Implementing adaptation and reconfiguration strategies in heterogeneous WSN

Conference paper


Di Marco, A., Gallo, F., Gemikonakli, O., Mostarda, L. and Raimondi, F. 2013. Implementing adaptation and reconfiguration strategies in heterogeneous WSN. 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013 IEEE. pp. 477-483 https://doi.org/10.1109/AINA.2013.102
TypeConference paper
TitleImplementing adaptation and reconfiguration strategies in heterogeneous WSN
AuthorsDi Marco, A., Gallo, F., Gemikonakli, O., Mostarda, L. and Raimondi, F.
Abstract

Wireless Sensor Networks are becoming one of the most successful choices for the development and deployment of applications in a range of scenarios, from intelligent homes to environment monitoring. Nowadays, there is a growing demand for programming large-scale wireless sensor networks. New programming paradigms should ease the task of building WSN applications that adapt at run-time to changes in the context, in the available resources, and also in user requirements. In this paper we describe PROTEUS, a platform to manage adaptation and reconfiguration, with the aim of supporting the development of WSN applications. After introducing PROTEUS, we show how it can be used to program a dynamic clustering algorithm, where clusters are created and destroyed at runtime, and nodes need to adapt and reconfigure accordingly. We provide a prototype implementation using TinyOS. Some remarks on the work are also presented.

Conference27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013)
Page range477-483
ISSN1550-445X
Electronic1550-445X
ISBN
Hardcover9781467355506
Electronic9780769549538
PublisherIEEE
Publication dates
Print28 Mar 2013
Online17 Jun 2013
Publication process dates
Deposited23 Apr 2015
Output statusPublished
Digital Object Identifier (DOI)https://doi.org/10.1109/AINA.2013.102
LanguageEnglish
Book title2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)
Permalink -

https://repository.mdx.ac.uk/item/850yw

  • 52
    total views
  • 0
    total downloads
  • 3
    views this month
  • 0
    downloads this month

Export as

Related outputs

Differential cost analysis with simultaneous potentials and anti-potentials
Žikelić, Ð., Chang, B., Bolignano, P. and Raimondi, F. 2022. Differential cost analysis with simultaneous potentials and anti-potentials. 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation. San Diego, USA 13 - 17 Jun 2022 Association for Computing Machinery (ACM). pp. 442-457 https://doi.org/10.1145/3519939.3523435
REDO: a reinforcement learning-based dynamic routing algorithm selection method for SDN
Al-Jawad, A., Comsa, I., Shah, P., Gemikonakli, O. and Trestian, R. 2021. REDO: a reinforcement learning-based dynamic routing algorithm selection method for SDN. 2021 IEEE NFV-SDN. Virtual Conference 09 - 11 Nov 2021 IEEE. pp. 54-59 https://doi.org/10.1109/NFV-SDN53031.2021.9665140
A smart sensor grid to enhance irrigation techniques in Jordan using a novel event-based routing protocol
Rantisi, M., Mapp, G. and Gemikonakli, O. 2017. A smart sensor grid to enhance irrigation techniques in Jordan using a novel event-based routing protocol. Multimodal Technologies and Interaction. 1 (2). https://doi.org/10.3390/mti1020009
An innovative reinforcement learning-based framework for quality of service provisioning over multimedia-based SDN environments
Al-Jawad, A., Comsa, I., Shah, P., Gemikonakli, O. and Trestian, R. 2021. An innovative reinforcement learning-based framework for quality of service provisioning over multimedia-based SDN environments. IEEE Transactions on Broadcasting. 67 (4), pp. 851-867. https://doi.org/10.1109/TBC.2021.3099728
Automatic annotation of confidential data in Java code
Bastys, I., Bolignano, P., Raimondi, F. and Schoepe, D. 2021. Automatic annotation of confidential data in Java code. Aïmeur, E., Laurent, M., Yaich, R., Dupont, B. and Garcia-Alfaro, J. (ed.) FPS 2021: The 14th International Symposium on Foundations & Practice of Security. Paris, France 08 - 12 Dec 2021 Springer. pp. 146-161 https://doi.org/10.1007/978-3-031-08147-7_10
Performance evaluation of routing strategies over multimedia-based SDNs under realistic environments
Al-Jawad, A., Shah, P., Gemikonakli, O., Comsa, I. and Trestian, R. 2020. Performance evaluation of routing strategies over multimedia-based SDNs under realistic environments. 6th IEEE NetSoft 2020. Virtual Conference (originally planned for Ghent, Belgium, Belgium) 29 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 160-164 https://doi.org/10.1109/NetSoft48620.2020.9165521
A model-driven engineering framework for architecting and analysing Wireless Sensor Networks
Doddapaneni, K., Ever, E., Gemikonakli, O., Malavolta, I., Mostarda, L. and Muccini, H. 2012. A model-driven engineering framework for architecting and analysing Wireless Sensor Networks. Third International Workshop on Software Engineering for Sensor Network Applications (SESENA'12). Zurich, Switzerland 02 Jun 2012 IEEE Press Piscataway, NJ, USA. pp. 1-7 https://doi.org/10.1109/SESENA.2012.6225729
A study of the effectiveness of Edmodo on Preservice classroom teachers' views of web-assisted collaborative learning environments, sense of community of classroom, and perceived learning
Hamutoglu, N., Gemikonakli, O. and Gezgin, D. 2019. A study of the effectiveness of Edmodo on Preservice classroom teachers' views of web-assisted collaborative learning environments, sense of community of classroom, and perceived learning. Science Education International. 30 (2), pp. 128-137. https://doi.org/10.33828/sei.v30.i2.6
On the performance, availability and energy consumption modelling of clustered IoT systems
Ever, E., Shah, P., Mostarda, L., Omondi, F. and Gemikonakli, O. 2019. On the performance, availability and energy consumption modelling of clustered IoT systems. Computing. 101 (12), pp. 1935-1970. https://doi.org/10.1007/s00607-019-00720-9
Comparing approaches for model-checking strategies under imperfect information and fairness constraints
Busard, S., Pecheur, C., Qu, H. and Raimondi, F. 2019. Comparing approaches for model-checking strategies under imperfect information and fairness constraints. International Journal on Software Tools for Technology Transfer. 21 (4), pp. 449-469. https://doi.org/10.1007/s10009-018-0505-6
Multi-agent based simulations of block-free distributed ledgers
Bottone, M., Raimondi, F. and Primiero, G. 2018. Multi-agent based simulations of block-free distributed ledgers. The 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA). Krakow, Poland 16 - 18 May 2018 IEEE. pp. 585-590 https://doi.org/10.1109/WAINA.2018.00149
Analysis and verification of ECA rules in intelligent environments
Cacciagrano, D., Corradini, F., Culmone, R., Gorogiannis, N., Mostarda, L., Raimondi, F. and Vannucchi, C. 2018. Analysis and verification of ECA rules in intelligent environments. Journal of Ambient Intelligence and Smart Environments. 10 (3), pp. 261-273. https://doi.org/10.3233/ais-180487
MIRTO: an open-source robotic platform for education
Androutsopoulos, K., Aristodemou, L., Boender, J., Bottone, M., Currie, E., El-Aroussi, I., Fields, B., Gheri, L., Gorogiannis, N., Heeney, M., Micheletti, M., Loomes, M., Margolis, M., Petridis, M., Piermarteri, A., Primiero, G., Raimondi, F. and Weldin, N. 2018. MIRTO: an open-source robotic platform for education. 3rd European Conference on Software Engineering Education. Seeon, Germany 14 - 15 Jun 2018 Association for Computing Machinery (ACM). pp. 55-62 https://doi.org/10.1145/3209087.3209106
An active tangible user interface framework for teaching and learning artificial intelligence
De Raffaele, C., Smith, S. and Gemikonakli, O. 2018. An active tangible user interface framework for teaching and learning artificial intelligence. ACM IUI 2018: 23rd ACM Conference on Intelligent User Interfaces. Tokyo, Japan 07 - 11 Mar 2018 Association for Computing Machinery (ACM). pp. 535-546 https://doi.org/10.1145/3172944.3172976
Policy-based QoS management framework for software-defined networks
Al-Jawad, A., Shah, P., Gemikonakli, O. and Trestian, R. 2018. Policy-based QoS management framework for software-defined networks. ISNCC 2018: International Symposium on Networks, Computers and Communications. Rome, Italy 19 - 21 Jun 2018 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/ISNCC.2018.8530994
LearnQoS: a learning approach for optimizing QoS over multimedia-based SDNs
Al-Jawad, A., Shah, P., Gemikonakli, O. and Trestian, R. 2018. LearnQoS: a learning approach for optimizing QoS over multimedia-based SDNs. 13th IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB). Valencia, Spain 06 - 08 Jun 2018 IEEE. pp. 1-6 https://doi.org/10.1109/BMSB.2018.8436781
CoSMed: a confidentiality-verified social media platform
Bauereiß, T., Pesenti Gritti, A., Popescu, A. and Raimondi, F. 2018. CoSMed: a confidentiality-verified social media platform. Interactive Theorem Proving - 7th International Conference, ITP 2016, Nancy, France, August 22-25, 2016, Proceedings. Nancy, France 22 - 27 Aug 2016 Springer. https://doi.org/10.1007/s10817-017-9443-3
Does the assumption of exponential arrival distributions in wireless sensor networks hold?
Doddapaneni, K., Tasiran, A., Omondi, F., Ever, E., Shah, P., Mostarda, L. and Gemikonakli, O. 2018. Does the assumption of exponential arrival distributions in wireless sensor networks hold? International Journal of Sensor Networks. 26 (2), pp. 81-100. https://doi.org/10.1504/IJSNET.2018.089258
Governance and risk management of network and information security: the role of public private partnerships in managing the existing and emerging risks
Navare, J. and Gemikonakli, O. 2010. Governance and risk management of network and information security: the role of public private partnerships in managing the existing and emerging risks. in: Jahankhani, H. and Hessami, A. (ed.) Communications in Computer and Information Science Berlin, Heidelberg Springer.
Social networks users: fear of missing out in preservice teachers
Gezgin, D., Hamutoglu, N., Gemikonakli, O. and Raman, I. 2017. Social networks users: fear of missing out in preservice teachers. Journal of Education and Practice. 8 (17), pp. 156-168.
CoSMed: a confidentiality-verified social media platform
Bauereiß, T., Pesenti Gritti, A., Popescu, A. and Raimondi, F. 2016. CoSMed: a confidentiality-verified social media platform. ITP 2016: 7th International Conference on Interactive Theorem Proving. Nancy, France 22 - 25 Aug 2016 Springer. pp. 87-106 https://doi.org/10.1007/978-3-319-43144-4_6
A proof-theoretic trust and reputation model for VANET
Primiero, G., Raimondi, F., Chen, T. and Nagarajan, R. 2017. A proof-theoretic trust and reputation model for VANET. S4CIP’17: 2nd Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. Paris, France 29 Apr 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 146-152 https://doi.org/10.1109/EuroSPW.2017.64
Admission control and buffer management of wireless communication systems with mobile stations and integrated voice and data services
Gemikonakli, E., Ever, E., Mapp, G. and Gemikonakli, O. 2017. Admission control and buffer management of wireless communication systems with mobile stations and integrated voice and data services. Telecommunication Systems. 65 (4), pp. 663-675. https://doi.org/10.1007/s11235-016-0259-y
The packing chromatic number of the infinite square lattice is between 13 and 15
Martin, B., Raimondi, F., Chen, T. and Martin, J. 2017. The packing chromatic number of the infinite square lattice is between 13 and 15. Discrete Applied Mathematics. 225, pp. 136-142. https://doi.org/10.1016/j.dam.2017.03.013
Implementing virtual pheromones in BDI robots using MQTT and Jason
Bottone, M., Palumbo, F., Primiero, G., Raimondi, F. and Stocker, R. 2016. Implementing virtual pheromones in BDI robots using MQTT and Jason. 2016 5th IEEE International Conference on Cloud Networking (Cloudnet). Pisa, Italy 03 - 05 Oct 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 196-199 https://doi.org/10.1109/CloudNet.2016.22
From raw data to agent perceptions for simulation, verification, and monitoring
Bottone, M., Primiero, G., Raimondi, F. and Rungta, N. 2016. From raw data to agent perceptions for simulation, verification, and monitoring. 12th International Conference on Intelligent Environment 2016:- 5th International Workshop on Reliability of Intelligent Environments (WoRIE’16). London, United Kingdom 14 - 16 Sep 2016 IOS Press. pp. 66-75 https://doi.org/10.3233/978-1-61499-690-3-66
Trust and distrust in contradictory information transmission
Primiero, G., Raimondi, F., Bottone, M. and Tagliabue, J. 2017. Trust and distrust in contradictory information transmission. Applied Network Science. 2 (1). https://doi.org/10.1007/s41109-017-0029-0
Examining the interaction between fourth estate and Twitter: an exploratory case study
Barn, B., Barn, R., Raimondi, F. and Mukherjee, U. 2017. Examining the interaction between fourth estate and Twitter: an exploratory case study. HUSO 2017: Third International Conference on Human and Social Analytics. Nice, France 23 - 27 Jul 2017 IARIA. pp. 11-17
Symbolic verification of event–condition–action rules in intelligent environments
Vannucchi, C., Diamanti, M., Mazzante, G., Cacciagrano, D., Culmone, R., Gorogiannis, N., Mostarda, L. and Raimondi, F. 2017. Symbolic verification of event–condition–action rules in intelligent environments. Journal of Reliable Intelligent Environments. 3 (2), pp. 117-130. https://doi.org/10.1007/s40860-017-0036-z
The application of Tangible User Interfaces of teaching and learning in Higher Education
De Raffaele, C., Smith, S. and Gemikonakli, O. 2017. The application of Tangible User Interfaces of teaching and learning in Higher Education. in: Branch, J., Hayes, S., Hørsted, A. and Nygaard, C. (ed.) Innovative Teaching and Learning in Higher Education Oxfordshire, UK Libri Publishing. pp. 215-226
Enabling the effective teaching and learning of advanced robotics in higher education using an active TUI framework
De Raffaele, C., Smith, S. and Gemikonakli, O. 2017. Enabling the effective teaching and learning of advanced robotics in higher education using an active TUI framework. 3rd Africa and Middle East Conference on Software Engineering. Cairo, Egypt 12 - 13 Dec 2017 Association for Computing Machinery (ACM). pp. 7-12 https://doi.org/10.1145/3178298.3178299
Explaining multi-threaded task scheduling using tangible user interfaces in higher educational contexts
De Raffaele, C., Smith, S. and Gemikonakli, O. 2017. Explaining multi-threaded task scheduling using tangible user interfaces in higher educational contexts. 2017 IEEE Global Engineering Education Conference (EDUCON). Athens, Greece 25 - 28 Apr 2017 IEEE. pp. 1383-1390 https://doi.org/10.1109/EDUCON.2017.7943028
A novel symbolic approach to verifying epistemic properties of programs
Gorogiannis, N., Raimondi, F. and Boureanu, I. 2017. A novel symbolic approach to verifying epistemic properties of programs. Twenty-Sixth International Joint Conference on Artificial Intelligence. Melbourne, Australia 19 - 25 Aug 2017 International Joint Conferences on Artificial Intelligence. pp. 206-212 https://doi.org/10.24963/ijcai.2017/30
CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees
Bauereiß, T., Pesenti Gritti, A., Popescu, A. and Raimondi, F. 2017. CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees. 38th IEEE Symposium on Security and Privacy. San Jose, CA, USA 22 - 26 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 729-748 https://doi.org/10.1109/SP.2017.24
MCMAS: an open-source model checker for the verification of multi-agent systems
Lomuscio, A., Qu, H. and Raimondi, F. 2017. MCMAS: an open-source model checker for the verification of multi-agent systems. International Journal on Software Tools for Technology Transfer. 19 (1), pp. 9-30. https://doi.org/10.1007/s10009-015-0378-x
Contradictory information flow in networks with trust and distrust
Primiero, G., Bottone, M., Raimondi, F. and Tagliabue, J. 2016. Contradictory information flow in networks with trust and distrust. 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016). Milan 01 - 06 Dec 2016 Springer. https://doi.org/10.1007/978-3-319-50901-3_29
Building a prototype VANET testbed to explore communication dynamics in highly mobile environments
Paranthaman, V., Ghosh, A., Mapp, G., Iniovosa, V., Shah, P., Nguyen, H., Gemikonakli, O. and Rahman, S. 2017. Building a prototype VANET testbed to explore communication dynamics in highly mobile environments. Guo, S., Wei, G., Xiang, Y., Lin, X. and Lorenz, P. (ed.) International Conference on Testbeds and Research Infrastructures (TridentCom 2016). Hangzhou, china 14 - 15 Jun 2016 Springer, Cham. pp. 81-90 https://doi.org/10.1007/978-3-319-49580-4_8
A model for trustworthy orchestration in the internet of things
Bottone, M., Primiero, G., Raimondi, F. and De Florio, V. 2016. A model for trustworthy orchestration in the internet of things. 2016 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 171-174 https://doi.org/10.1109/IE.2016.37
Towards connecting people, locations and real-world events in a cellular network
Trestian, R., Shah, P., Nguyen, H., Vien, Q., Gemikonakli, O. and Barn, B. 2017. Towards connecting people, locations and real-world events in a cellular network. Telematics and Informatics. 34 (1), pp. 244-271. https://doi.org/10.1016/j.tele.2016.05.006
Using multi-agent systems to go beyond temporal patterns verification
Raimondi, F. 2016. Using multi-agent systems to go beyond temporal patterns verification. ACM SIGLOG News. 3 (2), pp. 69-77.
A computationally grounded, weighted doxastic logic
Chen, T., Primiero, G., Raimondi, F. and Rungta, N. 2016. A computationally grounded, weighted doxastic logic. Studia Logica. 104 (4), pp. 679-703. https://doi.org/10.1007/s11225-015-9621-4
Minimizing transitive trust threats in software management systems
Boender, J., Primiero, G. and Raimondi, F. 2015. Minimizing transitive trust threats in software management systems. 13th Annual Conference on Privacy, Security and Trust (PST 2015). Izmir, Turkey 21 - 23 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 191-198 https://doi.org/10.1109/PST.2015.7232973
Symbolic model-checking for resource-bounded ATL
Alechina, N., Logan, B., Nguyen, H., Raimondi, F. and Mostarda, L. 2015. Symbolic model-checking for resource-bounded ATL. 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2015. Istanbul, Turkey 04 - 08 May 2015 pp. 1809-1810
Teaching functional patterns through robotic applications
Boender, J., Currie, E., Loomes, M., Primiero, G. and Raimondi, F. 2016. Teaching functional patterns through robotic applications. The 4th International Workshop on Trends in Functional Programming in Education, TFPIE 2015. Sophia-Antipolis, France 02 Jun 2015 Open Publishing Association. pp. 17-29 https://doi.org/10.4204/EPTCS.230.2
Teaching and learning queueing theory concepts using Tangible User Interfaces
De Raffaele, C., Smith, S. and Gemikonakli, O. 2016. Teaching and learning queueing theory concepts using Tangible User Interfaces. 2016 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE 2016). Bangkok, Thailand 07 - 09 Dec 2016 IEEE. pp. 194-201 https://doi.org/10.1109/TALE.2016.7851794
The aptness of tangible user interfaces for explaining abstract computer network principles
De Raffaele, C., Smith, S. and Gemikonakli, O. 2016. The aptness of tangible user interfaces for explaining abstract computer network principles. FIE 2016 -The 46th Annual Frontiers in Education (FIE) Conference. Erie, PA, USA 12 - 15 Oct 2016 IEEE. https://doi.org/10.1109/FIE.2016.7757573
Taking Arduino to the Internet of things: the ASIP programming model
Barbon, G., Margolis, M., Palumbo, F., Raimondi, F. and Weldin, N. 2016. Taking Arduino to the Internet of things: the ASIP programming model. Computer Communications. 89-90, pp. 128-140. https://doi.org/10.1016/j.comcom.2016.03.016
A hybrid double-threshold based cooperative spectrum sensing over fading channels
Vien, Q., Nguyen, H., Trestian, R., Shah, P. and Gemikonakli, O. 2016. A hybrid double-threshold based cooperative spectrum sensing over fading channels. IEEE Transactions on Wireless Communications. 15 (3), pp. 1821-1834. https://doi.org/10.1109/TWC.2015.2496598
Compression-based technique for SDN using sparse-representation dictionary
Al-Jawad, A., Shah, P., Gemikonakli, O. and Trestian, R. 2016. Compression-based technique for SDN using sparse-representation dictionary. 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016). Istanbul, Turkey 25 - 29 Apr 2016 IEEE. pp. 754-758 https://doi.org/10.1109/NOMS.2016.7502892
Providing ubiquitous communication using handover techniques in VANET systems
Ghosh, A., Paranthaman, V., Mapp, G. and Gemikonakli, O. 2014. Providing ubiquitous communication using handover techniques in VANET systems. 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). Piran, Slovenia 02 - 04 Jun 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 195-202 https://doi.org/10.1109/MedHocNet.2014.6849124
Providing ubiquitous communication using road-side units in VANET systems: unveiling the challenges
Ghosh, A., Vardhan, V., Mapp, G., Gemikonakli, O. and Loo, J. 2013. Providing ubiquitous communication using road-side units in VANET systems: unveiling the challenges. 13th International Conference on ITS Telecommunications (ITST) 2013. Finland, Tampere 05 - 07 Nov 2013 pp. 74-79 https://doi.org/10.1109/ITST.2013.6685524
Performance analysis of cooperative spectrum sensing for cognitive wireless radio networks over Nakagami-m fading channels
Vien, Q., Nguyen, H., Trestian, R., Shah, P. and Gemikonakli, O. 2014. Performance analysis of cooperative spectrum sensing for cognitive wireless radio networks over Nakagami-m fading channels. in: 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC) IEEE. pp. 738-742
Software theory change for resilient near-complete specifications
Primiero, G. and Raimondi, F. 2015. Software theory change for resilient near-complete specifications. Procedia Computer Science. 52, pp. 988-995. https://doi.org/10.1016/j.procs.2015.05.091
Temporal planning for business process optimisation
Magazzeni, D., Mercorio, F., Barn, B., Clark, T., Raimondi, F. and Kulkarni, V. 2014. Temporal planning for business process optimisation. ICAPS 2014: 8th Scheduling and Planning Application woRKshop (SPARK 2014). Portsmouth, New Hampshire, USA 22 Jun 2014
Towards connecting people, locations and real-world events in a cellular network [conference item]
Trestian, R., Shah, P., Nguyen, H., Vien, Q., Gemikonakli, O. and Barn, B. 2015. Towards connecting people, locations and real-world events in a cellular network [conference item]. The main conference on the scientific analysis of mobile phone datasets (NetMob), Orange D4D Challenge. MIT Media Lab, USA 07 - 10 Apr 2015
Towards cyber-physical systems as services: the ASIP protocol
Bordoni, M., Bottone, M., Fields, B., Gorogiannis, N., Margolis, M., Primiero, G. and Raimondi, F. 2015. Towards cyber-physical systems as services: the ASIP protocol. 2015 IEEE/ACM 1st International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS). Florence, Italy 17 - 17 May 2015 IEEE. pp. 52-55 https://doi.org/10.1109/SEsCPS.2015.18
Programming the MIRTO robot with neurons
Huyck, C., Primiero, G. and Raimondi, F. 2014. Programming the MIRTO robot with neurons. Procedia Computer Science. 41, pp. 75-82. https://doi.org/10.1016/j.procs.2014.11.087
A typed natural deduction calculus to reason about secure trust
Primiero, G. and Raimondi, F. 2014. A typed natural deduction calculus to reason about secure trust. 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST). Toronto, Canada 23 - 24 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 379-382 https://doi.org/10.1109/PST.2014.6890963
Decidable model-checking for a resource logic with production of resources
Alechina, N., Logan, B., Nguyen, H. and Raimondi, F. 2014. Decidable model-checking for a resource logic with production of resources. 21st European Conference on Artificial Intelligence (ECAI-2014). Prague, Czech Republic 18 - 22 Aug 2014 Prague, Czech Republic IOS Press. pp. 9-14 https://doi.org/10.3233/978-1-61499-419-0-9
Aviation safety: modeling and analyzing complex interactions between humans and automated systems
Rungta, N., Brat, G., Clancey, W., Linde, C., Raimondi, F., Seah, C. and Shafto, M. 2013. Aviation safety: modeling and analyzing complex interactions between humans and automated systems. ATACCS 2013. Naples, Italy 28 - 30 May 2013 Association for computing machinery. pp. 27-37 https://doi.org/10.1145/2494493.2494498
A synergistic and extensible framework for multi-agent system verification
Hunter, J., Raimondi, F., Rungta, N. and Stocker, R. 2013. A synergistic and extensible framework for multi-agent system verification. AAMAS 2013 :12th International Conference on Autonomous Agents and Multiagent Systems. Saint Paul, Minnesota, USA. 06 - 10 May 2013 Richland, SC International Foundation for Autonomous Agents and Multiagent Systems. pp. 869-876
Domain types: abstract-domain selection based on variable usage
Apel, S., Beyer, D., Friedberger, K., Raimondi, F. and von Rhein, A. 2013. Domain types: abstract-domain selection based on variable usage. Hardware and Software: Verification and Testing. 8244 (1), pp. 262-278. https://doi.org/10.1007/978-3-319-03077-7_18
The anonymous subgraph problem
Bettinelli, A., Liberti, L., Raimondi, F. and Savourey, D. 2013. The anonymous subgraph problem. Computers and Operations Research. 40 (4), pp. 973-979. https://doi.org/10.1016/j.cor.2012.11.018
Introducing Binary Decision Diagrams in the explicit-state verification of Java code
von Rhein, A., Apel, S. and Raimondi, F. 2011. Introducing Binary Decision Diagrams in the explicit-state verification of Java code. The Java Pathfinder Workshop (co-located with ASE 2011). Oread, Lawrence, Kansas 12 Nov 2011
Enabling seamless V2I communications towards developing cooperative automotive applications in VANET systems
Ghosh, A., Paranthaman, V., Mapp, G., Gemikonakli, O. and Loo, J. 2015. Enabling seamless V2I communications towards developing cooperative automotive applications in VANET systems. IEEE Communications Magazine. 53 (12), pp. 80-86. https://doi.org/10.1109/MCOM.2015.7355570
BaProbSDN: A probabilistic-based QoS routing mechanism for software defined networks
Al-Jawad, A., Trestian, R., Shah, P. and Gemikonakli, O. 2015. BaProbSDN: A probabilistic-based QoS routing mechanism for software defined networks. 1st IEEE Conference on Network Softwarization (NetSoft 2015). London, United Kingdom 13 - 17 Apr 2015 IEEE. pp. 1-5 https://doi.org/10.1109/NETSOFT.2015.7116128
Symbolic model checking for one-resource RB±ATL
Alechina, N., Logan, B., Nguyen, H. and Raimondi, F. 2015. Symbolic model checking for one-resource RB±ATL. Yang, Q. and Wooldridge, M. (ed.) 24th International Joint Conference on Artificial Intelligence (IJCAI 2015). Buenos Aires, Argentina 25 - 31 Jul 2015 Buenos Aires, Argentina AAAI Press / International Joint Conferences on Artificial Intelligence. pp. 1069-1075
On the coverage and power allocation for downlink in heterogeneous wireless cellular networks
Vien, Q., Akinbote, T., Nguyen, H., Trestian, R. and Gemikonakli, O. 2015. On the coverage and power allocation for downlink in heterogeneous wireless cellular networks. IEEE International Conference on Communications (ICC 2015). London, UK 08 - 12 Jun 2015 IEEE. pp. 4641-4646 https://doi.org/10.1109/ICC.2015.7249055
Packet arrival analysis in wireless sensor networks
Doddapaneni, K., Shah, P., Ever, E., Tasiran, A., Omondi, F., Mostarda, L. and Gemikonakli, O. 2015. Packet arrival analysis in wireless sensor networks. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2015. Gwangiu, South Korea 24 - 27 Mar 2015 IEEE. pp. 164-169 https://doi.org/10.1109/WAINA.2015.101
A framework for energy based performability models for wireless sensor networks
Omondi, F., Shah, P., Gemikonakli, O. and Ever, E. 2015. A framework for energy based performability models for wireless sensor networks. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, South Korea 24 - 27 Mar 2015 IEEE. pp. 175-180 https://doi.org/10.1109/WAINA.2015.111
On the impact of video content type on the mobile device energy consumption
Trestian, R., Vien, Q., Nguyen, H. and Gemikonakli, O. 2015. On the impact of video content type on the mobile device energy consumption. 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB 2015). Ghent, Belgium 17 - 19 Jun 2015 https://doi.org/10.1109/BMSB.2015.7177206
ECO-M: energy-efficient cluster-oriented multimedia delivery in a LTE D2D environment
Trestian, R., Vien, Q., Nguyen, H. and Gemikonakli, O. 2015. ECO-M: energy-efficient cluster-oriented multimedia delivery in a LTE D2D environment. IEEE International Conference on Communications (ICC 2015). London, UK 08 - 12 Jun 2015 IEEE. pp. 55-61 https://doi.org/10.1109/ICC.2015.7248298
On the role of value sensitive concerns in software engineering practice
Barn, B., Barn, R. and Raimondi, F. 2015. On the role of value sensitive concerns in software engineering practice. 37th International Conference on Software Engineering, ICSE 2015. Florence, Italy 16 - 24 May 2015 IEEE. pp. 497-500 https://doi.org/10.1109/ICSE.2015.182
A racket-based robot to teach first-year computer science
Androutsopoulos, K., Gorogiannis, N., Loomes, M., Margolis, M., Primiero, G., Raimondi, F., Varsani, P., Weldin, N. and Zivanovic, A. 2014. A racket-based robot to teach first-year computer science. 7 th European Lisp Symposium. IRCAM, Paris, France 05 - 06 May 2014 pp. 54-61
Secure live virtual machines migration: issues and solutions
Aiash, M., Mapp, G. and Gemikonakli, O. 2014. Secure live virtual machines migration: issues and solutions. IEEE AINA 2014. Victoria, BC, Canada 13 - 16 May 2014
Comparison between resource reservation protocol and next steps in signalling in mobile IP networks
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. Comparison between resource reservation protocol and next steps in signalling in mobile IP networks. IET Networks. https://doi.org/10.1049/iet-net.2013.0028
SLA based MT-routing for future internet
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. SLA based MT-routing for future internet. Wireless World Research Forum Meeting 32. Marrakech, Morocco 18 - 22 May 2014
An efficient traffic engineering based on multi-topology routing for future internet
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. An efficient traffic engineering based on multi-topology routing for future internet. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.008
Distributed space-time-frequency block code for cognitive wireless relay networks
Vien, Q., Stewart, B., Nguyen, H. and Gemikonakli, O. 2014. Distributed space-time-frequency block code for cognitive wireless relay networks. IET Communications. 8 (5), pp. 754-766. https://doi.org/10.1049/iet-com.2013.0374
Performance analysis of cooperative spectrum sensing for cognitive wireless radio networks over Nakagami-m fading channels
Vien, Q., Nguyen, H., Trestian, R., Shah, P. and Gemikonakli, O. 2014. Performance analysis of cooperative spectrum sensing for cognitive wireless radio networks over Nakagami-m fading channels. 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). Washington DC, DC, USA 02 - 05 Sep 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 738-742 https://doi.org/10.1109/PIMRC.2014.7136262
On demand multicast routing in wireless sensor networks
Sule, C., Shah, P., Doddapaneni, K., Gemikonakli, O. and Ever, E. 2014. On demand multicast routing in wireless sensor networks. Advanced Information Networking and Applications Workshops (WAINA 2014). Victoria, BC, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 233-238 https://doi.org/10.1109/WAINA.2014.47
Deployment challenges and developments in wireless sensor networks clustering
Doddapaneni, K., Omondi, F., Ever, E., Shah, P., Gemikonakli, O. and Gagliardi, R. 2014. Deployment challenges and developments in wireless sensor networks clustering. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. Victoria, Canada 13 - 16 May 2014 IEEE. pp. 227-232 https://doi.org/10.1109/WAINA.2014.46
Model checking degrees of belief in a system of agents
Primiero, G., Raimondi, F. and Rungta, N. 2014. Model checking degrees of belief in a system of agents. AAMAS 2014: 13th International Conference on Autonomous Agents and Multiagent Systems. Paris, France 05 - 09 May 2014 International Foundation for Autonomous Agents and Multiagent Systems. pp. 133-140
Improving the model checking of strategies under partial observability and fairness constraints
Busard, S., Pecheur, C., Qu, H. and Raimondi, F. 2014. Improving the model checking of strategies under partial observability and fairness constraints. 16th International Conference on Formal Engineering Methods, ICFEM 2014. Luxembourg 03 - 05 Nov 2014 Springer International Publishing. https://doi.org/10.1007/978-3-319-11737-9_3
Slrtool: a tool to support collaborative systematic literature reviews
Barn, B., Raimondi, F., Athiappan, L. and Clark, T. 2014. Slrtool: a tool to support collaborative systematic literature reviews. 16th International Conference on Enterprise Information Systems. Lisbon, Portugal 27 - 30 Apr 2014 SCITEPRESS - Science and Technology Publications. pp. 440-447 https://doi.org/10.5220/0004972204400447
Exploring efficient seamless handover in VANET systems using network dwell time
Ghosh, A., Parathaman, V., Mapp, G. and Gemikonakli, O. 2014. Exploring efficient seamless handover in VANET systems using network dwell time. EURASIP Journal on Wireless Communications and Networking. 2014 (1), pp. 1-19. https://doi.org/10.1186/1687-1499-2014-227
An efficient cooperative spectrum sensing under bandwidth constraint with user selection
Vien, Q., Nguyen, H., Gemikonakli, O. and Barn, B. 2014. An efficient cooperative spectrum sensing under bandwidth constraint with user selection. 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). Vancouver, BC, Canada 14 - 17 Sep 2014 IEEE. pp. 1-5 https://doi.org/10.1109/VTCFall.2014.6965868
Performance analysis of cooperative transmission for cognitive wireless relay networks
Vien, Q., Nguyen, H., Gemikonakli, O. and Barn, B. 2013. Performance analysis of cooperative transmission for cognitive wireless relay networks. 2013 IEEE Global Communications Conference (GLOBECOM). Atlanta, GA, USA 09 - 13 Dec 2013 IEEE. pp. 4186-4191 https://doi.org/10.1109/GLOCOM.2013.6831730
Context-aware adaptive applications: fault patterns and their automated identification
Sama, M., Elbaum, S., Raimondi, F., Rosenblum, D. and Wang, Z. 2010. Context-aware adaptive applications: fault patterns and their automated identification. IEEE Transactions on Software Engineering. 36 (5), pp. 644-661. https://doi.org/10.1109/TSE.2010.35
Performability modelling of handoff in wireless cellular networks with channel failures and recovery
Kirsal, Y. and Gemikonakli, O. 2009. Performability modelling of handoff in wireless cellular networks with channel failures and recovery. in: 11th International Conference on Computer Modelling and Simulation (UKSIM '09) IEEE. pp. 544-547
Modelling mixed access-patterns in network-based systems
Thakker, D., Mapp, G. and Gemikonakli, O. 2009. Modelling mixed access-patterns in network-based systems. in: 11th International Conference on Computer Modelling and Simulation (UKSIM '09) IEEE. pp. 514-519
Evaluation of collaborative filtering algorithms using a small dataset
Roda, F., Liberti, L. and Raimondi, F. 2011. Evaluation of collaborative filtering algorithms using a small dataset. WEBIST 2011. http://www.webist.org/WEBIST2011/
Effects of IDSs on the WSNs lifetime: evidence for the need of new approaches
Doddapaneni, K., Ever, E., Gemikonakli, O. and Mostarda, L. 2012. Effects of IDSs on the WSNs lifetime: evidence for the need of new approaches. The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Liverpool, United Kingdom 25 - 27 Jun 2012 IEEE. pp. 907-912 https://doi.org/10.1109/TrustCom.2012.137
Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks
Gemikonakli, E., Mapp, G., Gemikonakli, O. and Ever, E. 2013. Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013
Enhancing the modelling of vertical handover in integrated cellular/WLAN environments
Kirsal, Y., Ever, E., Mapp, G. and Gemikonakli, O. 2013. Enhancing the modelling of vertical handover in integrated cellular/WLAN environments. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013
An efficient resource reservation for domain based mobile IP networks: analytical approach
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. An efficient resource reservation for domain based mobile IP networks: analytical approach. IEEE 77th Vehicular Technology Conference (VTC2013-Spring). Dresden, Germany 02 - 05 Jun 2013
Reasoning about strategies under partial observability and fairness constraints
Busard, S., Pecheur, C., Qu, H. and Raimondi, F. 2013. Reasoning about strategies under partial observability and fairness constraints. 1st International Workshop on Strategic Reasoning. Rome, Italy 16 - 17 Mar 2013 Open Publishing Association. https://doi.org/10.4204/EPTCS.112.12
Exploring service and buffer management issues to provide integrated voice and data services in single and multi-channel wireless networks
Gemikonakli, E., Mapp, G., Gemikonakli, O. and Ever, E. 2013. Exploring service and buffer management issues to provide integrated voice and data services in single and multi-channel wireless networks. in: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) IEEE. pp. 1056-1063
Efficient NSIS mobility support for mobile networks
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. Efficient NSIS mobility support for mobile networks. IEEE 24th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). London, UK 08 - 11 Sep 2013 IEEE. pp. 3354-3359 https://doi.org/10.1109/PIMRC.2013.6666727
Modelling wireless sensor networks for performability evaluation
Omondi, F., Ever, E., Shah, P. and Gemikonakli, O. 2013. Modelling wireless sensor networks for performability evaluation. The 12th International Conference on Ad Hoc Networks and Wireless, (ADHOC-NOW 2013). Wrocław, Poland 08 - 10 Jul 2013 Springer. pp. 172-184 https://doi.org/10.1007/978-3-642-39247-4_15
A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues
Ever, E., Gemikonakli, O., Kocyigit, A. and Gemikonakli, E. 2013. A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues. Journal of Network and Computer Applications. 36 (2), pp. 908-926. https://doi.org/10.1016/j.jnca.2012.10.006
Using aggregated RSVP in nested HMIPv6
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2012. Using aggregated RSVP in nested HMIPv6. Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International. IEEE. pp. 716 -721 https://doi.org/10.1109/IWCMC.2012.6314292
Application of verification techniques to security: model checking insider attacks
Kammueller, F., Probst, C. and Raimondi, F. 2012. Application of verification techniques to security: model checking insider attacks. 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability. Venice, Italy 28 - 29 Mar 2012 Blue Herons editions.
Critical review of analytical modelling approaches for performability evaluation of the handover phenomena in mobile communication systems
Kirsal, Y., Ever, E., Gemikonakli, O. and Mapp, G. 2011. Critical review of analytical modelling approaches for performability evaluation of the handover phenomena in mobile communication systems. IEEE International Conference on Computer and Information Technology (CIT 2011). pp. 132-137 https://doi.org/10.1109/CIT.2011.45
The use of Markov Modulated Poisson Process (MMPP) in open queuing systems with breakdowns and repairs
Ever, E., Gemikonakli, O., Chakka, R. and Do, T. 2005. The use of Markov Modulated Poisson Process (MMPP) in open queuing systems with breakdowns and repairs. Prep 2005.
Modelling and performability analysis of WLANs as a queuing model with channel/access point failures and reconfiguration
Kirsal, Y., Ever, E., Gemikonakli, O. and Mapp, G. 2011. Modelling and performability analysis of WLANs as a queuing model with channel/access point failures and reconfiguration. EMS. Los Alamitos, CA IEEE Computer Society. pp. 440-445 https://doi.org/10.1109/EMS.2011.33
Approximate solution for two stage open networks with Markov-modulated queues minimizing the state space explosion problem
Gemikonakli, O., Ever, E. and Kocyigit, A. 2009. Approximate solution for two stage open networks with Markov-modulated queues minimizing the state space explosion problem. Journal of Computational and Applied Mathematics. 223 (1), pp. 519-533. https://doi.org/10.1016/j.cam.2008.02.009
Analytical modelling and simulation of small scale, typical and highly available Beowulf clusters with breakdowns and repairs
Ever, E., Gemikonakli, O. and Chakka, R. 2009. Analytical modelling and simulation of small scale, typical and highly available Beowulf clusters with breakdowns and repairs. Simulation modelling practice and theory. 17 (2), pp. 327-347. https://doi.org/10.1016/j.simpat.2008.08.016
Traffic modelling in WLANs and cellular networks.
Gemikonakli, E., Mapp, G., Gemikonakli, O., Ever, E. and Middlesex University 2011. Traffic modelling in WLANs and cellular networks. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
The development of a dynamic and robust event-based routing protocol in wireless sensor networks for environment monitoring.
Rantisi, M., Maquosi, A., Mapp, G., Gemikonakli, O., PSUT University, Petra University and Middlesex University 2011. The development of a dynamic and robust event-based routing protocol in wireless sensor networks for environment monitoring. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Balancing streaming and demand accesses in a network based storage environment.
Thakker, D., Mapp, G., Gemikonakli, O. and Middlesex University 2010. Balancing streaming and demand accesses in a network based storage environment. in: Sobh, T., Elleithy, K. and Mahmood, A. (ed.) Novel algorithms and techniques in telecommunications and networking. London, New York Springer. pp. 403-408
Impacts of buffering voice calls in integrated voice and data services
Gemikonakli, E., Gemikonakli, O., Ever, E., Mapp, G. and Institute of Electrical and Electronics Engineers 2011. Impacts of buffering voice calls in integrated voice and data services. Al-Dabass, D., Orsoni, A., Cant, R. and Abraham, A. (ed.) IEEE. pp. 507-512 https://doi.org/10.1109/UKSIM.2011.103
Implementation of non-pipelined and pipelined data encryption standard (DES) using Xilinx Virtex-6 FPGA technology.
Ever, E., Taherkhani, S. and Gemikonakli, O. 2010. Implementation of non-pipelined and pipelined data encryption standard (DES) using Xilinx Virtex-6 FPGA technology. IEEE. pp. 1257-1262 https://doi.org/10.1109/CIT.2010.227
Performance modelling of virtualized servers.
Gemikonakli, O., Ever, E. and Gemikonakli, E. 2010. Performance modelling of virtualized servers. IEEE. pp. 434-440 https://doi.org/10.1109/UKSIM.2010.86
Performability modelling of a Kerberos server with frequent key renewal under pseudo-secure conditions for increased security
Ever, E., Kirsal, Y. and Gemikonakli, O. 2009. Performability modelling of a Kerberos server with frequent key renewal under pseudo-secure conditions for increased security. in: 2009 International Conference on the Current Trends in Information Technology (CTIT 2009) IEEE.
Performability modelling of handoff in wireless cellular networks and the exact solution of system models with service rates dependent on numbers of originating and handoff calls.
Ever, E., Kirsal, Y. and Gemikonakli, O. 2009. Performability modelling of handoff in wireless cellular networks and the exact solution of system models with service rates dependent on numbers of originating and handoff calls. Kunovsky, J., Hanacek, P., Zboril, F., Al-Dabass, D. and Abraham, A. (ed.) IEEE. pp. 282-287 https://doi.org/10.1109/CSSim.2009.44
Multi-channel distributed coordinated function over single radio in wireless sensor networks
Campbell, C., Loo, J., Gemikonakli, O., Khan, S. and Singh, D. 2011. Multi-channel distributed coordinated function over single radio in wireless sensor networks. Sensors. 11 (1), pp. 964-991. https://doi.org/10.3390/s110100964
Exploring gate-limited analytical models for high-performance network storage servers
Mapp, G., Thakker, D., Gemikonakli, O. and Middlesex University 2011. Exploring gate-limited analytical models for high-performance network storage servers. Journal of Computer and System Sciences. 77 (5). https://doi.org/10.1016/j.jcss.2010.08.002
An analytical approach for performance analysis of handoffs in the next generation integrated cellular networks and WLANs
Kirsal, Y., Gemikonakli, E., Ever, E., Mapp, G., Gemikonakli, O. and Middlesex University 2010. An analytical approach for performance analysis of handoffs in the next generation integrated cellular networks and WLANs. IEEE. https://doi.org/10.1109/ICCCN.2010.5560093
Exploring a new Markov chain model for multiqueue systems.
Mapp, G., Thakker, D. and Gemikonakli, O. 2010. Exploring a new Markov chain model for multiqueue systems. Al-Dabass, D., Orsoni, A., Cant, R. and Abraham, A. (ed.) IEEE Computer Society. pp. 592-597 https://doi.org/10.1109/UKSIM.2010.113
The secret santa problem.
Liberti, L. and Raimondi, F. 2008. The secret santa problem. Lecture Notes in Computer Science. 5034, pp. 271-279. https://doi.org/10.1007/978-3-540-68880-8_26
Algorithms for efficient symbolic detection of faults in context-aware applications.
Sama, M., Raimondi, F., Rosenblum, D. and Emmerich, W. 2008. Algorithms for efficient symbolic detection of faults in context-aware applications. in: Automated Software Engineering - Workshops, 2008. ASE Workshops 2008. 23rd IEEE/ACM International Conference. Institute of Electrical and Electronics Engineers. pp. 1-8
Service-level agreements for electronic services
Skene, J., Raimondi, F. and Emmerich, W. 2010. Service-level agreements for electronic services. IEEE Transactions on Software Engineering. 36 (2), pp. 288-304. https://doi.org/10.1109/TSE.2009.55
PDVer, a tool to verify PDDL planning domains.
Raimondi, F., Pecheur, C. and Brat, G. 2009. PDVer, a tool to verify PDDL planning domains. ICAPS'09 Workshop on Verification and Validation of Planning and Scheduling Systems. Thessaloniki, Greece 20 Sep 2009
The Anonymous subgraph problem.
Bettinelli, A., Liberti, L., Raimondi, F. and Savourey, D. 2009. The Anonymous subgraph problem. Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization. Paris 02 - 04 Jun 2009 pp. 269-274
Combinatorial optimization based recommender systems.
Roda, F., Liberti, L. and Raimondi, F. 2009. Combinatorial optimization based recommender systems. Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization. Paris 02 - 04 Jun 2009 pp. 175-179
A model to design and verify context-aware adaptive service composition.
Cubo, J., Sama, M., Raimondi, F. and Rosenblum, D. 2009. A model to design and verify context-aware adaptive service composition. 6th IEEE International Conference on Services Computing (SCC 2009). Bangalore 21 - 25 Sep 2009
Level dependent band QBD processes: Steady state solution and applications.
Gemikonakli, O., Chakka, R., Papp, D. and Do, T. 2004. Level dependent band QBD processes: Steady state solution and applications. in: Exploring the effect of inter-flow interference on TCP performance in http://www.comp.brad.ac.uk/het-net/HET-NETs04/CameraPapers/WP8.pdf. Glasgow University of Glasgow, Department of Computing Science. pp. WP8/1-WP8/6
A solution for the problem of trusted third party for IEEE 802.11b networks
Gemikonakli, O., Kirsal, Y. and Eneh, A. 2005. A solution for the problem of trusted third party for IEEE 802.11b networks. in: Merabti, M. (ed.) 6th Annual postgraduate symposium on the convergence of telecommunications, networking and broadcasting: PGNET 2005. Liverpool Liverpool John Moores University, School of Computing & Mathematical Sciences. pp. 333-338
Improving Kerberos security through the combined use of the timed authentication protocol and frequent key renewal
Gemikonakli, O. and Kirsal, Y. 2008. Improving Kerberos security through the combined use of the timed authentication protocol and frequent key renewal. in: Cybernetics and intelligent systems: 2008 IEEE Conference Institute of Electrical and Electronics Engineers. pp. 153-158
Further improvements to the Kerberos timed authentication protocol
Gemikonakli, O. and Kirsal, Y. 2008. Further improvements to the Kerberos timed authentication protocol. in: Sobh, T. (ed.) Advances in computer and information sciences and engineering. Dordrecht Springer.
Frequent key renewal under pseudo-secure conditions for increased security in kerberos authentication and its impact on system performability
Gemikonakli, O. and Kirsal, Y. 2007. Frequent key renewal under pseudo-secure conditions for increased security in kerberos authentication and its impact on system performability. in: Jahankhani, H. (ed.) Global e-Security: proceedings of the 3rd Annual International Conference, 2007 ICGeS.
An authentication protocol to address the problem of the trusted 3rd Party authentication protocols
Gemikonakli, O. and Kirsal, Y. 2007. An authentication protocol to address the problem of the trusted 3rd Party authentication protocols. in: Elleithy, K. (ed.) Advances and innovations in systems, computing sciences and software engineering. Springer.
Modelling and performability analysis of network memory servers.
Gemikonakli, O., Mapp, G., Thakker, D., Ever, E. and Society for Modeling and Simulation International 2006. Modelling and performability analysis of network memory servers. in: 39th Annual Simulation Symposium: proceedings. California IEEE Computer Society. pp. 127-134
Modelling network memory servers with parallel processors, break-downs and repairs.
Gemikonakli, O., Mapp, G., Ever, E. and Thakker, D. 2007. Modelling network memory servers with parallel processors, break-downs and repairs. California IEEE Computer Society. pp. 11-20 https://doi.org/10.1109/ANSS.2007.29
Analysis of a phase-shift technique for inter-modulation cancellation proposed for 2-Carrier QPSK Systems.
Gemikonakli, O. 2006. Analysis of a phase-shift technique for inter-modulation cancellation proposed for 2-Carrier QPSK Systems. in: ICCTA '06: International conference on information and communication technologies; from theory to applications, 24-28 April 2006, Damascus, Syria. Institute of Electrical and Electronics Engineers.
E-Government and its Applications.
Gemikonakli, O. 2006. E-Government and its Applications. The Chamber of Architects and Engineers, TRNC. Nicosia, Cyprus, Aug 2006
A phase-shift technique for intermodulation cancellation.
Gemikonakli, O. and Institution of Electrical Engineers 2003. A phase-shift technique for intermodulation cancellation. in: Ninth international conference on HF radio systems and techniques. London IEEE. pp. 75-77
Analysis of security protocols for authentication in distributed systems
Gemikonakli, O. and Eneh, A. 2006. Analysis of security protocols for authentication in distributed systems. in: Cardoso, J. (ed.) Special issue: applied reconfigurable computing: papers selected from the First International Workshop on Applied Reconfigurable Computing (ARC 2005), held in conjunction with the IADIS International Conference Applied Computing (AC2005) in Algarve. London Taylor and Francis. pp. 301-305
The pre-emptive protocol design and analysis: hope for secure communication in societies with economic deprivation.
Gemikonakli, O. and Eneh, A. 2005. The pre-emptive protocol design and analysis: hope for secure communication in societies with economic deprivation. International journal of technology, knowledge and society.. 1 (5), pp. 35-42.
A new performance model for web servers.
Gemikonakli, O., Chakka, R., Do, T., Le Xhat, T. and École Supérieure d'Ingénieurs en Électronique et Électrotechnique. 2004. A new performance model for web servers. in: Attiya, G. and Hamam, Y. (ed.) 5th EUROSIM congress on modeling and simulation. Paris ESIEE.
Approaches to modelling open networks with bursty arrivals.
Gemikonakli, O., Chakka, R. and Harrison, P. 2002. Approaches to modelling open networks with bursty arrivals. in: Kouvatsos, D. (ed.) Performance modelling and evaluation of ATM & IP networks: [15 papers selected from those originally accepted at the eighth IFIP workshop on 'performance modelling and evaluation of ATM&IP networks']. Amsterdam Elsevier.
Modelling multiserver systems with time or operation dependent breakdowns, alternate repair strategies, reconfiguration and rebooting delays
Gemikonakli, O., Chakka, R. and Basappa, P. 2002. Modelling multiserver systems with time or operation dependent breakdowns, alternate repair strategies, reconfiguration and rebooting delays. in: Obaidat, M. (ed.) Proceedings of the 2002 international symposium on performance evaluation of computer and telecommunication systems, SPECTS 2002. San Diego, Calif. Society for Modeling and Simulation International.
Analytical modelling of large scale multi-server systems with deferred repairs: a reward rate approach.
Kocyigit, A., Ever, E., Gemikonakli, O. and Institute of Electrical and Electronics Engineers 2008. Analytical modelling of large scale multi-server systems with deferred repairs: a reward rate approach. in: Computer modeling and simulation , 2008 . EMS '08 . Second UKSIM European symposium. IEEE Computer Society. pp. 447-452
Cost reduction in high power computing using a deferred repair strategy: a simulation study
Kocyigit, A., Gemikonakli, O. and Ever, E. 2008. Cost reduction in high power computing using a deferred repair strategy: a simulation study. in: Al-Dabass, D. (ed.) UKSIM 2008: Tenth International Conference on Computer Modelling and Simulation: proceedings. Los Alamitos, California IEEE Computer Society. pp. 354-359
Numerical solution to the performability of a multiprocessor system with reconfiguration and rebooting delays.
Ever, E., Gemikonakli, O., Chakka, R., Do, T. and European conference on modelling and simulation (19th) 2005. Numerical solution to the performability of a multiprocessor system with reconfiguration and rebooting delays. in: Merkuryev, Y., Zobel, R. and Kerchoffs, E. (ed.) Simulation in wider Europe: 19th European conference on modelling and simulation ECMS 2005. ECMS. pp. 766-770
Approximate solution for the performability of Markovian queuing networks with a large number of servers.
Gemikonakli, O., Sanei, H. and Ever, E. 2007. Approximate solution for the performability of Markovian queuing networks with a large number of servers. 5th International Workshop on Signal Processing for Wireless Communication SPWC 2007,. London, UK 06 - 08 Jun 2007
An analytical approach for optimising the number of repairmen for large scale, homogeneous, multi-server systems
Ever, E., Gemikonakli, O., Sanei, H. and Kocyigit, A. 2008. An analytical approach for optimising the number of repairmen for large scale, homogeneous, multi-server systems. EMSS 2008: 20th European modeling and simulation symposium. Briatico, Italy
A mathematical model for performability evaluation of heterogeneous multiprocessor systems with reconfiguration and rebooting delays.
Ever, E., Gemikonakli, O., Chakka, R. and Do, T. 2005. A mathematical model for performability evaluation of heterogeneous multiprocessor systems with reconfiguration and rebooting delays. in: Teixeira, J. (ed.) Modelling and simulation 2005: the European simulation and modelling conference 2005, ESM 2005. Ghent EUROSIS.
Performability analysis of highly available clusters with break-downs and deferred repairs.
Ever, E., Gemikonakli, O. and Chakka, R. 2006. Performability analysis of highly available clusters with break-downs and deferred repairs. HET-NETs '06 : 4th International working conference on performance modelling and evaluation of heterogeneous networks.. Ilkley, West Yorkshire, U.K pp. 05/1-05/9
A mathematical model for performability of Beowulf clusters.
Ever, E., Gemikonakli, O. and Chakka, R. 2006. A mathematical model for performability of Beowulf clusters. in: 39th Annual Simulation Symposium: proceedings. California IEEE Computer Society. pp. 118-126
A mathematical model for highly available clusters with one head and several identical computing nodes.
Ever, E., Gemikonakli, O. and Chakka, R. 2006. A mathematical model for highly available clusters with one head and several identical computing nodes. in: Al-Begain, K., Al-Dabass, D. and Orsoni, A. (ed.) UKSIM 2006: 9th International conference on computer modelling and simulation. Oxford United Kingdom Society for Modelling and Simulation. pp. 32-37
Mathematical modelling for performability analysis of homogeneous multi-server systems with deferred repairs.
Ever, E. and Gemikonakli, O. 2006. Mathematical modelling for performability analysis of homogeneous multi-server systems with deferred repairs. in: The proceedings of the European Modelling Symposium: 11-12 September 2006. London UCL. pp. 84-88
Joint-state modeling for open queuing networks with breakdowns, repairs and finite buffers.
Chakka, R., Ever, E. and Gemikonakli, O. 2007. Joint-state modeling for open queuing networks with breakdowns, repairs and finite buffers. MASCOTS 2007: 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.. Istanbul, Turkey 24 - 26 Oct 2007 IEEE. pp. 260-266 https://doi.org/10.1109/MASCOTS.2007.29
Modelling open networks with breakdowns, repairs and finite buffers: using an IPP departure process model
Chakka, R., Ever, E. and Gemikonakli, O. 2006. Modelling open networks with breakdowns, repairs and finite buffers: using an IPP departure process model. 10th International Conference on Computers. Athens, Greece 13 - 15 Jul 2006
An approach to modelling open networks with unreliable servers and finite buffers.
Chakka, R., Ever, E. and Gemikonakli, O. 2006. An approach to modelling open networks with unreliable servers and finite buffers. WSEAS Transactions on Computers. 5 (11), pp. 2536-2543.
A formal analysis of requirements-based testing
Pecheur, C., Raimondi, F. and Brat, G. 2009. A formal analysis of requirements-based testing. in: Rothermel, G. and Dillon, L. (ed.) Proceedings of the Eighteenth International Symposium on Software Testing and Analysis Association for Computing Machinery (ACM). pp. 47-56
MCMAS: a model checker for the verification of multi-agent systems
Lomuscio, A., Qu, H. and Raimondi, F. 2009. MCMAS: a model checker for the verification of multi-agent systems. Lecture Notes in Computer Science. 5643, pp. 682-688. https://doi.org/10.1007/978-3-642-02658-4_55
Efficient online monitoring of web-service SLAs
Raimondi, F., Skene, J. and Emmerich, W. 2008. Efficient online monitoring of web-service SLAs. in: Harrold, J. and Murphy, G. (ed.) Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering Association for Computing Machinery (ACM). pp. 170-180
An overview of analysis of security standards for authentication in distributed systems.
Gemikonakli, O. and Eneh, A. 2005. An overview of analysis of security standards for authentication in distributed systems. in: Weghorn, H. (ed.) Proceedings : and the proceedings of workshops: WIS '05, MSVVEIS '05, NLUCS '05, IWUC '05, WOSIS '05, CSAC '05, PRIS '05, WSMDEIS '05 and DCEIS '05 ; Miami, U.S.A., May 24 - 28, 2005 Setúbal Institute for Systems and Technologies of Information, Control and Communication.