Autonomic Computing Reading List


 

Introduction:

1.       “The Vision of Autonomic Computing.” Jeffrey O. Kephart, David M. Chess, IEEE Computer 36(1): 41-50 2003.

2.       “Autonomic Computing: The Evolution Continues. Data Management Strategies,” 01-07-2002.

3.       “Helping Computers Help Themselves,” David Pescovitz, Contributing Editor, Special R&D Report.

4.       "Autonomic computing and Grid", Pratap Pattnaik, Kattamuri Ekanadham, and Joefon Jann, Thomas J. Watson Research Center, Yorktown Heights, New York.

5.        “Autonomic Computing: IBM's Perspective on the State of Information Technology,” P. Horn, IBM Corporation, October 15, 2001.

6.       “NASA Challenges in Autonomic Computing,” D. J. Clancy, Almaden Institute 2002, IBM Almaden Research Center, San Jose, CA, April 10, 2002.

7.       “Autonomic Personal Computing,” D. F. Bantz, C. Bisdikian, C. Challener, J. P. Karidis, S. Mastrianni, A. Mohindra, D. G. Shea, and M. Vanover, IBM Systems Journal 42, No. 1, 165-176, 2003.

8.       “Back to the Future: Time to Return to Some Long-Standing Problems in Computer Science,” J. Hennessy, Almaden Institute 2002, IBM Almaden Research Center, San Jose, CA, April 10, 2002.

9.       “The Dawning of the Autonomic Computing Era,” A. G. Ganek and T. A. Corbi, IBM Systems Journal 42, No. 1, 5-18, 2003.

  Projects:

1.       AutoMate: Enabling Autonomic Grid Applications,” M. Agarwal, V. Bhatt, H. Liu, V. Putty, C. Schmidt, G. Zhang, L. Zhen and M. Parashar. CAIP Technical Report # TR-269.

2.       “Comparing Autonomic and Proactive Computing,” R. Want, T. Pering, and D. Tennenhouse, IBM Systems Journal 42, No. 1, 129-135 2003.

3.       Dynamic Light-Weight Groups Cornell University Technical Report, Katherine Guo and Luis Rodrigues, TR96-1612, October, 1996

4.       “SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network,” Yan Chen, Randy H. Katz, and John D. Kubiatowicz, Proceedings of the International Conference on Pervasive Computing, August 2002.

5.       “To Err is Human,” Brown, A. and D. A. Patterson, Proceedings of the First Workshop on Evaluating and Architecting System dependability (EASY '01), Göteborg, Sweden, July 2001.

6.       “Optimal grid-clustering: Towards breaking the curse of dimensionality,” A. Hinneburg and D. Keim, VLDB Conference, 1999.

7.       “CATALINA: A Smart Application Control and Management”, Salim Hariri, C.S. Raghavendra, Yonhee Kim, Muhamad Djunaedi, Rinda P. Nellipudi, Ashok Rajagopalan, Prasad Vadlamani, Yeliang Zhang, 2nd NSF Active Middleware Services Workshop, Pittsburgh, August 2000.

8.       Autonomia http://www.ece.arizona.edu/~hpdc/projects/AUTONOMIA/

9.       Web Services Toolkit, http://www.alphaworks.ibm.com/tech/webservices toolkit, AlphaWorks, IBM Corporation, July 26, 2000.

10.   “SRIRAM: A Scalable Resilient Autonomic Mesh,” D. C. Verma, S. Sahu, S. Calo, A. Shaikh, I. Chang, and A. Acharya, IBM Systems Journal 42, No. 1, 19-28, 2003.

11.   “Clockwork: A New Movement in Autonomic Systems,” L. W. Russell, S. P. Morgan, and E. G. Chron, IBM Systems Journal 42, No. 1, 77-84, 2003.

Applications Specific Projects:

1.        “Autonomic Optimization of an Oil Reservoir using Decentralized Services,” V. Matossian and M. Parashar, submitted for publication, February 2003. 

2.         “An Approach to Autonomizing Legacy Systems,” Gail Kaiser, Phil Gross, Gaurav Kc, Janak Parekh and Giuseppe Valetto, workshop on Self-Healing, Adaptive and Self-MANaged Systems, June 2002.

3.        “Adaptive Control of Distributed Applications,” Ribler, R. L., Vetter, J. S., Smtc, H., and Reed, D. A. Autopilot, Proceedings of the Seventh IEEE Symposium on High- Performance Distributed Computing, Chicago, Illinois, July 1998.

4.        “A parallel CORBA component model for numerical code coupling”, Christian Pérez, Thierry Priol and André Ribes, the 3rd international workshop on Grid computing, number of 2536 of LNCS, Baltimore, Maryland, pages 88-99, November 2002.

Programming:

1.       “Learning to act using real-time dynamic programming,” Barto, A., Bradtke, S., & Singh, S. (1995). Artificial Intelligence, 72, 81-138.

2.       “Aspect-oriented programming,” Gregor Kiczales, John Lamping, Anurag Mendhekar, Chris Maeda, Cristina Videira Lopes, Jean-Marc Loingtier, John Irwin, Proceedings of the European Conference on Object-Oriented Programming (ECOOP), Finland, Springer-Verlag LNCS 1241, June 1997.

3.       “Dynamic Reconfiguration: Basic Building Blocks for Autonomic Computing on IBM pSeries Servers,” J. Jann, L. A. Browning, and R. S. Burugula, IBM Systems Journal 42, No. 1, 29-37, 2003.

 

Middleware:

1.       “Reconfigurable context-sensitive middleware for pervasive computing”, Stephen S. Yau, Fariaz Karim, Yu Wang, Bin Wang, and Sandeep K.S. Gupta, Arizona State University.

2.       “Maintenance-Free Global Data Storage,” Sean Rhea, Chris Wells, Patrick Eaton, Dennis Geels, Ben Zhao, Hakim Weatherspoon, and John Kubiatowicz. IEEE Internet Computing, Vol 5, No 5, September/October 2001, pp 40-49.

3.       “Towards a Common API for Structured Peer-to-Peer Networks,” Frank Dabek, Ben Zhao, Peter Druschel, John Kubiatowicz, and Ion Stoica, Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), February 2003.

4.       eLiza: Building an Intelligent Infrastructure for E-business-Technology for a Self-Managing Server Environment,” IBM Server Group, G520-9592-00, IBM Corporation, 2001.

5.       “Enabling Autonomic Behavior in Systems Software with Hot Swapping,” J. Appavoo, K. Hui, C. A. N. Soules, R. W. Wisniewski, D. M. Da Silva, O. Krieger, M. A. Auslander, D. J. Edelsohn, B. Gamsa, G. R. Ganger, P. McKenney, M. Ostrowski, B. Rosenburg, M. Stumm, and J. Xenidis, IBM Systems Journal 42, No. 1, 60-76, 2003.

Agent Systems:

1.       Shopbot Economics. Autonomous Agents and Multi-Agent Systems,” Jeffrey O. Kephart, Amy R. Greenwald 5(3): 255-287, 2002.

2.      “Autonomous agents for business process management,” N. Jennings, P. Faratin, T. Norman, P. O'Brien, and B. Odgers, International Journal of Applied Artificial Intelligence.

3.       “ABLE: A toolkit for building multiagent autonomic systems,” J. P. Bigus, D. A. Schlosnagle, J. R. Pilgrim, W. N. Mills III, and Y. Diao, Artificial Intelligence, Vol. 41, No. 3, 2002, p. 350

4.       “A Mobile Agent Approach to Lightweight Process Workflow,” Gail Kaiser, Adam Stone and Stephen Dossick.  Position paper in International Process Technology Workshop, September 1999.

5.       “A Mobile Agent Approach to Process-Based Dynamic Adaptation of Complex Software Systems,” Giuseppe Valetto, Gail E. Kaiser, Gaurav S. Kc: EWSPT 2001: 102-116

6.       Proceedings of the International Conference on Autonomous Agents, ACM, Montreal, Canada, 2001. http://autonomousagents.org/

Workflows:

1.       “A Workflow Automation System for Care Plans,” Wenke Lee, Gail E. Kaiser, Paul D. Clayton, and Eric H. Sherman. OzCare, Journal of the American Medical Informatics Association: 1996 AMIA Annual Fall Symposium, Hanley & Belfus, Inc., Symposium Supplement, October 1996, pp. 577-581.

2.       “Pricing in Agent Economies Using Multi-Agent Q-Learning,” Gerald Tesauro, Jeffrey O. Kephart Autonomous Agents and Multi-Agent Systems 5(3): 289-304 2002.

3.       “Collaborative Work: SWAP: Leveraging the Web To Manage Workflow,” Gregory Alan Bolcer, Gail E. Kaiser, IEEE Internet Computing 3(1): 85-88, 1999.

4.       “Competitive Algorithms for the Dynamic Selection of Component Implementations,” D. M. Yellin, IBM Systems Journal 42, No. 1, 85-97, 2003.

Security:

1.       “Security in an Autonomic Computing Environment,” D. M. Chess, C. C. Palmer, and S. R. White, IBM Systems Journal 42, No. 1, 107-118 ,2003.

2.       BlueBox : A Policy-Driven, Host-Based Intrusion Detection System ,” Suresh N. Chari, Pau-Chen Cheng,  NDSS'02.

3.       “Intrusion detection with mobile agents,” Wayne A. Jansen, ELSEVIER, Computer communications, p. 1392-1401 Volume 25, Issue 15, 2002.

4.       “Security architecture testing using IDS--a case study”, Theuns Verwoerd and Ray Hunt, ELSEVIER, Computer communications, p. 1402-1412  Volume 25, Issue 15, 2002.

5.       “Intrusion detection inter-component adaptive negotiation,” R. Feiertag, S. Rho, L. Benzinger, S. Wu, T. Redmond, C. Zhang, K. Levitt, D. Peticolas, M. Heckman, S. Staniford, and J. McAlerney, Computer Networks, 34:605--621, 2000.

6.       “Role-Based Access Control Models,” Ravi Sandhu, E.C., Hal Feinstein, Charles Youman, IEEE Computer, 1996.

7.       “Generalized Role-Based Access Control for Securing Future Applications,” Michael J. Covington, M.J.M., Mustaque Ahamad,  National Information Systems Security Conference (NISSC), 2000.

8.       “The NIST Model for Role-Based Access Control: Towards A Unified Standard,” R. Sandhu, D.Ferraiolo, R. Kuhn, Proceedings of 5th ACM Workshop on Role Based Access Control, Berlin Germany, 2000.

9.       “Role Templates for Content-Based Access Control,” Iglio, L.G.a.P, Proceedings of the Second ACM Workshop on Role Based Access Control , Virginia, USA, 1997.

10.   “Securing Context-Aware Applications Using Environment Roles,” Michael J. Covington, W.L., Srividhya Srinivasan, Anind Dey, Mustaque Ahamad, and Gregory Abowd. Symposium on Access Control Models and Technologies (SACMAT '01), Chantilly, Virginia, USA 2001.

11.   “Role-Based Access Control With X.509 Attribute Certificates,” David W. Chadwick, Alexander Otenko, Edward Ball, Internet computing, pp.62-69, 2003.

12.   “A Community Authorization Service for Group Collaboration,” L. Pearlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke, Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2002.

13.   “A National-Scale Authentication Infrastructure,” R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, V. Welch. IEEE Computer, 33(12):60-66, 2000.

14.   “A Security Architecture for Computational Grids,” I. Foster, C. Kesselman, G. Tsudik, S. Tuecke. Proc. 5th ACM Conference on Computer and Communications Security Conference, pp. 83-92, 1998.

15.   “Certificate-Based Access Control For Widely Distributed Resources,” Mary Thompson, M., W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, A. Essiari. Usenix Security Symposium, 1999.

16.   “Security Implications of Typical Grid Computing Usage Scenarios,” Humphrey, Thompson Oct 2000 http://www.gridforum.org/2_SEC/SEC.htm

17.   “Trust-Based Security in Pervasive Computing Environments,” Lalana Kagal, T.F., Anupam Joshi, IEEE Computer, 2001. 34(12): p. 154-157.

18.   “Decentralized Trust Management,” M. Blaze, J. Feigenbaum and J. Lacy, IEEE Symposium on Security and Privacy, Oakland, CA. May 1996.

19.   “Negotiating Trust on the Web,” Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Brian Smith and Lina Yu, IEEE Internet Computing, November-December, 2002.

Messaging:

1.       “Design and Evaluation of a Wide-Area Event Notification Service,” A. Carzaniga, D.S. Rosenblum, and A.L. Wolf. ACM Transactions on Computer Systems, 19(3):332-383, Aug 2001.

2.       “Gryphon: An Information Flow Based Approach to Message Brokering,” International Symposium on Software Reliability Engineering '98 Fast Abstract.  http://www.research.ibm.com/gryphon/Our_Research/Research_Papers/ext-abstract.htm

3.       “Publish/Subscribe on the Web at Extreme Speed,” Françoise Fabret  and François Llirbat and João Pereira, Proceedings of 26th VLDB conference, Cairo, Egypt, 2000.

4.       Narada Brokering: A Middleware Framework and Architecture for Enabling Durable Peer-to-Peer Grids,” Shrideep Pallickara and Geoffrey Fox, (To appear) Proceedings of ACM/IFIP/USENIX International Middleware Conference Middleware-2003.

5.       “Enabling Peer-to-Peer Interactions for Scientific Applications on the Grid,” Vincent Matossian and Manish Parashar, (To appear) Proceedings of EuroPar03, Klagenfurt, Austria,2003.

6.       “ICENI: An Open Grid Service Architecture Implemented with Jini,” Nathalie Furmento and William Lee and Anthony Mayer and Steven Newhouse and John Darlington, SuperComputing (SC2002), Baltimore, MD, USA,2002.

7.       XEvents/XMessages: Application Events and Messaging Framework for Grid,” Aleksander Slominski and Yogesh L. Simmhan and Albert Louis Rossi and Matt Farrellee and Dennis Gannon, Indiana University, September 2002, http://www.extreme.indiana.edu/xgws/papers/xevents\_xmessages\_tr.pdf

8.       “Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications,” Ion Stoica and Robert Morris and David Karger and M. Frans Kaashoek and Hari Balakrishnan, Proceedings of the ACM SICOMM'01 Conference, San Diego, California, August 2001.

9.       “A scalable content-addressable network,” Sylvia Ratnasamy and Paul Francis and Mark Handley and Richard Karp and Scott Schenker, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, San Diego, California, 2001.

10.   “Flexible Information Discovery in Decentralized Distributed Systems,” Cristina Schmidt and Manish Parashar, Accepted for publication at HPDC 12, 2003.

Management:

1.       “Toward a New Landscape of Systems Management in an Autonomic Computing Environment,” G. Lanfranchi, P. Della Peruta, A. Perrone, and D. Calvanese, IBM Systems Journal 42, No. 1, 119-128, 2003.

2.       “Automated Tutoring in Interactive Environments: A Task-Centered Approach,” Ursula Wolz, Kathleen R. McKeown and Gail E. Kaiser, International Journal of Machine Mediated Learning, Taylor & Francis, 3(1):53-79, 1989.

3.       “Using Process Technology to Control and Coordinate Software Adaptation,” Giuseppe Valetto and Gail Kaiser, International Conference on Software Engineering, May 2003.

4.       “Embracing Failure: A Case for Recovery-Oriented Computing (ROC),” Brown, A. and D. A. Patterson, 2001 High Performance Transaction Processing Symposium, Asilomar, CA, October 2001.

5.       “FIG: A Prototype Tool for Online Verification of Recovery Mechanisms,” Broadwell, P., N. Sastry and J. Traupman, (To appear)Workshop on Self-Healing, Adaptive and self-MANaged Systems (SHAMAN), New York, NY, June 2002.

6.       “IBM Data Management Tools: New Opportunities for Cost-Effective Administration,” Profile Report, Aberdeen Group, Inc., Boston, April 2002, p. 3.

7.       “A System Model for Dynamically Reconfigurable Software,” K. Whisnant, Z. T. Kalbarczyk, and R. K. Iyer, IBM Systems Journal 42, No. 1, 45-59 2003.

8.       “LEO: An Autonomic Query Optimizer for DB2,” V. Markl, G. M. Lohman, and V. Raman, IBM Systems Journal 42, No. 1, 98-106 2003.

9.       “Self-Repairing Computers,” Armando Fox and David Patterson, Scientific American, May 12, 2003.

Economics:

1.       “Automated strategy searches in an electronic goods market: learning and complex price schedules,” Christopher H. Brooks, Scott Fay, Rajarshi Das, Jeffrey K. MacKie-Mason, Jeffrey O. Kephart, Edmund H. Durfee, ACM Conference on Electronic Commerce 1999: 31-40.

2.       “Advancing E-business into the Future: The Grid,” Wladawsky-Berger, Kennedy Consulting Summit 2001, New York, November 29, 2001.

Miscellaneous:

1.       “Federating Process-Centered Environments: The Oz Experience,” Israel Ben-Shaul, Gail E. Kaiser, Automated Software Engineering 5(1): 97-132, 1998.

2.       “A Rule Engine for Query Transformation in Starburst and IBM DB2 C/S DBMS,” Pirahesh, Hamid, Leung, T.Y.Cliff, Hasan Waqar, Data Engineering Proceedings 13th International Conference 1997.

3.       “No Silver Bullet: Essence and Accidents of Software Engineering,” F. P. Brooks, Jr., The Mythical Man-Month: Essays on Software Engineering, Twentieth Anniversary Edition, Addison- Wesley Publishing Co., Reading, MA(1995), p. 226. See also, F. P. Brooks, Jr., Computer 20, No. 4, 10-19 1987.

4.       “Affect and Machine Design: Lessons for the Development of Autonomous Machines,” D. A. Norman, A. Ortony, and D. M. Russell, IBM Systems Journal 42, No. 1, 38-44 2003.

5.       “Anatomy of a Commercial-Grade Immune System,” S. R. White, M. Swimmer, E. Pring, W. Arnold, D. Chess, and J. F. Morar, Proceedings of the Ninth International Virus Bulletin Conference, 1999.

6.       “Architecture for an Artificial Immune System,” S. Hofmeyr and S. Forrest, Evolutionary Computation 7, No. 1, 1289-1296 2000.

7.       Rule Markup Language: http://www.dfki.uni-kl.de/ruleml

8.       ILOG JRules: http://www.ilog.com/products/rules/engines/jrules

9.       Extensible Rule Markup Language: http://xml.coverpages.org/extensibleRuleML.html

10.   Jess: http://herzberg.ca.sandia.gov/jess