rapidware-pubs.bib


@INPROCEEDINGS{maxval.avida.ECAL.2007,
  AUTHOR = {David B.Knoester and Philip K. McKinley and Benjamin Beckmann and Charles A. Ofria},
  TITLE = {Directed Evolution of Communication and Cooperation in Digital Organisms},
  BOOKTITLE = {Proceedings of the 9th European Conference on Artificial Life},
  MONTH = {September},
  YEAR = {2007},
  ADDRESS = {Lisbon, Portugal},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/ecal-2007-maxval.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{sleep.avida.ECAL.2007,
  AUTHOR = {Benjamin Beckmann and Philip K. McKinley and Charles A. Ofria},
  TITLE = {Evolution of Adaptive Sleep Response in Digital Organisms},
  BOOKTITLE = {Proceedings of the 9th European Conference on Artificial Life},
  MONTH = {September},
  YEAR = {2007},
  ADDRESS = {Lisbon, Portugal},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/ecal-2007-sleep.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{KnMO.GECCO.2007,
  AUTHOR = {David B. Knoester and Philip K. McKinley and Charles Ofria},
  TITLE = {Using Group Selection to Evolve Leadership in Populations of
                  Self-Replicating Digital Organisms},
  BOOKTITLE = {Proceedings of the ACM Genetic and Evolutionary Computation Conference (GECCO-2007)},
  PAGES = {},
  YEAR = {2007},
  ADDRESS = {London, UK},
  MONTH = {July},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/gecco-2007.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{BMKO.SASO.2007,
  AUTHOR = {Benjamin Beckmann and Philip K. McKinley and David B. Knoester and Charles Ofria},
  TITLE = {Evolution of Cooperative Information Gathering in Self-Replicating Digital Organisms},
  BOOKTITLE = {Proceedings of the First IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO)},
  PAGES = {},
  YEAR = {2007},
  ADDRESS = {Boston, Massachusetts},
  MONTH = {July},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/saso-2007.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{KaMG.DEPSA.2007,
  AUTHOR = {Eric P. Kasten and Philip K. McKinley and Stuart H. Gage},
  TITLE = {Automated Ensemble Extraction and Analysis of Acoustic Data Streams},
  BOOKTITLE = {Proceedings of the First International Workshop on Distributed Event Processing, Systems and Applications (DEPSA), in conjunction with ICDCS 2007},
  PAGES = {},
  YEAR = {2007},
  ADDRESS = {Toronto, Ontario, Canada},
  MONTH = {June},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/acoustics-depsa-2007.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{GKCMO.SEAMS.2007,
  AUTHOR = {H. J. Goldsby and D. B. Knoester and B.H.C. Cheng and P. K. McKinley and C. A. Ofria},
  TITLE = {Digitally Evolving Models for Dynamically Adaptive Systems},
  BOOKTITLE = {Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)},
  PAGES = {},
  YEAR = {2007},
  ADDRESS = {Minneapolis, Minnesota},
  MONTH = {May},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/seams-2007.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{McCO.ULS-ICSE.2007,
  AUTHOR = {P. K. McKinley, B.H.C. Cheng and C. A. Ofria},
  TITLE = {Applying Digital Evolution to the Design of Self-Adaptive {ULS} Systems (Position Paper)},
  BOOKTITLE = {Proceedings of the ICSE Workshop on Software Technologies for 
Ultra-Large-Scale (ULS) Systems},
  PAGES = {},
  YEAR = {2007},
  ADDRESS = {Minneapolis, Minnesota},
  MONTH = {May},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/uls-icse-2007.pdf},
  ABSTRACT = {}
}


@ARTICLE{TaMc07.COMCOM,
  AUTHOR = {Chiping Tang and Philip K. McKinley},
  TITLE = {Topology-aware overlay path probing},
  JOURNAL = {Computer Communications},
  YEAR = {2007},
  PUBLISHER = {Elsevier},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  OPTANNOTE = {},
  NOTE = {in press},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/COMCOM-2007.pdf}
}


@ARTICLE{ZZCM.ISSE.2007,
  AUTHOR = {J. Zhang and Z. Zhou and B. H. C. Cheng and P. K. McKinley},
  TITLE = {Specifying Real-Time Properties in Autonomic Systems},
  JOURNAL = {Innovations in Systems and Software Engineering},
  PUBLISHER = {Springer},
  YEAR = {2007},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  OPTANNOTE = {},
  NOTE = {in press},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/zhang-isse-2007.pdf}
}


@ARTICLE{KaMc.MESO.TKDE.2007,
  AUTHOR = {Eric P. Kasten and Philip K. McKinley},
  TITLE = {MESO: Supporting Online Decision Making in Autonomic Computing Systems},
  JOURNAL = {IEEE Transactions on Knowledge and Data Engineering},
  YEAR = {2007},
  MONTH = {April},
  PAGES = {485-499},
  VOLUME = {19},
  NUMBER = {4},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/meso-tkde.pdf}
}


@INPROCEEDINGS{MSST.DASC.2007,
  AUTHOR = {P. K. McKinley and F. A. Samimi and J. K. Shapiro and C. Tang},
  TITLE = {Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services},
  BOOKTITLE = {Proceedings of the Second IEEE International Symposium on
Dependable, Autonomic and Secure Computing (DASC'06)},
  YEAR = {2006},
  ADDRESS = {Indianapolis, Indiana},
  MONTH = {September},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/dasc-2007.pdf},
  ABSTRACT = {}
}


@ARTICLE{TaMc05.TPDS,
  AUTHOR = {Chiping Tang and Philip K. McKinley},
  TITLE = {Energy Optimization under Informed Mobility},
  JOURNAL = {IEEE Transactions on Parallel and Distributed Systems,
special issue on Localized Communication and Topology Protocols for Ad Hoc Networks},
  YEAR = {2006},
  MONTH = {September},
  VOLUME = {17},
  NUMBER = {9},
  PAGES = {947--962},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/2006-tpds-tang.pdf}
}


@INCOLLECTION{SaMc05.Handbook,
  AUTHOR = {S. M. Sadjadi and P. K. McKinley},
  TITLE = {Transparent Autonomization in Composite Systems},
  BOOKTITLE = {Autonomic Computing: Concepts, Infrastructure, and Applications},
  EDITOR = {Salim Hariri and Manish Parashar},
  YEAR = {2006},
  PUBLISHER = {CRC Press},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/2006-handbook.pdf}
}


@ARTICLE{SPE2006,
  TITLE = {MetaSockets: Design and operation of run-time reconfigurable communication services},
  AUTHOR = {S. Sadjadi and P. McKinley and E. Kasten and Z. Zhou},
  JOURNAL = {Software Practice and Experience},
  YEAR = {2006},
  VOLUME = {36},
  NUMBER = {11-12},
  PAGES = {1157--1178},
  NOTE = {in press},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/spe-2006.pdf}
}


@ARTICLE{AdaptationSemantics-JSS06,
  TITLE = {Using Temporal Logic to Specify Adaptive Program Semantics},
  AUTHOR = {J. Zhang and B.H.C. Cheng},
  JOURNAL = {Journal of Systems and Software},
  NOTE = {Special issue on Architecting Dependable Systems, in press},
  EDITORS = {R. de Lemos and C. Gacek and A. Romanovsky},
  YEAR = {2006}
}


@INBOOK{ka05sstdma,
  AUTHOR = {S. S. Kulkarni and M. Arumugam},
  TITLE = {SS-TDMA: A Self-Stabilizing MAC for Sensor Networks},
  CHAPTER = {In Sensor Network Operations},
  PUBLISHER = {IEEE Press},
  YEAR = {2006},
  NOTE = {in press}
}


@INPROCEEDINGS{COCA.MNSA06,
  AUTHOR = {Zhinan Zhou and Philip K. McKinley},
  TITLE = {COCA: A Contract-Based Infrastructure for Composing Adaptive Multimedia Systems},
  BOOKTITLE = {Proceedings of the 8th International Workshop on Multimedia
Network Systems and Applications (MNSA 2006), held in conjunction
with the IEEE 26th International Conference on Distributed
Computing Systems (ICDCS 2006)},
  ADDRESS = {Lisbon, Portugal},
  MONTH = JUL,
  YEAR = 2006
}


@INPROCEEDINGS{sarn06:seke,
  AUTHOR = {B. Sarna-Starosta and R. E. K. Stirewalt and L. K. Dillon},
  TITLE = {A Model-based Design-for-Verification Approach to Checking
    for Deadlock in Multithreaded Applications},
  BOOKTITLE = {Proceedings of the 18th International Conference on Software Engineering
    and Knowledge Engineering},
  ADDRESS = {San Francisco, CA},
  MONTH = JUL,
  YEAR = 2006
}


@INPROCEEDINGS{Samimi06.Selfman,
  AUTHOR = {F. Samimi and P. K. McKinley and S. M. Sadjadi},
  TITLE = {Mobile service clouds: A self-managing infrastructure for autonomic mobile computing services},
  BOOKTITLE = {Proceedings of the Second IEEE International Workshop on Self-Managed Networks, Systems and Services (SelfMan)},
  YEAR = {2006},
  ADDRESS = {Dublin, Ireland},
  MONTH = {June},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/2006-Selfman.pdf}
}


@INPROCEEDINGS{MDD-AdaptiveSW-ICSE06,
  AUTHOR = {Ji Zhang and Betty H.~C. Cheng},
  TITLE = {Model-Based Develpment of Dynamically Adaptive Software},
  BOOKTITLE = {IEEE International Conference on Software
                  Engineering (ICSE06)},
  YEAR = 2006,
  ORGANIZATION = {IEEE},
  ADDRESS = {Shanghai, China},
  MONTH = {May}
}


@INPROCEEDINGS{GoalSpecs-AdaptationSemantics-SEAMS-2006,
  AUTHOR = {Gregory Brown and Betty H.C. Cheng and Ji Zhang},
  TITLE = {Goal-oriented Specification of Adaptation Requirements Engineering in Adaptive Systems},
  BOOKTITLE = {Proceedings of IEEE ICSE Workshop of Software Engineering of Adaptive and Self-Managing Systems (SEAMS06)},
  MONTH = {May},
  YEAR = {2006}
}


@INPROCEEDINGS{stir06:zum,
  AUTHOR = {R. E. K. Stirewalt and L. K. Dillon and R. Behrends},
  TITLE = {Using Views to Specify a Synchronization Aspect
    for Object-Oriented Languages},
  BOOKTITLE = {Proc. of the International Conference of Z Users},
  YEAR = {2006},
  ADDRESS = {Columbia, MD},
  MONTH = APR
}


@INPROCEEDINGS{TA-LTL-EASE-2006,
  TITLE = {{TA-LTL}: Specifying Adaptation Timing Properties in Autonomic Systems},
  AUTHOR = {Z. Zhou and J. Zhang and P. K. McKinley and B. H. C. Cheng},
  BOOKTITLE = {Third IEEE Workshop on Engineering of Autonomic and Autonomous Systems (EASe 2006)},
  ADDRESS = {Columbia, Maryland},
  MONTH = {April},
  YEAR = {2006}
}


@ARTICLE{ke05tdsc_b,
  AUTHOR = {Sandeep S. Kulkarni and Ali Ebnenasir},
  TITLE = {The Role of Specification Model in the Complexity of Adding Masking Fault-Tolerance},
  JOURNAL = {IEEE Transactions on Dependable and Secure Computing},
  YEAR = {2005},
  OPTKEY = {},
  VOLUME = {},
  NUMBER = {},
  OPTPAGES = {},
  MONTH = {},
  OPTANNOTE = {}
}


@ARTICLE{wk05,
  AUTHOR = {L. Wang and S. S. Kulkarni},
  TITLE = {Proactive Reliable Bulk Data Dissemination in Sensor
Networks},
  JOURNAL = {In Proceedings of the IASTED International Workshop on 
Distributed Algorithms and Applications for Wireless and Mobile
Systems 
(DAAWMS)},
  ADDRESS = {Phoenix, AZ},
  MONTH = {November},
  YEAR = {2005}
}


@INPROCEEDINGS{Stirewalt:tefse05,
  AUTHOR = { R. E. K. Stirewalt and M. Deng and
                        B. H. C. Cheng },
  TITLE = { UML formalization is a traceability problem },
  BOOKTITLE = { Proc. of the Workshop on Traceability and
                Emerging Forms of Software Engineering },
  PAGES = { 31--36 },
  MONTH = {November},
  YEAR = 2005
}


@INPROCEEDINGS{ekb05,
  AUTHOR = {A.~Ebnenasir and S.~S.~Kulkarni and
  B.~Bonakdarpour},
  TITLE = {Revising {UNITY} Programs: Possibilities and
Limitations.},
  BOOKTITLE = {9th International Conference on Principles of
Distributed Systems},
  YEAR = {2005}
}


@INPROCEEDINGS{UML-traceability-TEFSE05,
  TITLE = {UML formalization is a traceability problem},
  AUTHOR = {R. E. K. Stirewalt and Min Deng and Betty H. C. Cheng},
  BOOKTITLE = {3rd International Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE05 (in conjunction with ASE05)},
  PAGES = {31--36},
  MONTH = {November},
  YEAR = { 2005}
}


@ARTICLE{ke05TDSCfailsafe,
  AUTHOR = {Sandeep S. Kulkarni and Ali Ebnenasir},
  TITLE = {Complexity Issues in Automated Synthesis of Failsafe Fault-Tolerance},
  JOURNAL = {IEEE Transactions on Dependable and Secure Computing},
  YEAR = {2005},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  OPTMONTH = {},
  OPTANNOTE = {}
}


@ARTICLE{Deng:ijseke05,
  AUTHOR = { M. Deng and R. E. K. Stirewalt and B. H. C. Cheng },
  TITLE = { Retrieval by Construction: A Traceability Technique to
          Support Verification and Validation of {UML} Formalizations },
  JOURNAL = { International Journal of Software Engineering
                    and Knowledge Engineering },
  VOLUME = 15,
  NUMBER = 5,
  MONTH = OCT,
  YEAR = 2005
}


@INPROCEEDINGS{edcc5,
  AUTHOR = { Sandeep S. Kulkarni and Ali Ebnenasir },
  TITLE = {Adding Fault-Tolerance Using Pre-Synthesized
  Components
},
  BOOKTITLE = {Proceedings of the Fifth European Dependable Computing Conference
  (EDCC-5),
LNCS, Vol. 3463, p. 72},
  YEAR = {2005},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  OPTMONTH = {},
  OPTNOTE = {},
  OPTANNOTE = {}
}


@INPROCEEDINGS{NL-SpecPatterns-RE05,
  AUTHOR = {Sascha Konrad and Betty H.~C. Cheng},
  TITLE = {Facilitating the Construction of Specification Patterns-based Properties},
  BOOKTITLE = {13th IEEE International Requirements Engineering Conference (RE05)},
  YEAR = {2005},
  ORGANIZATION = {IEEE},
  ADDRESS = {Paris, France},
  MONTH = {August}
}


@INCOLLECTION{SafeAdaptation-ADS-LNCS05,
  AUTHOR = {Ji Zhang and Betty H.~C. Cheng and Zhenxiao Yang and Philip K. McKinley},
  TITLE = {Enabling Safe Dynamic Component-Based Software Adaptation},
  BOOKTITLE = {Architecting Dependable Systems {III}, Springer Lecture Notes for Computer Science},
  EDITOR = {Rogerio de Lemos, Cristina Gacek, Alexander Romanovsky},
  PUBLISHER = {Springer-Verlag},
  YEAR = {2005}
}


@PHDTHESIS{alithesis,
  AUTHOR = {Ali ~Ebnenasir},
  TITLE = {Automatic Synthesis of Fault-Tolerance},
  SCHOOL = {Michigan State University },
  YEAR = {2005},
  OPTKEY = {},
  OPTTYPE = {},
  OPTADDRESS = {},
  OPTMONTH = {},
  OPTNOTE = {},
  OPTANNOTE = {}
}


@INCOLLECTION{Sowell:ads05,
  AUTHOR = { J. H. Sowell and {R. E. K. Stirewalt} },
  TITLE = { A feature-oriented alternative to implementing
                  reliability connector wrappers },
  BOOKTITLE = { Architecting Dependable Systems III },
  EDITOR = { R. {de Lemos} and C. Gacek and A. Romanovsky },
  PUBLISHER = { Springer },
  YEAR = 2005,
  MYNOTE = {(in press)}
}


@INPROCEEDINGS{Rugaber:models05,
  AUTHOR = { R. E. K. Stirewalt and S. Rugaber },
  TITLE = { Automated invariant maintenance via {OCL} compilation },
  BOOKTITLE = { Proc. of the ACM/IEEE $8^{th}$ International
                        Conference on Model Driven Engineering
                        Languages and Systems (MoDELS/UML 2005) },
  YEAR = 2005
}


@INPROCEEDINGS{DesignAdvisor05,
  AUTHOR = {Ryan Stephenson and Betty H.~C. Cheng and Brian Berenbach},
  TITLE = {Lessons Learned from Metrics-Based Automated Analysis of Industrial UML Models},
  BOOKTITLE = { Proc. of the ACM/IEEE 8th International
                        Conference on Model Driven Engineering
                        Languages and Systems (MoDELS/UML 2005)},
  YEAR = 2005
}


@PHDTHESIS{Tang:Thesis,
  AUTHOR = {Chiping Tang},
  TITLE = {Underlay Aware Overlay Networks},
  SCHOOL = { Michigan State University },
  ADDRESS = { East Lansing, Michigan USA },
  YEAR = 2005,
  MONTH = {August}
}


@INPROCEEDINGS{RE-Levels-REFSQ05,
  AUTHOR = {Daniel M. Berry and Betty H.~C. Cheng and Ji Zhang},
  TITLE = {The Four Levels of Requirements Engineering for and
                  in Dynamic Adaptive Systems},
  BOOKTITLE = {11th International Workshop on Requirements
                  Engineering Foundation for Software Quality (REFSQ)},
  YEAR = 2005,
  ADDRESS = {Porto, Portugal},
  MONTH = {June}
}


@INPROCEEDINGS{kb05ndss,
  AUTHOR = {Sandeep S. Kulkarni and Bezawada Bruhadeshwar},
  TITLE = {Rekeying and Storage Cost for Multiple User Revocation},
  BOOKTITLE = {Proceedings of The 12th Annual Network and Distributed System Security
Symposium},
  ADDRESS = {San Diego, California},
  YEAR = {2005}
}


@INPROCEEDINGS{Stirewalt:NasaSEW05,
  AUTHOR = { R. E. K. Stirewalt and R. Behrends and L. K. Dillon },
  TITLE = { Safe and Reliable use of Concurrency in Multi-Threaded
                  Shared Memory Sytems },
  BOOKTITLE = { Proceedings of the 29th Annual IEEE/NASA Software Engineering Workshop },
  YEAR = 2005
}


@INPROCEEDINGS{Behrends:cbse05,
  AUTHOR = {R. Behrends and R. E. K. Stirewalt and L. K. Dillon},
  TITLE = {A Component-Oriented Model for the Design of Safe 
       Multi-threaded Applications},
  BOOKTITLE = {Proceedings of the 8th International SIGSOFT Symposium on 
       Component-based Software Engineering (CBSE 2005): 
       Software Components at Work},
  OPTCROSSREF = {},
  OPTKEY = {},
  OPTPAGES = {},
  YEAR = {2005},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  OPTADDRESS = {},
  MONTH = {May},
  OPTORGANIZATION = {},
  OPTPUBLISHER = {},
  OPTANNOTE = {}
}


@INPROCEEDINGS{SM05.TAI.ICAC,
  AUTHOR = {S. M. Sadjadi and P. K. McKinley},
  TITLE = {Using Transparent Shaping and Web Services to Support
                  Self-Management of Composite Systems},
  BOOKTITLE = {Proceedings of the Second IEEE International Conference on Autonomic Computing (ICAC)},
  YEAR = {2005},
  ADDRESS = {Seattle, Washington},
  MONTH = {June},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/icac-2005.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{TM05.TAROM.ADSN,
  AUTHOR = {C. Tang and P. K. McKinley},
  TITLE = {Improving Mutipath Reliability in Topology-Aware Overlay Networks},
  BOOKTITLE = {Proceedings of the Fourth International Workshop on Assurance 
				in Distributed Systems and Networks (ADSN), held in conjunction 
                with the 25th IEEE International Conference on Distributed Computing Systems},
  YEAR = {2005},
  ADDRESS = {Columbus, Ohio},
  MONTH = {June},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/adsn-2005.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{TM05.iMOBIF.WWAN,
  AUTHOR = {C. Tang and P. K. McKinley},
  TITLE = {{iMobif}: An Informed Mobility Framework for Energy Optimization in Wireless Ad Hoc Networks},
  BOOKTITLE = {Proceedings of the Second International Workshop on Wireless Ad Hoc 
                  Networking (WWAN), in conjunction with the 25th IEEE International 
                  Conference on Distributed Computing Systems},
  YEAR = {2005},
  ADDRESS = {Columbus, Ohio},
  MONTH = {June},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/wwan-2005.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{kw05,
  AUTHOR = {S. S. Kulkarni and L. Wang},
  TITLE = {{MNP}: Multihop network reprogramming service for sensor
networks},
  BOOKTITLE = {Proceedings of the 25th International Conference on 
Distributed Computing Systems (ICDCS)},
  PAGES = {7-16},
  ADDRESS = {Columbus, OH},
  MONTH = {June},
  YEAR = {2005}
}


@INPROCEEDINGS{AdaptationSemantics-WADS05,
  AUTHOR = {Ji Zhang and Betty H.~C. Cheng},
  TITLE = {Specifying Adaptation Semantics},
  BOOKTITLE = {Proceedings of the IEEE ICSE Workshop on Architecting Dependable
                  Systems (WADS)},
  YEAR = 2005,
  ORGANIZATION = {IEEE},
  ADDRESS = {St. Louis, Missouri},
  MONTH = {May}
}


@INPROCEEDINGS{RealTimeSpecPatterns-ICSE05,
  AUTHOR = {Sascha Konrad and Betty H.~C. Cheng},
  TITLE = {Real-time Specification Patterns},
  BOOKTITLE = {IEEE International Conference on Software
                  Engineering (ICSE05)},
  YEAR = 2005,
  ORGANIZATION = {IEEE},
  ADDRESS = {St. Louis, Missouri},
  MONTH = {May},
  MYNOTE = {(acceptance rate 14%)}
}


@INPROCEEDINGS{Stirewalt:futureASE05,
  AUTHOR = { R. E. K. Stirewalt },
  TITLE = { Abstract: Automating checks for deadlock in
                contract-aware programs },
  BOOKTITLE = { Proc. of the ACM/IEEE International
                Conference on Software Engineering },
  YEAR = 2005
}


@INPROCEEDINGS{FCSM05.TRAP.DEAS,
  AUTHOR = {S. Fleming and B. H. C. Cheng and R. E. K. Stirewalt and P. K. McKinley},
  TITLE = {An Approach to Implementing Dynamic Adaptation in C++},
  BOOKTITLE = {Proceedings of the ICSE Workshop on Design and Evolution of Autonomic Application Software (DEAS)},
  YEAR = {2005},
  ADDRESS = {St. Louis, Missouri},
  MONTH = {May},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/deas-2005-fleming.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{bk05deas,
  AUTHOR = {Karun N. Biyani and Sandeep S. Kulkarni},
  TITLE = {Building Component Families to Support Adaptation},
  BOOKTITLE = {Proceedings of the ICSE Workshop on Design and Evolution of Autonomic Application Software (DEAS)},
  YEAR = {2005},
  ADDRESS = {St. Louis, Missouri},
  MONTH = {May}
}


@INPROCEEDINGS{SMC05.TS.DEAS,
  AUTHOR = {S. M. Sadjadi and P. K. McKinley and B. H. C. Cheng},
  TITLE = {Transparent Shaping of Existing Software to Support Pervasive and Autonomic Computing},
  BOOKTITLE = {Proceedings of the ICSE Workshop on Design and Evolution of Autonomic Application Software (DEAS)},
  YEAR = {2005},
  ADDRESS = {St. Louis, Missouri},
  MONTH = {May},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/deas-2005.pdf},
  ABSTRACT = {}
}


@PHDTHESIS{Ge:Thesis,
  AUTHOR = {Peng Ge},
  TITLE = {Interactive Video Multicast in Wireless {LANs}},
  SCHOOL = { Michigan State University },
  ADDRESS = { East Lansing, Michigan USA },
  YEAR = 2004,
  MONTH = DEC
}


@INPROCEEDINGS{kb05icdcit,
  AUTHOR = {Sandeep S. Kulkarni and Bezawada Bruhadeshwar},
  TITLE = {Distributing Key Updates in Secure Dynamic Groups},
  BOOKTITLE = {Proceedings of the First International Conference on Distributed Computing and Internet Technology (LNCS vol.3347)},
  ADDRESS = {Bhubaneswar, India},
  YEAR = {2004},
  PAGES = {410--419}
}


@ARTICLE{ObjectAnalysisPatterns-TSE,
  AUTHOR = {Sascha Konrad and Betty H.~C. Cheng and Laura Campbell},
  TITLE = {Object Analysis Patterns for Embedded Systems},
  OPTABSTRACT = {},
  JOURNAL = {IEEE Transactions on Software Engineering},
  YEAR = {2004},
  PAGES = {970--992},
  MONTH = {December},
  VOLUME = {30},
  NUMBER = {12}
}


@PHDTHESIS{Ge-thesis-2004,
  AUTHOR = {Peng Ge},
  TITLE = {Interactive Video Multicast in Wireless LANs},
  SCHOOL = {Michigan State University},
  YEAR = {2004},
  ADDRESS = {Department of Computer Science and Engineering},
  MONTH = {December}
}


@INPROCEEDINGS{kb04icdcit,
  AUTHOR = {Sandeep S. Kulkarni and
               Bezawada Bruhadeshwar},
  TITLE = {Distributing Key Updates in Secure Dynamic Groups},
  BOOKTITLE = {Proceedings of the First International Conference on
Distributed Computing and Internet Technology},
  ADDRESS = {Bhubaneswar, India},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  VOLUME = {3347},
  YEAR = {2004},
  MONTH = {December},
  ISBN = {3-540-24075-6},
  BIBSOURCE = {DBLP, http://dblp.uni-trier.de}
}


@INPROCEEDINGS{ResourceFeatureInteraction-WOSS04,
  AUTHOR = {Jesus Bisbal and Betty H.~C. Cheng},
  TITLE = {Resource-based Approach to Feature Interaction in
                  Adaptive Software},
  BOOKTITLE = {ACM SIGSOFT Workshop on Self-Managing Systems (WOSS04)},
  YEAR = {2004},
  MONTH = {November}
}


@INPROCEEDINGS{ke04savcbs,
  AUTHOR = {Sandeep S. Kulkarni and Ali Ebnenasir},
  TITLE = {Hierarchical Presynthesized Component for Automatic Addition of Fault-Tolerance:
 A Case Study. },
  BOOKTITLE = {Proceedings of ACM Workshop on Specification and Verification of Component-Based Systems (SAVCBS)},
  YEAR = {2004}
}


@INPROCEEDINGS{KaMc.MESO.ICDL04,
  AUTHOR = {E. P. Kasten and P. K. McKinley},
  TITLE = {MESO: Perceptual memory to support online learning in adaptive software},
  BOOKTITLE = {Proceedings of the 3rd International Conference on Development and Learning (ICDL'04)},
  PAGES = {},
  YEAR = {2004},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {La Jolla, California},
  MONTH = {October},
  OPTORGANIZATION = {},
  OPTPUBLISHER = {},
  OPTANNOTE = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/icdl-2004.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{TRAP.DOA.04,
  AUTHOR = {S. M. Sadjadi and P. K. McKinley and B. H. C. Cheng and R. E. K. Stirewalt},
  TITLE = {{TRAP/J}: Transparent Generation of Adaptable Java Programs},
  BOOKTITLE = {Proceedings of the 2004 International Symposium on Distributed Objects and Applications},
  PAGES = {},
  YEAR = {2004},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Agia Napa, Cyprus},
  MONTH = {October},
  OPTORGANIZATION = {},
  OPTPUBLISHER = {},
  OPTANNOTE = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/trap-doa04.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{M2.RM2004,
  AUTHOR = {Z. Yang and Z. Zhou and B. H. C. Cheng and P. K. McKinley},
  TITLE = {Enabling Collaborative Adaptation across Legacy Components},
  BOOKTITLE = {Proceedings of the Third Workshop on Reflective and Adaptive Middleware (with Middleware'04)},
  PAGES = {},
  YEAR = {2004},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Toronto, Ontario, Canada},
  MONTH = {October},
  OPTORGANIZATION = {},
  OPTPUBLISHER = {},
  OPTANNOTE = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/m2-rm2004.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{KMX.MPAC.04,
  AUTHOR = {F. Samimi and P. K. McKinley and S. M. Sadjadi and P. Ge},
  TITLE = {Kernel-Middleware Interaction to Support Adaptation in
Pervasive Computing Environments},
  BOOKTITLE = {Proceedings of the Second
International Workshop on Middleware for Pervasive and Ad-Hoc Computing (with Middleware'04},
  PAGES = {},
  YEAR = {2004},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Toronto, Ontario, Canada},
  MONTH = {October},
  OPTORGANIZATION = {},
  OPTPUBLISHER = {},
  OPTANNOTE = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/kmx-mpac04.pdf},
  ABSTRACT = {}
}


@ARTICLE{lites04,
  AUTHOR = {A. Arora and P. Dutta and S. Bapat and V. Kulathumani
and H. Zhang
and V. Naik and V. Mittal and H. Cao and M. Demirbas and M. Gouda
 and Y-R. Choi and T. Herman and S. S. Kulkarni and U. Arumugam
 and M.
Nesterenko and A. Vora and M. Miyashita},
  TITLE = {A Line in the sand: A wireless sensor network for target
detection,
classification, and tracking},
  JOURNAL = {Computer Networks (Elsevier)},
  YEAR = {2004},
  URL = {http://www.cse.msu.edu/~sandeep/publications/lites04}
}


@ARTICLE{ck04,
  AUTHOR = {G. Chakrabarti and S. Kulkarni},
  TITLE = {Load Balancing and Resource Reservation in
  Ad-hoc Networks},
  JOURNAL = {Ad-Hoc Networks},
  YEAR = {2005},
  URL = {http://www.cse.msu.edu/~sandeep/publications/ck04}
}


@INPROCEEDINGS{lopstr04,
  AUTHOR = {Sandeep S. Kulkarni and Borzoo Bonakdarpour
  and Ali Ebnenasir},
  TITLE = {Mechanical Verification of Automatic Synthesis
  of
Fault-Tolerance},
  BOOKTITLE = {Proceedings of the International Symposium on 
Logic-based Program Synthesis and Transformation},
  YEAR = {2004},
  URL = {http://www.cse.msu.edu/~sandeep/publications/kbe04}
}


@INPROCEEDINGS{TimingPatterns-ASE04,
  AUTHOR = {Sascha Konrad and Laura Campbell and Betty H.~C. Cheng},
  TITLE = {Automated Analysis of Timing Information in UML Diagrams},
  BOOKTITLE = {Proc. of IEEE International Conference on Automated Software Engineering},
  YEAR = {2004},
  MONTH = {September},
  ADDRESS = {Linz, Austria}
}


@INPROCEEDINGS{Behrends:saps04,
  AUTHOR = { R. Behrends and R. E. K. Stirewalt and L. K. Dillon },
  TITLE = { Avoiding serialization vulnerabilities through the
              use of synchronization contracts },
  BOOKTITLE = { Proc. of the Workshop on Specification and
                        Automated Processing of Security
                        Requirements },
  PAGES = { 207--219 },
  PUBLISHER = { Austrian Computer Society },
  MONTH = SEP,
  YEAR = 2004
}


@INPROCEEDINGS{multitolke04,
  AUTHOR = {S. S. ~Kulkarni and A. ~Ebnenasir},
  TITLE = {Automated Synthesis of Multitolerance},
  BOOKTITLE = {Proceedings of the International Conference on Dependable Systems
  and Networks, Palazzo dei Congressi, Florence, Italy, June 28 - July 1},
  YEAR = {2004},
  URL = {http://www.cse.msu.edu/~sandeep/publications/ke04a}
}


@PHDTHESIS{Sadjadi:Thesis,
  AUTHOR = {S. Masoud Sadjadi},
  TITLE = {Transparent Shaping Support for Adaptability in Pervasive and Autonomic Computing},
  SCHOOL = { Michigan State University },
  ADDRESS = { East Lansing, Michigan USA },
  YEAR = 2004,
  MONTH = AUG
}


@PHDTHESIS{Campbell-thesis-2004,
  AUTHOR = {Laura A.~Campbell},
  TITLE = {Enabling Integrative Analyses and Refinement of Object-Oriented Models with Special Emphasis on High-Assurance Embedded Systems},
  SCHOOL = {Michigan State University},
  YEAR = {2004},
  ADDRESS = {Department of Computer Science and Engineering},
  MONTH = {August}
}


@ARTICLE{sat04,
  AUTHOR = {Ali Ebnenasir and Sandeep S. Kulkarni},
  TITLE = {{SAT}-Based Synthesis of Fault-Tolerance},
  JOURNAL = {Fast Abstracts of the International Conference
  on Dependable
Systems and Networks, Palazzo dei Congressi, Florence, Italy, June 28 - July 1},
  YEAR = 2004,
  URL = {http://www.cse.msu.edu/~sandeep/publications/ek04a}
}


@ARTICLE{McKinley.Computer.2004,
  AUTHOR = {P. K. McKinley and S. M. Sadjadi and E. P. Kasten and B. H. C. Cheng},
  TITLE = {Composing Adaptive Software},
  JOURNAL = {IEEE Computer},
  VOLUME = {37},
  NUMBER = {7},
  OPTMONTH = {July},
  YEAR = {2004},
  PAGES = {56-64},
  URL = {http://www.cse.msu.edu/rapidware/survey}
}


@INPROCEEDINGS{Zhou.IWQOS.2004,
  AUTHOR = {Z. Zhou and P. K. McKinley and S. M. Sadjadi},
  TITLE = {On Quality-of-Service and Energy Consumption Tradeoffs in 
           {FEC}-Enabled Audio Streaming},
  BOOKTITLE = {Proceedings of the 12th IEEE International Workshop on Quality of Service (IWQoS 2004)},
  YEAR = {2004},
  ADDRESS = {Montreal, Canada},
  MONTH = {June},
  ABSTRACT = {
    This paper addresses the energy consumption of forward error
    correction (FEC) protocols as used to improve quality-of-service
    (QoS) for wireless computing devices. The paper also characterizes the effect on energy
    consumption and QoS of the power saving mode in 802.11
    wireless local area networks (WLANs). Experiments are described in
    which FEC-encoded audio streams are multicast to mobile
    computers across a WLAN. Results of these experiments
    quantify the tradeoffs between improved QoS, due to FEC, and
    additional energy consumption caused by receiving and decoding
    redundant packets. Two different approaches to FEC are
    compared relative to these metrics. The results of this study enable the development of
    adaptive software mechanisms that attempt to manage these
    tradeoffs in the presence of highly dynamic wireless environments.
  },
  NOTE = {selected as Best Student Paper)},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/iwqos-04.pdf}
}


@INPROCEEDINGS{ka04b,
  AUTHOR = {S. S. Kulkarni and M(U). Arumugam},
  TITLE = {Approximate Causal Observer},
  BOOKTITLE = {Proceedings of the International Workshop on
Networked Sensing Systems (INSS)},
  PAGES = {123-128},
  MONTH = {June},
  YEAR = {2004},
  URL = {http://www.cse.msu.edu/~sandeep/publications/ka04b}
}


@INPROCEEDINGS{Stirewalt:asee04,
  AUTHOR = { R. E. K. Stirewalt },
  TITLE = { Teaching software engineering ``bottom up'' },
  BOOKTITLE = { Proc. of the ASEE Annual Conference and
        Exposition },
  URL = { http://www.cse.msu.edu/~stire/Papers/asee04.doc
        },
  MONTH = {June},
  YEAR = 2004
}


@INPROCEEDINGS{cbse7-04,
  AUTHOR = {Sandeep Kulkarni and Karun Biyani},
  TITLE = {Correctness of Component-based Adaptation},
  BOOKTITLE = {Proceedings of the International Symposium on Component-based
  Software Engineering},
  YEAR = 2004,
  MONTH = {May},
  URL = {http://www.cse.msu.edu/~sandeep/publications/kb04a}
}


@INPROCEEDINGS{Cheng-SafeAdaptation,
  AUTHOR = {Ji Zhang and Zhenxiao Yang and Betty H.~C. Cheng and Philip K. McKinley},
  TITLE = {Adding Safeness to Dynamic Adaptation Techniques},
  BOOKTITLE = {Proceedings of the ICSE 2004 Workshop on Architecting Dependable Systems},
  YEAR = {2004},
  ADDRESS = {Edinburgh, Scotland},
  MONTH = {May},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/WADS-04.pdf}
}


@INPROCEEDINGS{Sowell:wads04,
  AUTHOR = { J. H. Sowell and R. E. K. Stirewalt },
  TITLE = { Middleware reliability implementations
                and connector wrappers },
  BOOKTITLE = { Proc. of the ICSE Workshop on Architecting
                Dependable Systems (WADS'04) },
  URL = {http://www.cse.msu.edu/~stire/Papers/wads04.pdf },
  MONTH = {May},
  YEAR = 2004
}


@INPROCEEDINGS{ACT-ICAC,
  AUTHOR = {S. M. Sadjadi and P. K. McKinley},
  TITLE = {Transparent Self-Optimization in Existing {CORBA} Applications},
  BOOKTITLE = {Proceedings of the International Conference on Autonomic Computing (ICAC-04)},
  YEAR = {2004},
  ADDRESS = {New York, NY},
  MONTH = {May},
  ABSTRACT = {
    This paper addresses the design of adaptive middleware 
    to support autonomic computing in pervasive computing 
    environments.  
    The particular problem we address here is how to support 
    self-optimization to changing network connection capabilities
    as a mobile user interacts with heterogeneous elements
    in a wireless network infrastructure.
    The goal is to enable self-optimization to such changes 
    transparently with respect to the core application code.
    We propose a solution based on the use of the {\em generic 
    proxy}, which is a specific CORBA object that can intercept 
    and process any CORBA request using rules and actions that 
    can be introduced to the knowledge base of the proxy during 
    execution.
    To explore its design and operation, we have incorporated
    the generic proxy into ACT [1], an adaptive 
    middleware framework we designed previously to support 
    adaptation in CORBA applications.
    Details of the generic proxy are presented, followed by 
    results of a case study enabling self-optimization for an 
    existing surveillance application in a heterogeneous 
    wireless environment.
  },
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/ACT-ICAC.pdf}
}


@INPROCEEDINGS{TRAP-ICAC,
  AUTHOR = {S. M. Sadjadi and P. K. McKinley and R. E. K. Stirewalt and B. H.~C. Cheng},
  TITLE = {Generation of Self-Optimizing Wireless Network Applications},
  BOOKTITLE = {Proceedings of the International Conference on Autonomic Computing (ICAC-04)},
  YEAR = {2004},
  ADDRESS = {New York, NY},
  MONTH = {May},
  ABSTRACT = {
    This paper introduces {\em TRAP/J}, a software tool that 
    enables autonomic computing in existing Java programs by 
    generating {\em adapt-ready} versions of the original programs
    at compile time.
    The generation process is transparent to the original 
    program source code, in which there is no need to modify
    the source code manually.
    At run time, new behavior can be introduced to the adapt-ready
    programs.   
    To reduce overhead, TRAP/J enables the developer to select, 
    at compile time, a subset of classes, constituting an 
    existing program, to be adaptive at run time.
    To support dynamic adaptation in existing Java programs, 
    TRAP/J benefits from aspect-oriented programming and 
    behavioral reflection.
    TRAP/J generate specific aspects and reflective classes associated 
    with the selected classes.
    A case study is presented in which TRAP/J was used to 
    enable an existing audio-streaming application to perform 
    self-optimization in a wireless network environment by 
    adapting to changing conditions automatically.
  },
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/TRAP-ICAC.pdf}
}


@INPROCEEDINGS{ACT-ICDCS,
  AUTHOR = {S. M. Sadjadi and P. K. McKinley},
  TITLE = {{ACT}: An Adaptive {CORBA} Template to Support Unanticipated
                   Adaptation},
  BOOKTITLE = {Proceedings of the 24th IEEE International Conference on Distributed Computing Systems (ICDCS)},
  ABSTRACT = { This paper proposes an Adaptive CORBA Template (ACT), which
                   enables run-time improvements to CORBA applications in
                   response to unanticipated changes in either their functional
                   requirements or their execution environments. ACT enhances
                   CORBA applications by weaving adaptive code into the
                   applications' object request brokers (ORBs) at run time. The
                   woven code intercepts and adapt the requests, replies, and
                   exceptions that pass through the ORBs. ACT itself is
                   language- and ORB-independent. Specifically, ACT can be used
                   to develop an object-oriented framework in any language that
                   supports dynamic loading of code and can be applied to any
                   CORBA ORB that supports portable interceptors. Moreover, ACT
                   can be integrated with other adaptive CORBA frameworks and
                   can be used to support interoperation among otherwise
                   incompatible frameworks. To evaluate the performance and
                   functionality of ACT, we implemented a prototype in Java to
                   support unanticipated adaptation in non-functional concerns,
                   such as quality-of-service and system-resource management.
                   Our experimental results show that the overhead introduced
                   by the ACT infrastructure is negligible, while the
                   adaptations offered are highly flexible.},
  MONTH = {March},
  YEAR = {2004},
  ADDRESS = {Tokyo, Japan},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/icdcs-04-act.pdf}
}


@INPROCEEDINGS{tang-icdcs04,
  AUTHOR = {C. Tang and P. K. McKinley},
  TITLE = {A Distributed Approach to Topology-Aware Overlay Path
Monitoring},
  BOOKTITLE = {Proceedings of the 24th IEEE International Conference on
Distributed Computing Systems (ICDCS)},
  ADDRESS = {Tokyo, Japan},
  MONTH = {March},
  YEAR = {2004},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/icdcs-04-tang.pdf}
}


@INPROCEEDINGS{DARES-2004,
  TITLE = {Perimorph: Run-Time Composition and State Management for Adaptive Systems},
  AUTHOR = {E. P. Kasten and P. K. McKinley},
  BOOKTITLE = {Proceedings of Fourth International Workshop on Distributed Auto-Adaptive and Reconfigurable Systems (DARES), in conjunction with ICDCS 2004},
  ADDRESS = {Hachioji, Japan},
  MONTH = {March},
  YEAR = {2004},
  PAGES = {332-337},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/dares04.pdf}
}


@INPROCEEDINGS{ka04a,
  AUTHOR = {S. S. Kulkarni and M(U). Arumugam},
  TITLE = {{TDMA} Service for Sensor Networks},
  BOOKTITLE = {Proceedings of the Third International Workshop on
Assurance in
Distributed Systems and Networks},
  MONTH = {March},
  YEAR = {2004},
  URL = {http://www.cse.msu.edu/~sandeep/publications/ka04a}
}


@PHDTHESIS{Behrends:Thesis,
  AUTHOR = { R. Behrends},
  TITLE = { Designing and Implementing a Model of Synchronization
                  Contracts in Object-Oriented Languages },
  SCHOOL = { Michigan State University },
  ADDRESS = { East Lansing, Michigan USA },
  YEAR = 2003,
  MONTH = DEC
}


@INPROCEEDINGS{ka03b,
  AUTHOR = {S. S. Kulkarni and M(U). Arumugam},
  TITLE = {Transformations for Write-All-With-Collision Model},
  BOOKTITLE = {Proceedings of the International Conference on
Principles of
Distributed Systems (OPODIS)},
  VOLUME = {LNCS:3144},
  PAGES = {184-197},
  MONTH = {December},
  YEAR = {2003},
  URL = {http://www.cse.msu.edu/~sandeep/publications/ka03b}
}


@INPROCEEDINGS{tang-icnp03,
  AUTHOR = {C. Tang and P. K. McKinley},
  TITLE = {On the Cost-Quality Tradeoff in Topology-Aware Overlay Path
Probing},
  BOOKTITLE = {Proceedings of the 11th IEEE International Conference on Network
Protocols (ICNP)},
  PAGES = {268-279},
  ADDRESS = {Atlanta, Georgia},
  MONTH = {November},
  YEAR = {2003},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/icnp-03.pdf}
}


@ARTICLE{adsn03,
  AUTHOR = {Sandeep S. Kulkarni and Bezawada Bruhadeshwar},
  TITLE = {Adaptive Rekeying for Secure Multicast},
  JOURNAL = {IEEE/IEICE Special Issue on Communications:
  Transactions on Communications},
  YEAR = {2003},
  OPTKEY = {},
  VOLUME = {E86-B},
  NUMBER = {10},
  PAGES = {2948-2956},
  MONTH = {October},
  OPTNOTE = {},
  OPTANNOTE = {},
  URL = {http://www.cse.msu.edu/~sandeep/publications/kb03}
}


@INPROCEEDINGS{tang-mswim03,
  AUTHOR = {C. Tang and P. K. McKinley},
  TITLE = {Modeling Multicast Packet Losses in Wireless {LANs}},
  BOOKTITLE = {Proceedings of the Sixth ACM International Workshop on Modeling,
Analysis and Simulation of Wireless and Mobile Systems (MSWiM) (in conjunction
with ACM Mobicom 2003)},
  PAGES = {130-133},
  ADDRESS = {San Diego, California},
  MONTH = {September},
  YEAR = {2003},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/mswim-03.pdf}
}


@ARTICLE{ComposableProxies,
  AUTHOR = {P. K. McKinley and U. I. Padmanabhan and N. Ancha and S. M. Sadjadi},
  TITLE = {Composable Proxy Services to Support Collaboration on the Mobile Internet},
  JOURNAL = {IEEE Transactions on Computers (Special Issue on Wireless Internet)},
  ABSTRACT = {This paper describes the design and operation of a composable 
proxy infrastructure that enables mobile Internet users to
collaborate via heterogeneous devices and network connections. 
The approach is based on detachable Java I/O streams, which
enable proxy filters and transcoders to be dynamically inserted, 
removed, and reordered on a given data stream. Unlike conventional
Java I/O streams, detachable streams can be stopped, disconnected, 
reconnected, and restarted. As such, they provide a convenient
method by which to support the dynamic composition of proxy services. 
Moreover, use of the I/O stream abstraction enables network
distribution and stream adaptability to be implemented transparently 
with respect to application components. The operation and implementation 
of detachable streams are described. To evaluate the composable proxy 
infrastructure, it is used to enhance interactive audio communication 
among users of a Web-based collaborative computing framework. 
Two forward error correction (FEC) proxylets are developed, one using 
block erasure codes and the other using the GSM 06.10 encoding algorithm. 
Separately, each type of FEC improves the ability of the audio stream 
to tolerate errors in a wireless LAN environment. When composed in a 
single proxy, however, they cooperate to correct additional types of burst 
errors. Results are presented from a performance study conducted on a
mobile computing testbed.},
  YEAR = {2003},
  PAGES = {713-726},
  MONTH = {June},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/mckinley-toc-si-revision.pdf}
}


@INPROCEEDINGS{kba03,
  AUTHOR = {S. S. Kulkarni and K. N. Biyani and U. Arumugam},
  TITLE = {Composing Distributed Fault-Tolerance Components},
  BOOKTITLE = {Proceedings of the International Conference on
Dependable Systems
and Networks (DSN), Supplemental Volume, Workshop on Principle
s of Dependable Systems (PoDSy)},
  PAGES = {W127-W136},
  MONTH = {June},
  YEAR = {2003},
  URL = {http://www.cse.msu.edu/~sandeep/publications/kba03}
}


@INPROCEEDINGS{enhance03,
  AUTHOR = {Sandeep S. Kulkarni and Ali Ebnenasir},
  TITLE = {Enhancing The Fault-Tolerance of Nonmasking
  Programs},
  BOOKTITLE = {Proceedings of the 23rd IEEE International Conference on Distributed
  Computing
Systems, Providence, Rhode Island USA, May 19-22},
  YEAR = 2003,
  URL = {http://www.cse.msu.edu/~sandeep/publications/ke03a}
}


@ARTICLE{docsymp03,
  AUTHOR = {Ali Ebnenasir},
  TITLE = {Algorithmic Synthesis of Fault-Tolerant
  Distributed
Programs},
  JOURNAL = {Doctoral Symposium of 23rd International
  Conference on
Distributed Computing Systems, Providence, Rhode Island USA, May
  19-22},
  YEAR = 2003,
  URL = {http://www.cse.msu.edu/~sandeep/publications/e03}
}


@INPROCEEDINGS{ka03a,
  AUTHOR = {S. S. Kulkarni and U. Arumugam},
  TITLE = {Collision-Free Communication in Sensor Networks},
  BOOKTITLE = {Proceedings of the Sixth Symposium on
Self-stabilizing Systems
(SSS), Springer},
  VOLUME = {LNCS:2704},
  PAGES = {17-31},
  MONTH = {June},
  YEAR = {2003},
  URL = {http://www.cse.msu.edu/~sandeep/publications/ka03a}
}


@INPROCEEDINGS{MetaSockets,
  AUTHOR = {S. M. Sadjadi and P. K. McKinley and E. P. Kasten},
  TITLE = {Architecture and Operation of an Adaptable Communication Substrate},
  BOOKTITLE = {Proceedings of the Ninth IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS'03)},
  YEAR = {2003},
  MONTH = {May},
  PAGES = {46-55},
  ADDRESS = {San Juan, Puerto Rico},
  ABSTRACT = {This paper describes the internal architecture and operation of an adaptable communication component called the MetaSocket. MetaSockets are created using Adaptive Java, a reflective extension to Java that enables a component's internal architecture and behavior to be adapted at run time in response to external stimuli. This paper describes how adaptive behavior is implemented in MetaSockets, as well as how MetaSockets interact with other adaptive components, such as decision makers and event mediators. Results of experiments on a mobile computing testbed demonstrate how MetaSockets respond to dynamic wireless channel conditions in order to improve the quality of interactive audio streams delivered to iPAQ handheld computers. },
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/ftdcs-03.pdf}
}


@INPROCEEDINGS{AOP-WOSS02,
  AUTHOR = {Z.~Yang and B.~H.~C. Cheng and R.~E.~K.~Stirewalt and J.~Sowell and S.~M.~Sadjadi and P.~K.~McKinley},
  TITLE = {An Aspect-Oriented Approach to Dynamic Adaptation},
  BOOKTITLE = {Proceedings of the ACM SIGSOFT Workshop on Self-Healing Systems (WOSS02)},
  OPTCROSSREF = {},
  OPTKEY = {},
  OPTPAGES = {},
  YEAR = {2002},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Charleston, South Carolina},
  MONTH = {November},
  OPTORGANIZATION = {IEEE Computer Society},
  OPTPUBLISHER = {},
  OPTANNOTE = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/woss02.pdf},
  ABSTRACT = {This paper presents an aspect-oriented approach to dynamic adaptation. A systematic process for defining where, when, and how an adaptation is to be incorporated into an application is presented. Specifically, the paper presents a two-phase approach to dynamic adaptation, where the first phase prepares a non-adaptive program for adaptation, and the second phase implements the adaptation at run time. This approach is illustrated with a distributed conferencing application.
}
}


@INPROCEEDINGS{MSKK02.WEARABLE,
  AUTHOR = {P. K. McKinley and S. Sadjadi and E. P. Kasten and R. Kalaskar},
  TITLE = {Programming Language Support for Adaptable Wearable Computing},
  BOOKTITLE = {Proceedings of the Sixth International Symposium on Wearable Computers},
  ADDRESS = {Seattle, Washington},
  MONTH = {October},
  YEAR = {2002},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/iswc02.pdf},
  ABSTRACT = {
This paper investigates the use of programming language constructs
to realize adaptive behavior in support of collaboration among users of 
wearable and handheld computers.
A prototype language, Adaptive Java, contains primitives 
that permit programs to modify their own operation
in a principled manner.
In a case study, Adaptive Java was used to construct
MetaSocket components, whose composition and behavior
can be adapted to changing conditions
during execution.  MetaSockets were then integrated into Pavilion, a web-based
collaboration framework, and experiments were conducted 
on a mobile computing testbed containing wearable, handheld, and laptop computer systems.
Performance results demonstrate the utility of MetaSockets to improving the
quality of interactive audio streams and reliable data transfers among
collaborating users.
}
}


@INPROCEEDINGS{McSK02.ICTS,
  AUTHOR = {P. K. McKinley and S. M. Sadjadi and E. P. Kasten},
  TITLE = {An Adaptive Software Approach to Intrusion Detection and Response},
  BOOKTITLE = {Proceedings of the 10th International Conference on Telecommunication Systems, Modeling and Analysis},
  PAGES = {},
  YEAR = {2002},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Monterey, California},
  MONTH = {October},
  OPTORGANIZATION = {IEEE Computer Society},
  OPTPUBLISHER = {},
  OPTANNOTE = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/icts10.ps.gz},
  ABSTRACT = {
This paper proposes the use of programming 
language constructs to support adaptive self-monitoring
and self-reporting software. 
The methods are particularly well-suited to wireless mobile 
devices, where limited resources may constrain
the use of certain software audits. 
An adaptive software architecture is described
that supports run-time transformations on software components,
enabling them to report
internal details on how they are being used to other parts
of the system.
Effectively, any component of the system can be turned into
an ``informer'' at run time, and the nature of the
reported 
information can be adapted dynamically based on changing 
conditions or directives from another authority, such
as an intrusion detection system.
A prototype implementation is described.
The operation of the system is demonstrated through an experiment in
which it detects and responds to a malicious host that 
multicasts ``noise'' packets to a wireless iPAQ handheld computer.
}
}


@INPROCEEDINGS{SaMK02.DOA,
  AUTHOR = {S. M. Sadjadi and P. K. McKinley and E. P. Kasten},
  TITLE = {MetaSockets: Run-Time Support for Adaptive Communication Services (Poster Summary)},
  BOOKTITLE = {Addendum to the Proceedings of the 2002 International Symposium on Distributed Objects and Applications},
  PAGES = {},
  YEAR = {2002},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Irvine, California},
  MONTH = {October},
  OPTORGANIZATION = {},
  OPTPUBLISHER = {},
  OPTANNOTE = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/doa02.pdf},
  ABSTRACT = {
This paper describes the use of the Adaptive Java programming
language to develop an
adaptable communication component called the MetaSocket.
MetaSockets are created from existing Java socket classes, but
their structure and behavior can be adapted at run time in
response to external stimuli.  
Results of experiments
on a mobile computing testbed demonstrate how
MetaSockets respond to dynamic wireless channel conditions
in order to improve the quality
of interactive audio streams delivered to iPAQ handheld computers.
}
}


@INPROCEEDINGS{gk02,
  AUTHOR = {G. Chakrabarti and S. S. Kulkarni},
  TITLE = {A Modified Approach to Dynamic Source Routing in Mobile 
Ad-Hoc Networks},
  BOOKTITLE = {Proceedings of AD-HOC NetwOrks and Wireless {(ADHOC-NOW)}},
  YEAR = {2002},
  ADDRESS = {Toronto, Canada},
  MONTH = {September},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  OPTMONTH = {},
  OPTNOTE = {},
  OPTANNOTE = {},
  URL = {http://www.cse.msu.edu/~sandeep/publications/adhocnow02/main.ps},
  ABSTRACT = {To ensure uninterrupted communication in a mobile ad-hoc network,
efficient route discovery is crucial when nodes move and/or fail.
Hence, protocols such as Dynamic Source Routing (DSR) precompute
alternate routes before a node moves and/or fails.  In this paper, we
modify the way these alternate routes are maintained and used in DSR,
and show that these modifications permit more efficient route
discovery when nodes move and/or fail.  Our simulation results show
that maintenance of these alternate routes (without affecting the
route cache size at each router) increases the packet delivery ratio
without incurring any extra traffic overhead.  We also show that our
approach enables us to provide QoS guarantees by ensuring that
appropriate bandwidth will be available for a flow even when nodes
move.  Towards this end, we show how reservations can be made on the
alternate routes while maximizing the bandwidth usage in situations
where nodes do not move.
}
}


@ARTICLE{ChCM02.UML,
  AUTHOR = {Laura A.~Campbell and Betty H.~C.~Cheng and William
E.~McUmber and R.~E.~K.~Stirewalt},
  TITLE = {Automatically Detecting and Visualizing Errors in UML
Diagrams},
  JOURNAL = {Requirements Engineering Journal},
  OPTVOLUME = {37},
  OPTNUMBER = {10},
  OPTMONTH = {October},
  YEAR = {2002},
  KEY = {FM},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/rej02.pdf},
  ABSTRACT = {UML has become the de facto standard for
object-oriented modeling. Currently, UML comprises several
different notations with no formal semantics attached to the
individual diagrams or their integration, thus preventing
rigorous analysis of the diagrams. Previously, we have developed
a formalization framework that attaches formal semantics to a
subset of UML diagrams used to model embedded systems. This paper
describes automated structural and behavioral analyses applicable
to UML diagrams using our formalization framework. In addition to
intra- and inter-diagram consistency checks, we discuss how
simulation and model checking can be used in tandem for
behavioral analysis of the UML diagrams. Our tools also visually
interpret the analysis results in terms of the original UML
diagrams, thereby facilitating their correction and
refinement. We illustrate these capabilities through the modeling
and analysis of UML diagrams for an automotive industrial case
study.
}
}


@ARTICLE{McTM01.TPDS,
  AUTHOR = {Philip K. McKinley and Chiping Tang and Arun P. Mani},
  TITLE = {A Study of Adaptive Forward Error Correction for for Wireless Collaborative Computing},
  JOURNAL = {IEEE Transactions on Parallel and Distributed Systems},
  MONTH = {September},
  YEAR = {2002},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  OPTANNOTE = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/mckinley-tpds-02.ps.gz},
  ABSTRACT = {
	This paper addresses the problem of reliably multicasting web
	resources across wireless local area networks (WLANs) in support
	of collaborative computing applications.  An adaptive forward
	error correction (FEC) protocol is described, which adjusts the
	level of redundancy in the data stream in response to packet loss
	conditions.  The proposed protocol is intended for use on a proxy
	server that supports mobile users on a WLAN.  The software
	architecture of the proxy service and the operation of the
	adaptive FEC protocol are described.  The performance of the
	protocol is evaluated using both experimentation on a mobile
	computing testbed as well as simulation.  The results of the
	performance study show that the protocol can quickly accommodate
	worsening channel characteristics in order to reduce delay and
	increase throughput for reliable multicast channels.
}
}


@INPROCEEDINGS{TaMc02.protocol,
  AUTHOR = {Chiping Tang and P. K. McKinley},
  TITLE = {Adaptive Reliable Multicast in Wireless {LANs}},
  BOOKTITLE = {Proceedings of the IEEE International Conference on Networking},
  ADDRESS = {Atlanta, Georgia},
  MONTH = {August},
  YEAR = {2002},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/icn-2002-tang.pdf},
  ABSTRACT = {
	Wireless local area networks pose new challenges to error
	recovery and flow control in reliable multicast
	protocols. Limited wireless bandwidth, as well as queuing losses
	caused by the asymmetric wired/wireless interactions, demands
	more effective approaches for reducing packet losses.  Moreover,
	a protocol must dynamically adjust its behavior to changing
	environmental conditions.  In this paper, we propose and evaluate
	such a protocol, called the Adaptive FEC-based Reliable Multicast
	(AFRM) protocol.  The protocol uses both proactive FEC and
	reactive FEC, adapting relevant parameters to current conditions.
	Both local and global NACK suppression are applied, but in a
	manner that accommodates delays due to access point queuing.
	Finally, the AFRM flow control strategy uses a novel method to
	differentiate propagation-related packet losses from queueing
	losses.  Experimental and simulation results show the protocol
	has good performance in terms of throughput in most cases. Those
	factors that negatively affect performance are highlighted as
	topics of future research.
}
}


@INPROCEEDINGS{RE02-Reqts-Patterns,
  AUTHOR = {Sascha Konrad and Betty H.~C. Cheng},
  TITLE = {Requirements Patterns for Embedded Systems},
  BOOKTITLE = {Proceedings of the IEEE Joint International Conference on Requirements Engineering (RE02)},
  OPTCROSSREF = {},
  OPTKEY = {},
  OPTPAGES = {},
  YEAR = {2002},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Essen, Germany},
  MONTH = {September},
  OPTORGANIZATION = {IEEE Computer Society},
  OPTPUBLISHER = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/re02.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{RHAS02-Reqts-Patterns-Constraints,
  AUTHOR = {Sascha Konrad and Laura A.~Campbell and Betty H.~C. Cheng},
  TITLE = {Adding Formal Specifications to Requirements Patterns},
  BOOKTITLE = {Proceedings of the IEEE Requirements for High Assurance Systems (RHAS02)},
  OPTCROSSREF = {},
  OPTKEY = {},
  OPTPAGES = {},
  YEAR = {2002},
  EDITOR = {C.~Heitmeyer and N.~Mead},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Essen, Germany},
  MONTH = {September},
  OPTORGANIZATION = {IEEE Computer Society},
  OPTPUBLISHER = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/rhas02.pdf},
  ABSTRACT = {Embedded systems usually must achieve
a higher level of robustness and reliability because they control
real-world physical processes or devices upon which we depend,
frequently, in a critical way. Consequently, methods for  modeling
and developing embedded systems and rigorously verifying behavior before
committing to code are increasingly important.
In order to use object-oriented development techniques and UML for
embedded systems,
we previously developed a framework for adding
formal semantics to a collection of UML diagrams that enable
the automated derivation of formal
language specifications for those diagrams.
Recently, we also identified a number of requirements patterns
for use in the development of
requirements and high-level design for embedded systems, and constructed
a requirements pattern template.
This paper describes how we have augmented the template to include
requirements constraints that might be applicable when using a given
pattern. With the ability to generate formal specifications from the UML
diagrams, these constraints can be analyzed using existing model checkers.
We also include a description of how the requirements patterns have been used
to model and formally analyze an automotive embedded system.
}
}


@INPROCEEDINGS{GeMc02.LDM,
  AUTHOR = {Peng Ge and Philip K. McKinley},
  TITLE = {Leader-Driven Multicast for Video Streaming on Wireless {LANs}},
  BOOKTITLE = {Proceedings of the IEEE International Conference on Networking},
  ADDRESS = {Atlanta, Georgia},
  MONTH = {August},
  YEAR = {2002},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/icn-2002-ge.pdf},
  ABSTRACT = {
	The IEEE 802.11 MAC layer uses RTS/CTS/ACK signaling to improve
	the reliability of unicast transmissions, but in current products
	there is no special signaling support for multicast
	transmissions.  Therefore, the packet loss rate of multicast
	communication is generally higher than that of unicast
	communication.  This paper evaluates a new MAC-layer multicasting
	technique called Leader-Driven Multicast (LDM).  Instead of
	multicasting to a group address, the source node sends a unicast
	stream to the address of a leader node among the receivers.  All
	other receivers passively receive this unicast stream, including
	retransmissions.  This paper investigates the effects of the LDM
	protocol on interactive video multicasting across WLANs.  Results
	are presented from a simulation study using different packet loss
	models and different loss correlations among receivers.  The
	results indicate that LDM is potentially beneficial even when
	there is no loss correlation among receivers.  When losses do
	exhibit some positive correlation LDM can provide a very high
	quality multicast stream to WLAN nodes, especially when combined
	with application-level error control techniques.
}
}


@ARTICLE{ChWa02.TSE,
  AUTHOR = {Betty H.~C. Cheng and Enoch Y. Wang},
  TITLE = {Formalizing and Integrating the Dynamic Model for
				Object-Oriented Modeling},
  JOURNAL = {IEEE Transactions on Software Engineering},
  MONTH = {August},
  YEAR = {2002},
  OPTKEY = {},
  VOLUME = {28},
  NUMBER = {28},
  PAGES = {747--762},
  OPTANNOTE = {},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/tse02.pdf},
  ABSTRACT = {}
}


@INPROCEEDINGS{KMSS02.AOPDCS,
  AUTHOR = {E. Kasten and P. K. McKinley and S. Sadjadi and R. Stirewalt},
  TITLE = {Separating Introspection and Intercession in Metamorphic Distributed Systems},
  BOOKTITLE = {Proceedings of the IEEE 
		Workshop on Aspect-Oriented Programming for Distributed Computing
		(with ICDCS'02)},
  ADDRESS = {Vienna, Austia},
  MONTH = {July},
  YEAR = {2002},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/aopdcs-02.ps.gz},
  ABSTRACT = {
	Many middleware platforms use computational reflection to support
	adaptive functionality.  Most approaches intertwine the activity
	of observing behavior (introspection) with the activity of
	changing behavior (intercession).  This paper explores the use of
	language constructs to separate these parts of reflective
	functionality.  This separation and "packaging" of reflective
	primitives is intended to facilitate the design of correct and
	consistent adaptive middleware.  A prototype language, called
	Adaptive Java, is described in which this functionality is
	realized through extensions to the Java programming language.  A
	case study is described in which "metamorphic" socket components
	are created from regular socket classes and used to realize
	adaptive behavior on wireless network connections.
}
}


@INPROCEEDINGS{ka02,
  AUTHOR = {S. S. Kulkarni and A. Ebnenasir},
  TITLE = {Complexity of Adding Failsafe Fault-tolerance},
  BOOKTITLE = {Proceedings of the 22nd IEEE International 
Conference on Distributed Computing
Systems},
  YEAR = {2002},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  ADDRESS = {Vienna, Austria},
  MONTH = {July},
  NOTE = {},
  OPTANNOTE = {},
  URL = {http://www.cse.msu.edu/~sandeep/publications/icdcs02/main.ps},
  ABSTRACT = {

In this paper, we focus our attention on the problem of automating the
addition of failsafe fault-tolerance where fault-tolerance is added to
an existing (fault-intolerant) program. A failsafe fault-tolerant
program satisfies its specification (including safety and liveness) in
the absence of faults. However, in the presence of faults, it
satisfies its safety specification. We present a somewhat unexpected
result that, in general, the problem of adding failsafe
fault-tolerance in distributed programs is NP-hard. Towards this end,
we reduce the 3-SAT problem to the problem of adding failsafe
fault-tolerance. We also identify a class of specifications, {\em
monotonic specifications} and a class of programs, {\em monotonic
programs}.  Given a monotonic specification and a monotonic program,
we show that failsafe fault-tolerance can be added in polynomial time.
As an illustration, we show that the monotonicity restrictions are met
for commonly encountered problems such as Byzantine agreement,
distributed consensus, and atomic commitment.  Finally, we argue that
the restrictions on the specifications and programs are necessary to
add failsafe fault-tolerance in polynomial time; we prove that if only
one of these conditions is satisfied, the addition of failsafe
fault-tolerance is still NP-hard.
}
}


@INPROCEEDINGS{kb02,
  AUTHOR = {S. S. Kulkarni and B. Bruhadeshwar},
  TITLE = {Critical Path in Secure Multicast
for Dynamic Groups},
  BOOKTITLE = {Proceedings of the International Workshop on 
Assurance in Distributed
Systems and Networks},
  YEAR = {2002},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  ADDRESS = {Vienna, Austria},
  MONTH = {July},
  OPTANNOTE = {},
  URL = {http://www.cse.msu.edu/~sandeep/publications/adsn02/main.ps},
  ABSTRACT = {
In this paper, we focus on the problem of secure multicast in dynamic
groups. In this problem, a group of users communicate using a shared
key. Due to the dynamic nature of these groups, to preserve secrecy,
it is necessary to change the group key whenever the group membership
changes.
While the group key is being changed, the group communication needs to
be interrupted until the rekeying is complete. This interruption is
especially necessary if the rekeying is done because a user has left
(or is removed).
We split the rekeying cost into two parts: the cost of the critical path
--where each current user receives the new group key, and the cost of the
non-critical path --where each user receives any other keys that it
needs to obtain.
Then, we present two algorithms that show the trade off between the
cost of the critical path and the cost of the non-critical path.
We also compare our algorithms to previous algorithms and show that our
algorithms reduce the cost of the critical path while keeping the
total cost manageable.
}
}


@INPROCEEDINGS{SHAMAN-02,
  AUTHOR = {Philip K. McKinley and E. P. Kasten and S. M. Sadjadi and Zhinan Zhou},
  TITLE = {Realizing Multi-Dimensional Software Adaptation},
  BOOKTITLE = {Proceedings of the ACM 
Workshop on Self-Healing, Adaptive and self-MANaged
                            Systems (SHAMAN), held in conjunction with the
            16th Annual ACM International Conference on Supercomputing},
  ADDRESS = {New York City},
  MONTH = {June},
  YEAR = {2002},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/shaman02.pdf},
  ABSTRACT = {
This paper describes the use of programming 
language constructs to support run-time software adaptation.
A prototype language, Adaptive Java, contains primitives 
that permit programs to modify their own operation
in a principled manner.
In case studies, Adaptive Java is being used to 
support adaptation for different cross-cutting concerns
associated with heterogeneous
mobile computing and critical infrastructure
protection.
Examples are described in which Adaptive Java components
support dynamic quality-of-service on wireless networks,
run-time energy management for handheld computers,
and self-auditing of potential security threats in
distributed environments.
}
}


@INPROCEEDINGS{GeMc02.IPCCC,
  AUTHOR = {P. Ge and P. K. McKinley},
  TITLE = {Comparisons of Error Control Techniques for Wireless Video
Multicasting},
  BOOKTITLE = {Proceedings of the IEEE International Performance, 
			Computing, and Communications Conference},
  ADDRESS = {Phoenix, Arizona},
  MONTH = {April},
  YEAR = {2002},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/ipccc-02.ps.gz},
  ABSTRACT = {
	This paper explores three different methods, employed separately
	and in combination, to improve the quality of video delivery on
	wireless local area networks.  The approaches are: leader-driven
	multicast (LDM), the monitoring of MAC layer unicast
	(re)transmissions by other receivers; application-level forward
	error correction (FEC) using block erasure codes; and negative
	feedback from selected receivers in the form of extra parity
	requests (EPR).  The performance of these three methods is
	evaluated using both experimentation on a mobile computing
	testbed and simulation.  The results indicate that, while LDM is
	helpful in improving the raw packet reception rate, the
	combination of FEC and EPR is most effective in improving the
	frame delivery rate.
}
}


@ARTICLE{cdsmsl01,
  AUTHOR = {B. Cheng and L. Dillon and  K. Stirewalt and  
					P. McKinley and  S. Kulkarni and J. Lee},
  TITLE = {Automated Development and Run-Time Adaptation of
Interactive Distributed Applications},
  JOURNAL = {NCO Workshop on New Visions for Software Design and Productivity: Research and Applications},
  YEAR = {2001},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  MONTH = {December},
  ADDRESS = {Nashville, Tennessee},
  OPTNOTE = {},
  OPTANNOTE = {},
  ABSTRACT = {}
}


@INPROCEEDINGS{McPA01.MIDDLEWARE,
  AUTHOR = {P. K. McKinley and U. I. Padmanabhan and N. Ancha},
  TITLE = {Experiments in Composing Proxy Audio Services for Mobile Users},
  BOOKTITLE = {Proceedings of the IFIP/ACM International Conference on 
			Distributed Systems Platforms (Middleware 2001)},
  ADDRESS = {Heidelberg, Germany},
  MONTH = {November},
  YEAR = {2001},
  PAGES = {99--120},
  URL = {ftp://ftp.cse.msu.edu/pub/crg/PAPERS/middleware-2001.ps.gz},
  ABSTRACT = {
	This paper describes an experimental study in the use of a
	composable proxy framework to improve the quality of interactive
	audio streams delivered to mobile hosts.  Two forward error
	correction (FEC) proxylets are developed, one using block erasure
	codes, and the other using the GSM 06.10 encoding algorithm.
	Separately, each type of FEC improves the ability of the audio
	stream to tolerate errors in a wireless LAN environment.  When
	composed in a single proxy, however, they cooperate to correct
	additional types of burst errors.  Results are presented from a
	performance study conducted on a mobile computing testbed.
}
}


@INPROCEEDINGS{RuSt:ase01,
  AUTHOR = { S. Rugaber and R. E. K. Stirewalt },
  TITLE = { Adequate reverse engineering },
  BOOKTITLE = { Proceedings of the IEEE International Conference
		on Automated Software Engineering },
  MONTH = NOV,
  YEAR = 2001
}


@INPROCEEDINGS{kac01,
  AUTHOR = {S. S. Kulkarni and A. Arora and A. Chippada},
  TITLE = {Polynomial time synthesis of Byzantine Agreement},
  BOOKTITLE = {Proceedings of the Twentieth Symposium on Reliable
Distributed Systems},
  YEAR = {2001},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  ADDRESS = {New Orleans, LA},
  MONTH = {October},
  OPTNOTE = {},
  OPTANNOTE = {},
  URL = {http://www.cse.msu.edu/~sandeep/publications/srds01/main.ps},
  ABSTRACT = {
We present a polynomial time algorithm for automatic synthesis of
fault-tolerant distributed programs starting from fault-intolerant
versions of those programs.  Since this synthesis problem is known to
be NP-hard, our algorithm relies on heuristics to reduce the
complexity.  We demonstrate that our algorithm suffices to synthesize
an agreement program that tolerates a byzantine fault. We also show
that our algorithm suffices for the case where both byzantine and
failstop faults may occur. Finally, we describe an object-oriented
implementation of our algorithm.
}
}


@INPROCEEDINGS{kr01,
  AUTHOR = {S. S. Kulkarni and Ravikant},
  TITLE = {Stabilizing causal deterministic merge},
  BOOKTITLE = {Proceedings of the Fifth Workshop on Self-Stabilization},
  YEAR = {2001},
  OPTKEY = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTPAGES = {},
  MONTH = {October},
  OPTNOTE = {},
  OPTANNOTE = {},
  URL = {http://www.cse.msu.edu/~sandeep/publications/wss01/main.ps},
  ABSTRACT = {
In this paper, we present a causal deterministic merge program for
publish-subscribe systems. Our program ensures that if two subscribers
receive two messages then they receive them in the same order. Also,
it guarantees that the order in which a subscriber receives messages
is a linearization of the causal order among those messages. To
develop our program, we expect two guarantees from the underlying
system: the first guarantee deals with the difference between physical
clocks and the second guarantee deals with message delays.  While
$O(n2)$ space is required for causal deterministic merge in
asynchronous systems, our program only uses $O(log \ n)$ space. We
also show how our program can be made stabilizing while using only a
bounded space. And, the recovery time for our program is proportional
to the guarantees made by the underlying system.
}
}


@INPROCEEDINGS{Compsac01-Panel,
  AUTHOR = {Betty H.~C. Cheng},
  TITLE = {A Metamodel-Based Approach to Formalizing {UML}},
  BOOKTITLE = {Proceedings of the IEEE International Computer
Software and Applications Conference (COMPSAC01)},
  OPTCROSSREF = {},
  OPTKEY = {},
  OPTPAGES = {},
  YEAR = {2001},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Naperville, Illinois},
  MONTH = {October},
  OPTORGANIZATION = {IEEE Computer Society},
  OPTPUBLISHER = {},
  OPTANNOTE = {},
  ABSTRACT = {}
}


@INPROCEEDINGS{RE01-Poster,
  AUTHOR = {Laura A. Campbell and Betty H.~C. Cheng},
  TITLE = {Integrating Informal and Formal Approaches to
Requirements Modeling and Analysis},
  BOOKTITLE = {Proceedings of the IEEE International Symposium on
Requirements Engineering (RE01)},
  OPTCROSSREF = {},
  OPTKEY = {},
  OPTPAGES = {},
  YEAR = {2001},
  OPTEDITOR = {},
  OPTVOLUME = {},
  OPTNUMBER = {},
  OPTSERIES = {},
  ADDRESS = {Toronto, Canada},
  MONTH = {August},
  OPTORGANIZATION = {IEEE Computer Society},
  OPTPUBLISHER = {},
  OPTANNOTE = {},
  ABSTRACT = {}
}