Autonomic Computing Reading List
1. “The Vision of Autonomic Computing.” Jeffrey O. Kephart, David M. Chess, IEEE Computer 36(1): 41-50 2003.
“Autonomic Computing: The Evolution Continues. Data Management
3. “Helping Computers Help Themselves,” David Pescovitz, Contributing Editor, Special R&D Report.
4. "Autonomic computing and Grid", Pratap Pattnaik, Kattamuri Ekanadham, and Joefon Jann, Thomas J. Watson Research Center, Yorktown Heights, New York.
“Autonomic Computing: IBM's
Perspective on the State of
6. “NASA Challenges in Autonomic Computing,” D. J. Clancy, Almaden Institute 2002, IBM Almaden Research Center, San Jose, CA, April 10, 2002.
7. “Autonomic Personal Computing,” D. F. Bantz, C. Bisdikian, C. Challener, J. P. Karidis, S. Mastrianni, A. Mohindra, D. G. Shea, and M. Vanover, IBM Systems Journal 42, No. 1, 165-176, 2003.
8. “Back to the Future: Time to Return to Some Long-Standing Problems in Computer Science,” J. Hennessy, Almaden Institute 2002, IBM Almaden Research Center, San Jose, CA, April 10, 2002.
9. “The Dawning of the Autonomic Computing Era,” A. G. Ganek and T. A. Corbi, IBM Systems Journal 42, No. 1, 5-18, 2003.
1. “AutoMate: Enabling Autonomic Grid Applications,” M. Agarwal, V. Bhatt, H. Liu, V. Putty, C. Schmidt, G. Zhang, L. Zhen and M. Parashar. CAIP Technical Report # TR-269.
2. “Comparing Autonomic and Proactive Computing,” R. Want, T. Pering, and D. Tennenhouse, IBM Systems Journal 42, No. 1, 129-135 2003.
4. “SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network,” Yan Chen, Randy H. Katz, and John D. Kubiatowicz, Proceedings of the International Conference on Pervasive Computing, August 2002.
“To Err is Human,” Brown, A.
and D. A. Patterson, Proceedings of the First Workshop on Evaluating and
Architecting System dependability (EASY '01),
6. “Optimal grid-clustering: Towards breaking the curse of dimensionality,” A. Hinneburg and D. Keim, VLDB Conference, 1999.
7. “CATALINA: A Smart Application Control and Management”, Salim Hariri, C.S. Raghavendra, Yonhee Kim, Muhamad Djunaedi, Rinda P. Nellipudi, Ashok Rajagopalan, Prasad Vadlamani, Yeliang Zhang, 2nd NSF Active Middleware Services Workshop, Pittsburgh, August 2000.
8. Autonomia http://www.ece.arizona.edu/~hpdc/projects/AUTONOMIA/
Web Services Toolkit,
http://www.alphaworks.ibm.com/tech/webservices toolkit, AlphaWorks,
10. “SRIRAM: A Scalable Resilient Autonomic Mesh,” D. C. Verma, S. Sahu, S. Calo, A. Shaikh, I. Chang, and A. Acharya, IBM Systems Journal 42, No. 1, 19-28, 2003.
11. “Clockwork: A New Movement in Autonomic Systems,” L. W. Russell, S. P. Morgan, and E. G. Chron, IBM Systems Journal 42, No. 1, 77-84, 2003.
1. “Autonomic Optimization of an Oil Reservoir using Decentralized Services,” V. Matossian and M. Parashar, submitted for publication, February 2003.
2. “An Approach to Autonomizing Legacy Systems,” Gail Kaiser, Phil Gross, Gaurav Kc, Janak Parekh and Giuseppe Valetto, workshop on Self-Healing, Adaptive and Self-MANaged Systems, June 2002.
3. “Adaptive Control of Distributed Applications,” Ribler, R. L., Vetter, J. S., Smtc, H., and Reed, D. A. Autopilot, Proceedings of the Seventh IEEE Symposium on High- Performance Distributed Computing, Chicago, Illinois, July 1998.
4. “A parallel CORBA component model for numerical code coupling”, Christian Pérez, Thierry Priol and André Ribes, the 3rd international workshop on Grid computing, number of 2536 of LNCS, Baltimore, Maryland, pages 88-99, November 2002.
1. “Learning to act using real-time dynamic programming,” Barto, A., Bradtke, S., & Singh, S. (1995). Artificial Intelligence, 72, 81-138.
2. “Aspect-oriented programming,” Gregor Kiczales, John Lamping, Anurag Mendhekar, Chris Maeda, Cristina Videira Lopes, Jean-Marc Loingtier, John Irwin, Proceedings of the European Conference on Object-Oriented Programming (ECOOP), Finland, Springer-Verlag LNCS 1241, June 1997.
3. “Dynamic Reconfiguration: Basic Building Blocks for Autonomic Computing on IBM pSeries Servers,” J. Jann, L. A. Browning, and R. S. Burugula, IBM Systems Journal 42, No. 1, 29-37, 2003.
1. “Reconfigurable context-sensitive middleware for pervasive computing”, Stephen S. Yau, Fariaz Karim, Yu Wang, Bin Wang, and Sandeep K.S. Gupta, Arizona State University.
2. “Maintenance-Free Global Data Storage,” Sean Rhea, Chris Wells, Patrick Eaton, Dennis Geels, Ben Zhao, Hakim Weatherspoon, and John Kubiatowicz. IEEE Internet Computing, Vol 5, No 5, September/October 2001, pp 40-49.
3. “Towards a Common API for Structured Peer-to-Peer Networks,” Frank Dabek, Ben Zhao, Peter Druschel, John Kubiatowicz, and Ion Stoica, Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), February 2003.
4. “eLiza: Building an Intelligent Infrastructure for E-business-Technology for a Self-Managing Server Environment,” IBM Server Group, G520-9592-00, IBM Corporation, 2001.
5. “Enabling Autonomic Behavior in Systems Software with Hot Swapping,” J. Appavoo, K. Hui, C. A. N. Soules, R. W. Wisniewski, D. M. Da Silva, O. Krieger, M. A. Auslander, D. J. Edelsohn, B. Gamsa, G. R. Ganger, P. McKenney, M. Ostrowski, B. Rosenburg, M. Stumm, and J. Xenidis, IBM Systems Journal 42, No. 1, 60-76, 2003.
1. “Shopbot Economics. Autonomous Agents and Multi-Agent Systems,” Jeffrey O. Kephart, Amy R. Greenwald 5(3): 255-287, 2002.
“Autonomous agents for
business process management,”
3. “ABLE: A toolkit for building multiagent autonomic systems,” J. P. Bigus, D. A. Schlosnagle, J. R. Pilgrim, W. N. Mills III, and Y. Diao, Artificial Intelligence, Vol. 41, No. 3, 2002, p. 350
Proceedings of the International
Conference on Autonomous Agents, ACM,
1. “A Workflow Automation System for Care Plans,” Wenke Lee, Gail E. Kaiser, Paul D. Clayton, and Eric H. Sherman. OzCare, Journal of the American Medical Informatics Association: 1996 AMIA Annual Fall Symposium, Hanley & Belfus, Inc., Symposium Supplement, October 1996, pp. 577-581.
2. “Pricing in Agent Economies Using Multi-Agent Q-Learning,” Gerald Tesauro, Jeffrey O. Kephart Autonomous Agents and Multi-Agent Systems 5(3): 289-304 2002.
3. “Collaborative Work: SWAP: Leveraging the Web To Manage Workflow,” Gregory Alan Bolcer, Gail E. Kaiser, IEEE Internet Computing 3(1): 85-88, 1999.
4. “Competitive Algorithms for the Dynamic Selection of Component Implementations,” D. M. Yellin, IBM Systems Journal 42, No. 1, 85-97, 2003.
1. “Security in an Autonomic Computing Environment,” D. M. Chess, C. C. Palmer, and S. R. White, IBM Systems Journal 42, No. 1, 107-118 ,2003.
2. “BlueBox : A Policy-Driven, Host-Based Intrusion Detection System ,” Suresh N. Chari, Pau-Chen Cheng, NDSS'02.
3. “Intrusion detection with mobile agents,” Wayne A. Jansen, ELSEVIER, Computer communications, p. 1392-1401 Volume 25, Issue 15, 2002.
4. “Security architecture testing using IDS--a case study”, Theuns Verwoerd and Ray Hunt, ELSEVIER, Computer communications, p. 1402-1412 Volume 25, Issue 15, 2002.
5. “Intrusion detection inter-component adaptive negotiation,” R. Feiertag, S. Rho, L. Benzinger, S. Wu, T. Redmond, C. Zhang, K. Levitt, D. Peticolas, M. Heckman, S. Staniford, and J. McAlerney, Computer Networks, 34:605--621, 2000.
“Role-Based Access Control
7. “Generalized Role-Based Access Control for Securing Future Applications,” Michael J. Covington, M.J.M., Mustaque Ahamad, National Information Systems Security Conference (NISSC), 2000.
“The NIST Model for
Role-Based Access Control: Towards A Unified Standard,” R. Sandhu,
D.Ferraiolo, R. Kuhn, Proceedings of 5th ACM
Workshop on Role Based Access
“Role Templates for
Content-Based Access Control,” Iglio, L.G.a.P, Proceedings of the Second ACM Workshop on Role
10. “Securing Context-Aware
Applications Using Environment Roles,” Michael J. Covington, W.L., Srividhya Srinivasan, Anind Dey, Mustaque
Ahamad, and Gregory Abowd. Symposium
on Access Control Models and Technologies (SACMAT '01),
11. “Role-Based Access Control With X.509 Attribute Certificates,” David W. Chadwick, Alexander Otenko, Edward Ball, Internet computing, pp.62-69, 2003.
12. “A Community Authorization
Service for Group Collaboration,” L. Pearlman, V. Welch,
13. “A National-Scale
Authentication Infrastructure,” R. Butler, D. Engert,
14. “A Security Architecture for
15. “Certificate-Based Access Control For Widely Distributed Resources,” Mary Thompson, M., W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, A. Essiari. Usenix Security Symposium, 1999.
16. “Security Implications of Typical Grid Computing Usage Scenarios,” Humphrey, Thompson Oct 2000 http://www.gridforum.org/2_SEC/SEC.htm
17. “Trust-Based Security in Pervasive Computing Environments,” Lalana Kagal, T.F., Anupam Joshi, IEEE Computer, 2001. 34(12): p. 154-157.
18. “Decentralized Trust
Management,” M. Blaze, J. Feigenbaum and J. Lacy, IEEE
Symposium on Security and Privacy,
19. “Negotiating Trust on the Web,” Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Brian Smith and Lina Yu, IEEE Internet Computing, November-December, 2002.
1. “Design and Evaluation of a Wide-Area Event Notification Service,” A. Carzaniga, D.S. Rosenblum, and A.L. Wolf. ACM Transactions on Computer Systems, 19(3):332-383, Aug 2001.
2. “Gryphon: An Information Flow Based Approach to Message Brokering,” International Symposium on Software Reliability Engineering '98 Fast Abstract. http://www.research.ibm.com/gryphon/Our_Research/Research_Papers/ext-abstract.htm
4. “Narada Brokering: A Middleware Framework and Architecture for Enabling Durable Peer-to-Peer Grids,” Shrideep Pallickara and Geoffrey Fox, (To appear) Proceedings of ACM/IFIP/USENIX International Middleware Conference Middleware-2003.
Interactions for Scientific Applications on the Grid,” Vincent Matossian and Manish Parashar, (To appear) Proceedings
“ICENI: An Open Grid Service
Architecture Implemented with Jini,” Nathalie Furmento and William Lee and Anthony Mayer and Steven Newhouse and John Darlington, SuperComputing
7. “XEvents/XMessages: Application Events and Messaging Framework for Grid,” Aleksander Slominski and Yogesh L. Simmhan and Albert Louis Rossi and Matt Farrellee and Dennis Gannon, Indiana University, September 2002, http://www.extreme.indiana.edu/xgws/papers/xevents\_xmessages\_tr.pdf
8. “Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications,” Ion Stoica and Robert Morris and David Karger and M. Frans Kaashoek and Hari Balakrishnan, Proceedings of the ACM SICOMM'01 Conference, San Diego, California, August 2001.
9. “A scalable content-addressable network,” Sylvia Ratnasamy and Paul Francis and Mark Handley and Richard Karp and Scott Schenker, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, San Diego, California, 2001.
10. “Flexible Information Discovery in Decentralized Distributed Systems,” Cristina Schmidt and Manish Parashar, Accepted for publication at HPDC 12, 2003.
1. “Toward a New Landscape of Systems Management in an Autonomic Computing Environment,” G. Lanfranchi, P. Della Peruta, A. Perrone, and D. Calvanese, IBM Systems Journal 42, No. 1, 119-128, 2003.
“Automated Tutoring in
Interactive Environments: A Task-Centered Approach,” Ursula Wolz,
Kathleen R. McKeown and Gail E. Kaiser, International
Journal of Machine Mediated Learning,
3. “Using Process Technology to Control and Coordinate Software Adaptation,” Giuseppe Valetto and Gail Kaiser, International Conference on Software Engineering, May 2003.
“Embracing Failure: A Case
for Recovery-Oriented Computing (ROC),” Brown, A. and D. A. Patterson, 2001
High Performance Transaction Processing Symposium,
“FIG: A Prototype Tool for
Online Verification of Recovery Mechanisms,” Broadwell,
P., N. Sastry and J. Traupman,
(To appear)Workshop on Self-Healing,
Adaptive and self-MANaged Systems (SHAMAN),
“IBM Data Management Tools:
New Opportunities for Cost-Effective Administration,” Profile Report, Aberdeen
7. “A System Model for Dynamically Reconfigurable Software,” K. Whisnant, Z. T. Kalbarczyk, and R. K. Iyer, IBM Systems Journal 42, No. 1, 45-59 2003.
8. “LEO: An Autonomic Query Optimizer for DB2,” V. Markl, G. M. Lohman, and V. Raman, IBM Systems Journal 42, No. 1, 98-106 2003.
9. “Self-Repairing Computers,” Armando Fox and David Patterson, Scientific American, May 12, 2003.
1. “Automated strategy searches in an electronic goods market: learning and complex price schedules,” Christopher H. Brooks, Scott Fay, Rajarshi Das, Jeffrey K. MacKie-Mason, Jeffrey O. Kephart, Edmund H. Durfee, ACM Conference on Electronic Commerce 1999: 31-40.
“Advancing E-business into
the Future: The Grid,” Wladawsky-Berger, Kennedy
Consulting Summit 2001, New York,
Environments: The Oz Experience,”
2. “A Rule Engine for Query Transformation in Starburst and IBM DB2 C/S DBMS,” Pirahesh, Hamid, Leung, T.Y.Cliff, Hasan Waqar, Data Engineering Proceedings 13th International Conference 1997.
3. “No Silver Bullet: Essence and Accidents of Software Engineering,” F. P. Brooks, Jr., The Mythical Man-Month: Essays on Software Engineering, Twentieth Anniversary Edition, Addison- Wesley Publishing Co., Reading, MA(1995), p. 226. See also, F. P. Brooks, Jr., Computer 20, No. 4, 10-19 1987.
4. “Affect and Machine Design: Lessons for the Development of Autonomous Machines,” D. A. Norman, A. Ortony, and D. M. Russell, IBM Systems Journal 42, No. 1, 38-44 2003.
5. “Anatomy of a Commercial-Grade Immune System,” S. R. White, M. Swimmer, E. Pring, W. Arnold, D. Chess, and J. F. Morar, Proceedings of the Ninth International Virus Bulletin Conference, 1999.
6. “Architecture for an Artificial Immune System,” S. Hofmeyr and S. Forrest, Evolutionary Computation 7, No. 1, 1289-1296 2000.
7. Rule Markup Language: http://www.dfki.uni-kl.de/ruleml
8. ILOG JRules: http://www.ilog.com/products/rules/engines/jrules
9. Extensible Rule Markup Language: http://xml.coverpages.org/extensibleRuleML.html
10. Jess: http://herzberg.ca.sandia.gov/jess