adaptive SystemsAshutosh Pandey. 366-368 [doi]
- Conflict Handling for Autonomic SystemsGilles Neyens. 369-370 [doi]
- Facilitating Planning by Using Self-OrganizationOliver Kosak. 371-374 [doi]
- An Intelligent Security Assistant for Cyber Security OperationsCarla Maria Sayan. 375-376 [doi]
- Anomaly Based Wi-Fi Intrusion Detection SystemPratik Satam. 377-378 [doi]
- Framework for Malicious HTML File DetectionSamuel Hess. 379-381 [doi]
- Real-Time Automatic Framework for IRC Threat Information DetectionSicong Shao. 382-384 [doi]
- CAStlE: A Tool for Collective Adaptive Systems EngineeringAntonio Bucchiarone, Antonio Cicchetti, Martina de Sanctis. 385-386 [doi]
- Pando: A Volunteer Computing Platform for the WebErick Lavoie, Laurie J. Hendren, Frederic Desprez. 387-388 [doi]
- Visualizing Self-Adaptive Plan Simulations Given Embedded Verification ConcernsSharmin Jahan, Allen Marshall, Rose F. Gamble. 389-390 [doi]
- Practical Aggregate Programming with ProtelisDanilo Pianini, Jacob Beal, Mirko Viroli. 391-392 [doi]