참고문헌
- Firetide www.firedide.com
- Doufexi, A. Tameh, E. Nix, A. Armour, S. Molina, A. 'Hotspot wireless LANs to enhance the performance of 3G and beyond cellular networks', Communications Magazine, IEEE, Publication Date: July, 2003, Vol.41, Issue7, On pp.58-65
- Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki- Hyung Kim, Suk-Kyo Hong, Won-Sik Yoon, 'HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks' Network Centric Ubiquitous Systems (NCUS 2006)
- Burke Richard, 2004, 'Network Management. Concepts and Practice: A Hands-on Approach', Pearson Education, Inc
- Minseok Oh. Network management agent allocation scheme in mesh networks Communications Letters, IEEE Vol.7, Issue12, Dec., 2003, pp.601-603
- Kishi Y. Tabata, K.; Kitahara, T.; Imagawa, Y.; Idoue, A.; Nomoto, S.; Implementation of the integrated network and link control functions for multi-hop mesh networks in broadband fixed wireless access systems Radio and Wireless Conference, 2004 IEEE 19-22 Sept., 2004, pp.43-46
- S. Yong-Lin, G. DeYuan, P. Jin, S. PuBing, A mobile agent and policy-based network management architecture, Proceedings, Fifth International Conference on Computational Intelligence and Multimedia Applications ICCIMA 2003, 27-30 Sept., 2003, pp.177-181
- Robert Steinke, Micah Clark, Elihu Mcmahon, 'A new pattern for flexible worker threads with in-place consumption message queues', Vol.39, Issue2, (April 2005) table of contents pp.71-73 Year of Publication: 2005 https://doi.org/10.1145/1055218.1055224
- Junaid Ahsenali Chaudhry, and Seung-Kyu Park, Some Enabling Technologies for Ubiquitous Systems, Journal of computer Science 2 (8): 627-633, 2006 https://doi.org/10.3844/jcssp.2006.627.633
- S. Garfinkel, 'PGP: Pretty Good Privacy,' O'Reily & Associates Inc., 1995
- Junaid Ahsenali Chaudhry, and Seungkyu Park, 'Using Artificial Immune Systems for Self Healing in Hybrid Networks', in Encyclopedia of Multimedia Technology and Networking, Published by Idea Group Inc., 2006. [To appear in 2008-09]
- Ma J., Zhao Q., Chaudhary V., Cheng J., Yang L. T., Huang H., and Jin Q., Ubisafe Computing: Vision and Challenges (I), Springer LNCS Vol.4158, Proc. of ATC-06, 2006
- Shelton, C. & Koopman, P., 'Improving System Dependability with Alternative Functionality,' DSN04, June, 2004
- Morikawa, H. (2004). The design and implementation of context-aware services. Proceedings of IEEE saintw 2004, 293-298
- D. C. Schmidt, 'Reactor: An Object Behavioral Pattern for Concurrent Event Demultiplexing and Event Handler Dispatching,' in Pattern Languages of Program Design (J. O. Coplien and D. C. Schmidt, eds.), pp.529-545, Reading, MA: Addison-Wesley, 1995
- D. C. Schmidt, 'Acceptor and Connector: Design Patterns for Initializing Communication Services,' in Pattern Languages of Program Design (R. Martin, F. Buschmann, and D. Riehle, eds.), Reading, MA: Addison-Wesley, 1997
- Junaid Ahsenali Chaudhry, Seungkyu Park, 'A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems', The 3rd International Conference on Autonomic and Trusted Computing (ATC-06), 2006
- Wolfgang Trumler, Jan Petzold, Faruk Bagci, Theo Ungerer, AMUN. Autonomic Middleware for Ubiquitious eNvironments Applied to the Smart Doorplate Project, International Conference on Autonomic Computing (ICAC-04), New York, NY, May 17-18, 2004
- Gao, J.; Kar, G.; Kermani, P.; Approaches to building self healing systems using dependency analysis, Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP Vol.1, 19-23 April 2004 pp.119-132 Vol.1
- Junaid Chaudhry, and Seungkyu Park, 'On Seamless Service Delivery', The 2nd International Conference on Natural Computation (ICNC'06) and the 3rd International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'06) 2006
- Ilgun, K.; Kemmerer, R.A.; Porras, P.A., 'State transition analysis: a rule-based intrusion detection approach,' Software Engineering, IEEE Transactions on, Vol.21, No.3, pp.181-199, Mar., 1995 https://doi.org/10.1109/32.372146
- T. F. Lunt, 'Real-time intrusion detection,' in Proc. COMPCON, San Francisco, CA, Feb., 1989
- T. F. Lunt et al., 'A real-time intrusion detection expert system,' SRI CSL Tech. Rep. SRI-CSL-90-05, June, 1990
- T. F. Lunt et al., 'A real-time intrusion detection expert system (IDES),' Final Tech. Rep., Comput. Sci. Laboratory, SRI Int., Menlo Park, CA, Feb., 1992
- Radosavac, S.; Seamon, K.; Baras, J.S., 'Short Paper: bufSTAT-a tool for early detection and classification of buffer overflow attacks,' Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, Vol., No., pp.231-233, 05-09 Sept., 2005
- J. Hu, I. Pyarali, and D. C. Schmidt, 'Applying the Proactor Pattern to High-Performance Web Servers,' in Proceedings of the 10th International Conference on Parallel and Distributed Computing and Systems, IASTED, Oct. 1998
- P. J. Denning: Thrashing: Its Causes and Prevention. Proc. AFlPS FJCC 33, 1968, pp.915-922 https://doi.org/10.1145/1476589.1476705
- Turing, Alan M., On Computable Numbers, with an Application to the Entscheidungs Problem. Proceedings of the London Mathematical Society, 2 (42):230-265, 1936
- Hideyuki Takahashi, Takuo Suganuma, Norio Shiratori: AMUSE: An Agent-based Middleware for Contextaware Ubiquitous Services. ICPADS (1) 2005: 743-749 https://doi.org/10.1109/ICPADS.2005.66