Autonomous and Adaptive Systems (TAAS)


Search Issue
enter search term and/or author name


ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 6 Issue 4, October 2011

Manish Parashar, Franco Zambonelli
Article No.: 29
DOI: 10.1145/2019591.2019598

The Price of Anonymity: Optimal Consensus Despite Asynchrony, Crash, and Anonymity
François Bonnet, Michel Raynal
Article No.: 23
DOI: 10.1145/2019591.2019592

This article addresses the consensus problem in asynchronous systems prone to process crashes, where additionally the processes are anonymous (they cannot be distinguished one from the other: they have no name and execute the same code). To...

Effective Usage of Computational Trust Models in Rational Environments
Le-Hung Vu, Karl Aberer
Article No.: 24
DOI: 10.1145/2019591.2019593

Computational reputation-based trust models using statistical learning have been intensively studied for distributed systems where peers behave maliciously. However practical applications of such models in environments with both malicious and...

Bird Flight-Inspired Routing Protocol for Mobile Ad Hoc Networks
Sudip Misra, Gopidi Rajesh
Article No.: 25
DOI: 10.1145/2019591.2019594

One of the major challenges in the research of mobile ad hoc networks is designing dynamic, scalable, and low cost (in terms of utilization of resources) routing protocols usable in real-world applications. Routing in ad hoc networks has been...

Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags
Yang Xiao, Yanping Zhang, Xiannuan Liang
Article No.: 26
DOI: 10.1145/2019591.2019595

Although previous bio-inspired models have concentrated on invertebrates, such as ants, mammals, such as primates with higher cognitive function, are valuable for modeling the increasingly complex problems in engineering. Understanding...

Scalable Stealth Mode P2P Overlays of Very Small Constant Degree
Márk Jelasity, Vilmos Bilicki
Article No.: 27
DOI: 10.1145/2019591.2019596

P2P technology has recently been adopted by Internet-based malware as a fault tolerant and scalable communication medium. Due to its decentralized and self-organizing nature, P2P malware is harder to detect and block, especially if it utilizes...

From Autonomic to Self-Self Behaviors: The JADE Experience
Sara Bouchenak, Fabienne Boyer, Benoit Claudel, Noel De Palma, Olivier Gruber, Sylvain Sicard
Article No.: 28
DOI: 10.1145/2019591.2019597

Autonomic computing enables computing infrastructures to perform administration tasks with minimal human intervention. This wrap-up paper describes the experience we gained with the design and use of Jade---an architecture-based...