ACM DL

Autonomous and Adaptive Systems (TAAS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012, Volume 8 Issue 4, January 2014

Introduction to the Special Section on Best Papers from SEAMS 2012
Luciano Baresi, Hausi Müller
Article No.: 16
DOI: 10.1145/2555610

A Systematic Survey of Self-Protecting Software Systems
Eric Yuan, Naeem Esfahani, Sam Malek
Article No.: 17
DOI: 10.1145/2555611

Self-protecting software systems are a class of autonomic systems capable of detecting and mitigating security threats at runtime. They are growing in importance, as the stovepipe static methods of securing software systems have been shown to be...

Model-Driven Engineering of Self-Adaptive Software with EUREMA
Thomas Vogel, Holger Giese
Article No.: 18
DOI: 10.1145/2555612

The development of self-adaptive software requires the engineering of an adaptation engine that controls the underlying adaptable software by feedback loops. The engine often describes the adaptation by runtime models representing the adaptable...

Adaptive Epidemic Dynamics in Networks: Thresholds and Control
Shouhuai Xu, Wenlian Lu, Li Xu, Zhenxin Zhan
Article No.: 19
DOI: 10.1145/2555613

Theoretical modeling of computer virus/worm epidemic dynamics is an important problem that has attracted many studies. However, most existing models are adapted from biological epidemic ones. Although biological epidemic models can certainly be...

CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
Krishna K. Venkatasubramanian, Tridib Mukherjee, Sandeep K. S. Gupta
Article No.: 20
DOI: 10.1145/2555614

The article presents an access control model called Criticality Aware Access Control (CAAC) for criticality (emergency) management in smart infrastructures. Criticalities are consequences of events which take a system (in our case, a smart...

A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment
Songqing Chen, Lei Liu, Xinyuan Wang, Xinwen Zhang, Zhao Zhang
Article No.: 21
DOI: 10.1145/2555615

The fast-spreading worm, which immediately propagates itself after a successful infection, is becoming one of the most serious threats to today’s networked information systems. In this article, we present WormTerminator, a host-based...