{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:11:28Z","timestamp":1743145888362,"version":"3.40.3"},"publisher-location":"Cham","reference-count":288,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030681098"},{"type":"electronic","value":"9783030681104"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68110-4_1","type":"book-chapter","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T12:40:53Z","timestamp":1611837653000},"page":"3-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance, Energy Savings and Security: An Introduction"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4653-0790","authenticated-orcid":false,"given":"Ufuk","family":"\u00c7ag\u0303layan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,29]]},"reference":[{"key":"1_CR1","unstructured":"The 24th International Symposium on Computer and Information Sciences, ISCIS 2009, North Cyprus, 14\u201316 September 2009. IEEE (2009)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Lent, R.: Contact holdups and their impact for overlay delay tolerant networks. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 92\u2013101. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_6"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Filus, K., Siavvas, M., Domanska, J., Gelenbe, E.: The random neural network as a bonding model for software vulnerability prediction. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 102\u2013116. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_7"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Filus, K., Domanska, J., Gelenbe, E.: A random neural network for attack detection. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 79\u201391. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_5"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Aaro, G., Roos, D., Carlsson, N.: Toolset for run-time dataset collection of deep-scene information. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 224\u2013236. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_15"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Abdelbaki, H., Gelenbe, E., El-Khamy, S.E.: Random neural network decoder for error correcting codes. In: International Joint Conference on Neural Networks, IJCNN 1999, vol. 5, pp. 3241\u20133245. IEEE (1999)","DOI":"10.1109\/IJCNN.1999.836175"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Abdelbaki, H., Gelenbe, E., Kocak, T.: Matched neural filters for EMI based mine detection. In: International Joint Conference on Neural Networks, IJCNN 1999, vol. 5, pp. 3236\u20133240. IEEE (1999)","DOI":"10.1109\/IJCNN.1999.836174"},{"key":"1_CR8","unstructured":"Abdelbaki, H., Gelenbe, E., Ko\u00e7ak, T., El-Khamy, S.E.: Random neural network filter for land mine detection. In: Proceedings of the Sixteenth National Radio Science Conference, NRSC 1999, pp. C43\u20131. IEEE (1999)"},{"issue":"3","key":"1_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/2160803.2160853","volume":"39","author":"OH Abdelrahman","year":"2011","unstructured":"Abdelrahman, O.H., Gelenbe, E.: Search in non-homogenous random environments? ACM SIGMETRICS Per. Eval. Rev. 39(3), 37\u201339 (2011)","journal-title":"ACM SIGMETRICS Per. Eval. Rev."},{"issue":"8","key":"1_CR10","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1093\/comjnl\/bxs056","volume":"55","author":"OH Abdelrahman","year":"2012","unstructured":"Abdelrahman, O.H., Gelenbe, E.: Packet delay and energy consumption in non-homogeneous networks. Comput. J. 55(8), 950\u2013964 (2012)","journal-title":"Comput. J."},{"issue":"3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"032125","DOI":"10.1103\/PhysRevE.87.032125","volume":"87","author":"OH Abdelrahman","year":"2013","unstructured":"Abdelrahman, O.H., Gelenbe, E.: Time and energy in team-based search. Phys. Rev. E 87(3), 032125 (2013)","journal-title":"Phys. Rev. E"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Abdelrahman, O.H., Gelenbe, E.: Signalling storms in 3g mobile networks. In: 2014 IEEE International Conference on Communications, ICC 2014, Sydney, Australia, 10\u201314 June 2014, pp. 1017\u20131022. IEEE (2014). https:\/\/doi.org\/10.1109\/ICC.2014.6883453","DOI":"10.1109\/ICC.2014.6883453"},{"key":"1_CR13","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22635-4","volume-title":"Information Sciences and Systems 2015","year":"2016","unstructured":"Abdelrahman, O.H., Gelenbe, E., Gorbil, G., Lent, R. (eds.): Information Sciences and Systems 2015. LNEE, vol. 363. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-22635-4"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Adeel, A., Larijani, H., Ahmadinia, A.: Random neural network based cognitive engines for adaptive modulation and coding in LTE downlink systems. Comput. Electr. Eng. 57, 336\u2013350 (2017). https:\/\/doi.org\/10.1016\/j.compeleceng.2016.11.005","DOI":"10.1016\/j.compeleceng.2016.11.005"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0020-0255(96)00178-8","volume":"97","author":"J Aguilar","year":"1997","unstructured":"Aguilar, J., Gelenbe, E.: Task assignment and transaction clustering heuristics for distributed systems. Inf. Sci. 97(1), 199\u2013219 (1997)","journal-title":"Inf. Sci."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A., Phillipson, M.: Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In: 2017 Annual IEEE International Systems Conference, SysCon 2017, Montreal, QC, Canada, 24\u201327 April 2017, pp. 1\u20136. IEEE (2017). https:\/\/doi.org\/10.1109\/SYSCON.2017.7934803","DOI":"10.1109\/SYSCON.2017.7934803"},{"key":"1_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-030-00840-6_23","volume-title":"Computer and Information Sciences","author":"O Akinwande","year":"2018","unstructured":"Akinwande, O., Gelenbe, E.: A reinforcement learning approach to\u00a0adaptive forwarding in named data networking. In: Czach\u00f3rski, T., Gelenbe, E., Grochla, K., Lent, R. (eds.) ISCIS 2018. CCIS, vol. 935, pp. 211\u2013219. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00840-6_23"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Asaad Althoubi, R.A., Peyravi, H.: Tail latency in datacenter networks. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 254\u2013272. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_17"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Atalay, V., Gelenbe, E.: Parallel algorithm for colour texture generation using the random neural network model. Int. J. Pattern Recogn. Artif. Intell. 6(02n03), 437\u2013446 (1992)","DOI":"10.1142\/S0218001492000266"},{"issue":"01","key":"1_CR20","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1142\/S0218001492000072","volume":"6","author":"V Atalay","year":"1992","unstructured":"Atalay, V., Gelenbe, E., Yalabik, N.: The random neural network model for texture generation. Int. J. Pattern Recogn. Artif. Intell. 6(01), 131\u2013141 (1992)","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Atmaca, T., Kamli, A., Kuaban, G.S., Czachorski, T.: Performance evaluation of the packet aggregation mechanism of an N-green metro network node. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 62\u201378. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_4"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Augusto-Gonzalez, J., et al.: From internet of threats to internet of things: a cyber security architecture for smart homes. In: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/CAMAD.2019.8858493"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b101749","volume-title":"Computer and Information Sciences - ISCIS 2004","year":"2004","unstructured":"Aykanat, C., Dayar, T., K\u00f6rpeo\u011flu, \u0130. (eds.): ISCIS 2004. LNCS, vol. 3280. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/b101749"},{"issue":"4","key":"1_CR24","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1145\/1007773.809384","volume":"3","author":"M Badel","year":"1974","unstructured":"Badel, M., Gelenbe, E., Leroudier, J., Potier, D., Lenfant, J.: Adaptive optimization of the performance of a virtual memory computer. ACM SIGMETRICS Perf. Eval. Rev. 3(4), 188 (1974)","journal-title":"ACM SIGMETRICS Perf. Eval. Rev."},{"issue":"6","key":"1_CR25","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/PROC.1975.9861","volume":"63","author":"M Badel","year":"1975","unstructured":"Badel, M., Gelenbe, E., Leroudier, J., Potier, D.: Adaptive optimization of a time-sharing system\u2019s performance. Proc. IEEE 63(6), 958\u2013965 (1975)","journal-title":"Proc. IEEE"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Baldini, G., et al.: IoT network risk assessment and mitigation: the SerIoT approach (2020)","DOI":"10.1561\/9781680836837.ch5"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Basterrech, S., Mohamed, S., Rubino, G., Soliman, M.A.: Levenberg-Marquardt training algorithms for random neural networks. Comput. J. 54(1), 125\u2013135 (2011). https:\/\/doi.org\/10.1093\/comjnl\/bxp101","DOI":"10.1093\/comjnl\/bxp101"},{"issue":"7","key":"1_CR28","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1093\/comjnl\/bxp080","volume":"53","author":"A Berl","year":"2010","unstructured":"Berl, A., et al.: Energy-efficient cloud computing. Comput. J. 53(7), 1045\u20131051 (2010)","journal-title":"Comput. J."},{"key":"1_CR29","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-319-01604-7_29","volume-title":"Information Sciences and Systems 2013","author":"H Bi","year":"2013","unstructured":"Bi, H., Desmet, A., Gelenbe, E.: Routing emergency evacuees with cognitive packet networks. In: Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2013. LNEE, vol. 264, pp. 295\u2013303. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-01604-7_29"},{"key":"1_CR30","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-09465-6_5","volume-title":"Information Sciences and Systems 2014","author":"H Bi","year":"2014","unstructured":"Bi, H., Gelenbe, E.: A cooperative emergency navigation framework using mobile cloud computing. In: Czach\u00f3rski, T., Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2014, pp. 41\u201348. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-09465-6_5"},{"issue":"6","key":"1_CR31","doi-asserted-by":"publisher","first-page":"711","DOI":"10.3390\/electronics8060711","volume":"8","author":"H Bi","year":"2019","unstructured":"Bi, H., Gelenbe, E.: A survey of algorithms and systems for evacuating people in confined spaces. Electronics 8(6), 711 (2019)","journal-title":"Electronics"},{"issue":"3","key":"1_CR32","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/JSAC.2016.2525518","volume":"34","author":"O Brun","year":"2016","unstructured":"Brun, O., Wang, L., Gelenbe, E.: Big data for autonomic intercontinental overlays. IEEE J. Sel. Areas Commun. 34(3), 575\u2013583 (2016)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1_CR33","unstructured":"Brun, O., Yin, Y., Augusto-Gonzalez, J., Ramos, M., Gelenbe, E.: IoT attack detection with deep learning. In: ISCIS Security Workshop (2018)"},{"key":"1_CR34","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.procs.2018.07.183","volume":"134","author":"O Brun","year":"2018","unstructured":"Brun, O., Yin, Y., Gelenbe, E.: Deep learning with dense random neural network for detecting attacks against IoT-connected home environments. Proc. Comput. Sci. 134, 458\u2013463 (2018)","journal-title":"Proc. Comput. Sci."},{"issue":"5","key":"1_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3241737","volume":"51","author":"R Buyya","year":"2019","unstructured":"Buyya, R., et al.: A manifesto for future generation cloud computing: research directions for the next decade. ACM Comput. Surv. (CSUR) 51(5), 1\u201338 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1_CR36","doi-asserted-by":"publisher","unstructured":"Chabridon, S., Gelenbe, E.: Scheduling of distributed tasks for survivability of the application. Inf. Sci. 97(1&2), 179\u2013198 (1997). https:\/\/doi.org\/10.1016\/S0020-0255(96)00177-6","DOI":"10.1016\/S0020-0255(96)00177-6"},{"issue":"3","key":"1_CR37","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1145\/358061.358073","volume":"26","author":"A Chesnais","year":"1983","unstructured":"Chesnais, A., Gelenbe, E., Mitrani, I.: On the modeling of parallel access to shared data. Commun. ACM 26(3), 196\u2013202 (1983)","journal-title":"Commun. ACM"},{"issue":"1","key":"1_CR38","first-page":"2333","volume":"46","author":"AS Chouhan","year":"2021","unstructured":"Chouhan, A.S., Sridhar, V., Rao, S.: Service provider strategies in telecommunications markets: analytical and simulation analysis. Sadanha 46(1), 2333\u20132335 (2021)","journal-title":"Sadanha"},{"key":"1_CR39","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-319-95189-8_7","volume-title":"Security in Computer and Information Sciences","author":"A Collen","year":"2018","unstructured":"Collen, A., et al.: GHOST - safe-guarding home IoT environments with personalised real-time risk control. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 68\u201378. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95189-8_7"},{"key":"1_CR40","doi-asserted-by":"publisher","unstructured":"Cramer, C., Gelenbe, E.: Video quality and traffic QoS in learning-based subsampled and receiver-interpolated video sequences. IEEE J. Sel. Areas Commun. 18(2), 150\u2013167 (2000). https:\/\/doi.org\/10.1109\/49.824788","DOI":"10.1109\/49.824788"},{"key":"1_CR41","unstructured":"Cramer, C., Gelenbe, E., Bakircioglu, H.: Video compression with random neural networks. In: International Workshop on Neural Networks for Identification, Control, Robotics, and Signal\/Image Processing. Proceedings, pp. 476\u2013484. IEEE (1996)"},{"issue":"10","key":"1_CR42","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1109\/5.537116","volume":"84","author":"C Cramer","year":"1996","unstructured":"Cramer, C., Gelenbe, E., Bakircloglu, H.: Low bit-rate video compression with neural networks and temporal subsampling. Proc. IEEE 84(10), 1529\u20131543 (1996)","journal-title":"Proc. IEEE"},{"key":"1_CR43","unstructured":"Czachorski, T., Gelenbe, E., Kuaban, G.S., Marek, D.: A time-dependent routing model of software defined networks. In: The Second International Workshop on Stochastic Modeling and Applied Research of Technology: SMARTY 2020, 16\u201320 August 2020. Karelian Research Center, Russian Academy of Sciences, Petrozavodsk (2020)"},{"key":"1_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09465-6","volume-title":"Information Sciences and Systems 2014","year":"2014","unstructured":"Czach\u00f3rski, T., Gelenbe, E., Lent, R. (eds.): Information Sciences and Systems 2014. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-09465-6"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Czachorski, T., Gelenbe, E., Marek, D.: Software defined network dynamics via diffusions. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 29\u201347. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_2"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Czachorski, T., Gelenbe, E., Sulla, K.G., Marek, D.: Transient behaviour of a network router. In: 2020 43rd International Conference on Telecommunications and Signal Processing (TSP), pp. 1\u20135. IEEE (2020)","DOI":"10.1109\/TSP49548.2020.9163477"},{"key":"1_CR47","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00840-6","volume-title":"Computer and Information Sciences","year":"2018","unstructured":"Czach\u00f3rski, T., Gelenbe, E., Grochla, K., Lent, R. (eds.): ISCIS 2018. CCIS, vol. 935. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00840-6"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Desmet, A., Gelenbe, E.: Graph and analytical models for emergency evacuation. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 523\u2013527. IEEE (2013)","DOI":"10.1109\/PerComW.2013.6529552"},{"key":"1_CR49","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-1-4471-4594-3_13","volume-title":"Computer and Information Sciences III","author":"A Desmet","year":"2013","unstructured":"Desmet, A., Gelenbe, E.: Interoperating infrastructures in emergencies. In: Gelenbe, E., Lent, R. (eds.) Computer and Information Sciences III, pp. 123\u2013130. Springer, London (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4594-3_13"},{"key":"1_CR50","doi-asserted-by":"crossref","unstructured":"Di Ferdinando, A., Lent, R., Gelenbe, E.: A framework for autonomic networked auctions. In: Proceedings of the 2007 Workshop on INnovative SERvice Technologies, pp. 1\u201310 (2007)","DOI":"10.4108\/ICST.AUTONOMICS2007.2304"},{"issue":"9","key":"1_CR51","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1093\/comjnl\/bxq012","volume":"53","author":"N Dimakis","year":"2010","unstructured":"Dimakis, N., Filippoupolitis, A., Gelenbe, E.: Distributed building evacuation simulator for smart emergency management. Comput. J. 53(9), 1384\u20131400 (2010)","journal-title":"Comput. J."},{"issue":"2","key":"1_CR52","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/1186778.1186782","volume":"1","author":"S Dobson","year":"2006","unstructured":"Dobson, S., et al.: A survey of autonomic communications. ACM Trans. Auton. Adap. Syst. (TAAS) 1(2), 223\u2013259 (2006)","journal-title":"ACM Trans. Auton. Adap. Syst. (TAAS)"},{"key":"1_CR53","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-319-95189-8_10","volume-title":"Security in Computer and Information Sciences","author":"J Domanska","year":"2018","unstructured":"Domanska, J., Gelenbe, E., Czachorski, T., Drosou, A., Tzovaras, D.: Research and innovation action for\u00a0the\u00a0security of the internet of things: the SerIoT project. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 101\u2013118. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95189-8_10"},{"issue":"5","key":"1_CR54","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1109\/TMC.2019.2903178","volume":"19","author":"J Du","year":"2019","unstructured":"Du, J., Gelenbe, E., Jiang, C., Han, Z., Ren, Y.: Auction-based data transaction in mobile networks: data allocation design and performance analysis. IEEE Trans. Mobile Comput. 19(5), 1040\u20131055 (2019)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"1_CR55","doi-asserted-by":"crossref","unstructured":"Du, J., Gelenbe, E., Jiang, C., Zhang, H., Han, Z., Ren, Y.: Data transaction modeling in mobile networks: contract mechanism and performance analysis. In: GLOBECOM 2017-2017 IEEE Global Communications Conference, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/GLOCOM.2017.8255078"},{"issue":"11","key":"1_CR56","doi-asserted-by":"publisher","first-page":"2457","DOI":"10.1109\/JSAC.2017.2760459","volume":"35","author":"J Du","year":"2017","unstructured":"Du, J., Gelenbe, E., Jiang, C., Zhang, H., Ren, Y.: Contract design for traffic offloading and resource allocation in heterogeneous ultra-dense networks. IEEE J. Sel. Areas Commun. 35(11), 2457\u20132467 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"6","key":"1_CR57","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1109\/TIFS.2018.2883000","volume":"14","author":"J Du","year":"2018","unstructured":"Du, J., Gelenbe, E., Jiang, C., Zhang, H., Ren, Y., Poor, H.V.: Peer prediction-based trustworthiness evaluation and trustworthy service rating in social networks. IEEE Trans. Inf. Foren. Sec. 14(6), 1582\u20131594 (2018)","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"1_CR58","doi-asserted-by":"crossref","unstructured":"Du, J., Jiang, C., Gelenbe, E., Han, Z., Ren, Y., Guizani, M.: Networked data transaction in mobile networks: a prediction-based approach using auction. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 201\u2013206. IEEE (2018)","DOI":"10.1109\/IWCMC.2018.8450531"},{"issue":"6","key":"1_CR59","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MWC.2017.1800094","volume":"25","author":"J Du","year":"2018","unstructured":"Du, J., Jiang, C., Gelenbe, E., Xu, L., Li, J., Ren, Y.: Distributed data privacy preservation in IoT applications. IEEE Wirel. Commun. 25(6), 68\u201376 (2018)","journal-title":"IEEE Wirel. Commun."},{"key":"1_CR60","doi-asserted-by":"crossref","unstructured":"Du, J., Jiang, C., Gelenbe, E., Zhang, H., Ren, Y.: Traffic offloading in software defined ultra-dense networks. In: Ultra-Dense Networks: Principles and Applications, p. 164 (2020)","DOI":"10.1017\/9781108671323.010"},{"issue":"3","key":"1_CR61","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1109\/TWC.2019.2895076","volume":"18","author":"J Du","year":"2019","unstructured":"Du, J., Jiang, C., Gelenbe, E., Zhang, H., Ren, Y., Quek, T.Q.: Double auction mechanism design for video caching in heterogeneous ultra-dense networks. IEEE Trans. Wireless Commun. 18(3), 1669\u20131683 (2019)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"1_CR62","doi-asserted-by":"publisher","unstructured":"Evmorfos, S., Vlachodimitropoulos, G., Bakalos, N., Gelenbe, E.: Neural network architectures for the detection of SYN flood attacks in IoT systems. In: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments, pp. 1\u20134. No. 69. ACM (2020). https:\/\/doi.org\/10.1145\/3389189.3398000","DOI":"10.1145\/3389189.3398000"},{"issue":"3","key":"1_CR63","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/322017.322019","volume":"24","author":"G Fayolle","year":"1977","unstructured":"Fayolle, G., Gelenbe, E., Labetoulle, J.: Stability and optimal control of the packet switching broadcast channel. J. ACM (JACM) 24(3), 375\u2013386 (1977)","journal-title":"J. ACM (JACM)"},{"issue":"1","key":"1_CR64","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/BF00288935","volume":"4","author":"G Fayolle","year":"1974","unstructured":"Fayolle, G., Gelenbe, E., Labetoulle, J., Bastin, D.: The stability problem of broadcast packet switching computer networks. Acta Informatica 4(1), 49\u201353 (1974)","journal-title":"Acta Informatica"},{"key":"1_CR65","unstructured":"Filippoupolitis, A., et al.: PerNEM 2014: the fourth international workshop on pervasive networks for emergency management, 2014-welcome and committees welcome message from the PernEM\u201914 co-chairs. In: Proceedings PerCOM 2014 (2014)"},{"key":"1_CR66","unstructured":"Filippoupolitis, A., et al.: Distributed agent-based building evacuation simulator (2012)"},{"key":"1_CR67","doi-asserted-by":"crossref","unstructured":"Filippoupolitis, A., Gorbil, G., Gelenbe, E.: Spatial computers for emergency management. In: 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops, pp. 61\u201366. IEEE (2011)","DOI":"10.1109\/SASOW.2011.13"},{"key":"1_CR68","doi-asserted-by":"crossref","unstructured":"Filippoupolitis, A., Gorbil, G., Gelenbe, E.: Pervasive emergency support systems for building evacuation. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 525\u2013527. IEEE (2012)","DOI":"10.1109\/PerComW.2012.6197557"},{"key":"1_CR69","doi-asserted-by":"crossref","unstructured":"Filippoupolitis, A., Hey, L., Loukas, G., Gelenbe, E., Timotheou, S.: Emergency response simulation using wireless sensor networks. In: AMBI-SYS 2008: Proceedings of the 1st International Conference on Ambient Media and Systems, pp. 1\u20137, February 2008","DOI":"10.4108\/ICST.AMBISYS2008.2903"},{"issue":"3","key":"1_CR70","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/fi9030034","volume":"9","author":"JM Fourneau","year":"2017","unstructured":"Fourneau, J.M., Gelenbe, E.: G-networks with adders. Future Internet 9(3), 34 (2017)","journal-title":"Future Internet"},{"key":"1_CR71","doi-asserted-by":"publisher","unstructured":"Fourneau, J., Gelenbe, E., Suros, R.: G-networks with multiple classes of negative and positive customers. Theor. Comput. Sci. 155(1), 141\u2013156 (1996). https:\/\/doi.org\/10.1016\/0304-3975(95)00018-6","DOI":"10.1016\/0304-3975(95)00018-6"},{"key":"1_CR72","doi-asserted-by":"crossref","unstructured":"Francois, F., Abdelrahman, O.H., Gelenbe, E.: Impact of signaling storms on energy consumption and latency of LTE user equipment. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, pp. 1248\u20131255. IEEE (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.84"},{"key":"1_CR73","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-22635-4_4","volume-title":"Information Sciences and Systems 2015","author":"F Francois","year":"2016","unstructured":"Francois, F., Abdelrahman, O.H., Gelenbe, E.: Towards assessment of energy consumption and latency of LTE UEs during signaling storms. In: Abdelrahman, O.H., Gelenbe, E., Gorbil, G., Lent, R. (eds.) Information Sciences and Systems 2015. LNEE, vol. 363, pp. 45\u201355. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-22635-4_4"},{"key":"1_CR74","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-030-61401-0_8","volume-title":"Artificial Intelligence and Soft Computing","author":"P Fr\u00f6hlich","year":"2020","unstructured":"Fr\u00f6hlich, P., Gelenbe, E.: Optimal fog services placement in SDN IoT network using random neural networks and cognitive network map. In: Rutkowski, L., Scherer, R., Korytkowski, M., Pedrycz, W., Tadeusiewicz, R., Zurada, J.M. (eds.) ICAISC 2020. LNCS (LNAI), vol. 12415, pp. 78\u201389. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61401-0_8"},{"key":"1_CR75","doi-asserted-by":"crossref","unstructured":"Frohlich, P., Gelenbe, E., Nowak, M.P.: Smart SDN management of fog services. In: GIOTS 2020: Global IoT Summit 2020, IEEE Communications Society, Dubin, Ireland, 1\u20135 June 2020. TechRxiv (2020)","DOI":"10.1109\/GIOTS49054.2020.9119542"},{"key":"1_CR76","unstructured":"Gelenbe, E.: R\u00e9seaux neuronaux al\u00e9atoires stables. Comptes rendus de l\u2019Acad\u00e9mie des sciences. S\u00e9rie 2, M\u00e9canique, Physique, Chimie, Sciences de l\u2019univers, Sciences de la Terre 310(3), 177\u2013180 (1990)"},{"key":"1_CR77","unstructured":"Gelenbe, E.: Current research on cybersecurity in Europe. In: Gelenbe, E., et al. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS No. 821. Springer (2018)"},{"key":"1_CR78","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Batty, F.: Minimum graph vertex covering with the random neural network. In: Computer Science and Operations Research, pp. 139\u2013147. Pergamon, Amsterdam (1992)","DOI":"10.1016\/B978-0-08-040806-4.50015-0"},{"issue":"3","key":"1_CR79","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.jss.2004.01.016","volume":"74","author":"E Gelenbe","year":"2005","unstructured":"Gelenbe, E., Hussain, K.F., Kaptan, V.: Simulating autonomous agents in augmented reality. J. Syst. Softw. 74(3), 255\u2013268 (2005)","journal-title":"J. Syst. Softw."},{"key":"1_CR80","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/ICSMC.1993.384945","volume":"2","author":"E Gelenbe","year":"1993","unstructured":"Gelenbe, E., Koubi, V., Pekergin, F.: Dynamical random neural network approach to the traveling salesman problem. Proc. IEEE Syst. Man Cybern. Conf. 2, 630\u2013635 (1993)","journal-title":"Proc. IEEE Syst. Man Cybern. Conf."},{"key":"1_CR81","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Lent, R.: Mobile ad-hoc cognitive packet networks. In: Proceedings of the IEEE ASWN, pp. 2\u20134 (2002)","DOI":"10.1016\/j.adhoc.2004.03.009"},{"issue":"6","key":"1_CR82","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/TC.1973.5009115","volume":"100","author":"E Gelenbe","year":"1973","unstructured":"Gelenbe, E.: A unified approach to the evaluation of a class of replacement algorithms. IEEE Trans. Comput. 100(6), 611\u2013618 (1973)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"1_CR83","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1145\/321879.321888","volume":"22","author":"E Gelenbe","year":"1975","unstructured":"Gelenbe, E.: On approximate computer system models. J. ACM (JACM) 22(2), 261\u2013269 (1975)","journal-title":"J. ACM (JACM)"},{"issue":"4","key":"1_CR84","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/BF00268317","volume":"12","author":"E Gelenbe","year":"1979","unstructured":"Gelenbe, E.: Probabilistic models of computer systems. Acta Informatica 12(4), 285\u2013303 (1979)","journal-title":"Acta Informatica"},{"issue":"4","key":"1_CR85","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1162\/neco.1989.1.4.502","volume":"1","author":"E Gelenbe","year":"1989","unstructured":"Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1(4), 502\u2013510 (1989)","journal-title":"Neural Comput."},{"issue":"2","key":"1_CR86","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1162\/neco.1990.2.2.239","volume":"2","author":"E Gelenbe","year":"1990","unstructured":"Gelenbe, E.: Stability of the random neural network model. Neural Comput. 2(2), 239\u2013247 (1990)","journal-title":"Neural Comput."},{"key":"1_CR87","doi-asserted-by":"crossref","unstructured":"Gelenbe, E.: G-nets and learning recurrent random networks. In: Proceedings of the International Conference on Artificial Neural Networks, Brighton, England (1992)","DOI":"10.1016\/B978-0-444-89488-5.50025-7"},{"issue":"1","key":"1_CR88","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1162\/neco.1993.5.1.154","volume":"5","author":"E Gelenbe","year":"1993","unstructured":"Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5(1), 154\u2013164 (1993)","journal-title":"Neural Comput."},{"issue":"5","key":"1_CR89","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/BF02033314","volume":"48","author":"E Gelenbe","year":"1994","unstructured":"Gelenbe, E.: G-networks: a unifying model for neural and queueing networks. Ann. Oper. Res. 48(5), 433\u2013461 (1994)","journal-title":"Ann. Oper. Res."},{"issue":"2","key":"1_CR90","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/S0377-2217(99)00475-0","volume":"126","author":"E Gelenbe","year":"2000","unstructured":"Gelenbe, E.: The first decade of G-networks. Eur. J. Oper. Res. 126(2), 231\u2013232 (2000)","journal-title":"Eur. J. Oper. Res."},{"key":"1_CR91","unstructured":"Gelenbe, E. (ed.): International Symposium on Computer and Information Sciences. CRC Press (2002)"},{"issue":"1","key":"1_CR92","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10287-003-0004-3","volume":"1","author":"E Gelenbe","year":"2003","unstructured":"Gelenbe, E.: Sensible decisions based on QoS. Comput. Manage. Sci. 1(1), 1\u201314 (2003)","journal-title":"Comput. Manage. Sci."},{"issue":"3","key":"1_CR93","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.adhoc.2004.04.004","volume":"2","author":"E Gelenbe","year":"2004","unstructured":"Gelenbe, E.: Quality of service in ad hoc networks. Ad Hoc Netw. 2(3), 203 (2004)","journal-title":"Ad Hoc Netw."},{"key":"1_CR94","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11902140_1","volume-title":"Computer and Information Sciences \u2013 ISCIS 2006","author":"E Gelenbe","year":"2006","unstructured":"Gelenbe, E.: Analysis of automated auctions. In: Levi, A., Sava\u015f, E., Yenig\u00fcn, H., Balc\u0131soy, S., Sayg\u0131n, Y. (eds.) ISCIS 2006. LNCS, vol. 4263, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11902140_1"},{"issue":"3","key":"1_CR95","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1049\/ip-its:20060004","volume":"153","author":"E Gelenbe","year":"2006","unstructured":"Gelenbe, E.: Users and services in intelligent networks. IEE Proc. Intell. Transp. Syst. 153(3), 213\u2013220 (2006)","journal-title":"IEE Proc. Intell. Transp. Syst."},{"key":"1_CR96","doi-asserted-by":"crossref","unstructured":"Gelenbe, E.: Analytical solution of gene regulatory networks. In: 2007 IEEE International Fuzzy Systems Conference, pp. 1\u20136. IEEE (2007)","DOI":"10.1109\/FUZZY.2007.4295674"},{"issue":"4","key":"1_CR97","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.istr.2007.11.002","volume":"12","author":"E Gelenbe","year":"2007","unstructured":"Gelenbe, E.: Dealing with software viruses: a biological paradigm. Inf. Secur. Tech. Rep. 12(4), 242\u2013250 (2007)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"1_CR98","doi-asserted-by":"crossref","unstructured":"Gelenbe, E.: A diffusion model for packet travel time in a random multi-hop medium. ACM Trans. Sensor Netw. 3(2), 10-es (2007)","DOI":"10.1145\/1240226.1240230"},{"issue":"2","key":"1_CR99","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1240226.1240230","volume":"3","author":"E Gelenbe","year":"2007","unstructured":"Gelenbe, E.: A diffusion model for packet travel time in a random multihop medium. ACM Trans. Sensor Netw. (TOSN) 3(2), 10 (2007)","journal-title":"ACM Trans. Sensor Netw. (TOSN)"},{"issue":"1","key":"1_CR100","doi-asserted-by":"publisher","first-page":"031903","DOI":"10.1103\/PhysRevE.76.031903","volume":"76","author":"E Gelenbe","year":"2007","unstructured":"Gelenbe, E.: Steady-state solution of probabilistic gene regulatory networks. Phys. Rev. E 76(1), 031903 (2007)","journal-title":"Phys. Rev. E"},{"issue":"3","key":"1_CR101","doi-asserted-by":"publisher","first-page":"031903","DOI":"10.1103\/PhysRevE.76.031903","volume":"76","author":"E Gelenbe","year":"2007","unstructured":"Gelenbe, E.: Steady-state solution of probabilistic gene regulatory networks. Phys. Rev. E 76(3), 031903 (2007)","journal-title":"Phys. Rev. E"},{"key":"1_CR102","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.1098\/rspa.2008.0001","volume":"464","author":"E Gelenbe","year":"2008","unstructured":"Gelenbe, E.: Network of interacting synthetic molecules in steady-state. Proc. Royal Soc. A 464, 2219\u20132228 (2008)","journal-title":"Proc. Royal Soc. A"},{"issue":"2096","key":"1_CR103","first-page":"2219","volume":"464","author":"E Gelenbe","year":"2008","unstructured":"Gelenbe, E.: Network of interacting synthetic molecules in steady state. Proc. Royal Soc. A Math. Phys. Eng. Sci. 464(2096), 2219\u20132228 (2008)","journal-title":"Proc. Royal Soc. A Math. Phys. Eng. Sci."},{"issue":"2","key":"1_CR104","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1516539.1516543","volume":"9","author":"E Gelenbe","year":"2009","unstructured":"Gelenbe, E.: Analysis of single and networked auctions. ACM Trans. Internet Technol. (TOIT) 9(2), 8 (2009)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"issue":"7","key":"1_CR105","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/1538788.1538809","volume":"52","author":"E Gelenbe","year":"2009","unstructured":"Gelenbe, E.: Steps toward self-aware networks. Commun. ACM 52(7), 66\u201375 (2009)","journal-title":"Commun. ACM"},{"key":"1_CR106","doi-asserted-by":"publisher","first-page":"061112","DOI":"10.1103\/PhysRevE.82.061112","volume":"82","author":"E Gelenbe","year":"2010","unstructured":"Gelenbe, E.: Search in unknown random environments. Phys. Rev. E 82, 061112 (2010)","journal-title":"Phys. Rev. E"},{"key":"1_CR107","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1016\/S0166-5316(10)00029-5","volume":"67","author":"E Gelenbe","year":"2010","unstructured":"Gelenbe, E.: Special issue on G-networks and their applications. Perform. Eval. 67, 415\u2013416 (2010)","journal-title":"Perform. Eval."},{"key":"1_CR108","doi-asserted-by":"crossref","unstructured":"Gelenbe, E.: Introduction to the special issue on G-networks and the random neural network (2011)","DOI":"10.1016\/j.peva.2011.02.004"},{"key":"1_CR109","doi-asserted-by":"publisher","unstructured":"Gelenbe, E.: Energy packet networks: adaptive energy management for the cloud. In: CloudCP 2012: Proceedings of the 2nd International Workshop on Cloud Computing Platforms, pp. 1\u20135. ACM (2012). https:\/\/doi.org\/10.1145\/2168697.2168698","DOI":"10.1145\/2168697.2168698"},{"key":"1_CR110","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-642-33368-2_16","volume-title":"Green Communications and Networking","author":"E Gelenbe","year":"2012","unstructured":"Gelenbe, E.: Energy packet networks: ICT based energy allocation and storage. In: Rodrigues, J.J.P.C., Zhou, L., Chen, M., Kailas, A. (eds.) GreeNets 2011. LNICST, vol. 51, pp. 186\u2013195. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33368-2_16"},{"key":"1_CR111","doi-asserted-by":"crossref","unstructured":"Gelenbe, E.: Energy packet networks: smart electricity storage to meet surges in demand. In: Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, pp. 1\u20137. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2012)","DOI":"10.4108\/icst.simutools.2012.247805"},{"issue":"7","key":"1_CR112","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1093\/comjnl\/bxs077","volume":"55","author":"E Gelenbe","year":"2012","unstructured":"Gelenbe, E.: Natural computation. Comput. J. 55(7), 848\u2013851 (2012)","journal-title":"Comput. J."},{"key":"1_CR113","doi-asserted-by":"crossref","unstructured":"Gelenbe, E.: Adaptive management of energy packets. In: 2014 IEEE 38th International Computer Software and Applications Conference Workshops, pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/COMPSACW.2014.125"},{"key":"1_CR114","doi-asserted-by":"publisher","unstructured":"Gelenbe, E.: Error and energy when communicating with spins. In: 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 784\u2013787. IEEE, December 2014. https:\/\/doi.org\/10.1109\/GlobalSIP.2014.7032226","DOI":"10.1109\/GlobalSIP.2014.7032226"},{"issue":"2","key":"1_CR115","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/2667522.2667534","volume":"42","author":"E Gelenbe","year":"2014","unstructured":"Gelenbe, E.: A sensor node with energy harvesting. ACM SIGMETRICS Perform. Eval. Rev. 42(2), 37\u201339 (2014)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"issue":"1","key":"1_CR116","doi-asserted-by":"publisher","first-page":"356","DOI":"10.3390\/en8010356","volume":"8","author":"E Gelenbe","year":"2015","unstructured":"Gelenbe, E.: Synchronising energy harvesting and data packets in a wireless sensor. Energies 8(1), 356\u2013369 (2015). https:\/\/doi.org\/10.3390\/en8010356","journal-title":"Energies"},{"issue":"2","key":"1_CR117","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/3003977.3003983","volume":"44","author":"E Gelenbe","year":"2016","unstructured":"Gelenbe, E.: Agreement in spins and social networks. ACM SIGMETRICS Perform. Eval. Rev. 44(2), 15\u201317 (2016)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"1_CR118","doi-asserted-by":"publisher","unstructured":"Gelenbe, E., Abdelrahman, O.H.: An energy packet network model for mobile networks with energy harvesting. Nonlinear Theory Appl. 9(3), 1\u201315 (2018). https:\/\/doi.org\/10.1587\/nolta.9.1. IEICE 2018","DOI":"10.1587\/nolta.9.1"},{"issue":"8","key":"1_CR119","doi-asserted-by":"publisher","first-page":"15142","DOI":"10.3390\/s140815142","volume":"14","author":"E Gelenbe","year":"2014","unstructured":"Gelenbe, E., Bi, H.: Emergency navigation without an infrastructure. Sensors 14(8), 15142\u201315162 (2014)","journal-title":"Sensors"},{"key":"1_CR120","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Campegiani, P., Czach\u00f3rski, T., Katsikas, S.K., Komnios, I., Romano, L., Tzovaras, D.: Security in computer and information sciences: First international ISCIS security workshop 2018, EURO-CYBERSEC 2018, London, UK, 26\u201327 February 2018, revised selected papers (2018)","DOI":"10.1007\/978-3-319-95189-8"},{"issue":"2","key":"1_CR121","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/S0377-2217(97)00373-1","volume":"108","author":"E Gelenbe","year":"1998","unstructured":"Gelenbe, E., Cao, Y.: Autonomous search for mines. Eur. J. Oper. Res. 108(2), 319\u2013333 (1998)","journal-title":"Eur. J. Oper. Res."},{"key":"1_CR122","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2755977","volume":"2015","author":"E Gelenbe","year":"2015","unstructured":"Gelenbe, E., Caseau, Y.: The impact of information technology on energy consumption and carbon emissions. Ubiquity 2015, 1\u201315 (2015)","journal-title":"Ubiquity"},{"key":"1_CR123","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., gce Ceran, E.T.: Central or distributed energy storage for processors with energy harvesting. In: The Fourth International Conference on Sustainable Internet and ICT for Sustainability. IEEE, April 2015","DOI":"10.1109\/SustainIT.2015.7101380"},{"key":"1_CR124","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Domanska, J., Frohlich, P., Nowak, M., Nowak, S.: Self-aware networks that optimize security, QoS and energy. Proc. IEEE 108(7) (2020, accepted for publication )","DOI":"10.1109\/JPROC.2020.2992559"},{"issue":"10","key":"1_CR125","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.1109\/5.537113","volume":"84","author":"E Gelenbe","year":"1996","unstructured":"Gelenbe, E., Feng, Y., Krishnan, K.R.R.: Neural network methods for volumetric magnetic resonance imaging of the human brain. Proc. IEEE 84(10), 1488\u20131496 (1996)","journal-title":"Proc. IEEE"},{"key":"1_CR126","unstructured":"Gelenbe, E., Feng, Y., Ranga, K., Krishnan, R.: Neural networks for volumetric MR imaging of the brain. In: International Workshop on Neural Networks for Identification, Control, Robotics, and Signal\/Image Processing. Proceedings, pp. 194\u2013202. IEEE (1996)"},{"issue":"4","key":"1_CR127","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1162\/089976699300016520","volume":"11","author":"E Gelenbe","year":"1999","unstructured":"Gelenbe, E., Fourneau, J.M.: Random neural networks with multiple classes of signals. Neural Comput. 11(4), 953\u2013963 (1999). https:\/\/doi.org\/10.1162\/089976699300016520","journal-title":"Neural Comput."},{"issue":"1\/4","key":"1_CR128","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/S0166-5316(02)00127-X","volume":"49","author":"E Gelenbe","year":"2002","unstructured":"Gelenbe, E., Fourneau, J.: G-networks with resets. Perform. Eval. 49(1\/4), 179\u2013191 (2002)","journal-title":"Perform. Eval."},{"key":"1_CR129","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., et al.: IoT network attack detection and mitigation. In: The 9th Mediterranean Conference on Embedded Computing (MECO 2020), Budva, Montenegro, 8\u201311 June 2020, pp. 1\u20136 (2020). https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=9134241&isnumber$$\\ldots $$","DOI":"10.1109\/MECO49872.2020.9134241"},{"key":"1_CR130","unstructured":"Gelenbe, E., Gellman, M., Loukas, G.: An autonomic approach to denial of service defence. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM 2005, pp. 537\u2013541. IEEE (2005)"},{"key":"1_CR131","unstructured":"Gelenbe, E., Gellman, M., Su, P.: Self-awareness and adaptivity for quality of service. In: Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC 2003), pp. 3\u20139. IEEE (2003)"},{"key":"1_CR132","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Gesbert, D., Gunduz, D., K\u00fclah, H., Uysal-Biyikoglu, E.: Energy harvesting communication networks: optimization and demonstration (the e-crops project). In: 2013 24th Tyrrhenian International Workshop on Digital Communications-Green ICT (TIWDC), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/TIWDC.2013.6664201"},{"key":"1_CR133","doi-asserted-by":"publisher","unstructured":"Gelenbe, E., Ghanwani, A., Srinivasan, V.: Improved neural heuristics for multicast routing. IEEE J. Sel. Areas Commun. 15(2), 147\u2013155 (1997). https:\/\/doi.org\/10.1109\/49.552065","DOI":"10.1109\/49.552065"},{"key":"1_CR134","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Ghanwani, A., Srinivasan, V.: Improved neural heuristics for multicast routing. IEEE J. Sel. Areas Commun. 15(2), 147\u2013155 (1997)","DOI":"10.1109\/49.552065"},{"key":"1_CR135","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-319-01604-7_36","volume-title":"Information Sciences and Systems 2013","author":"E Gelenbe","year":"2013","unstructured":"Gelenbe, E., et al.: NEMESYS: enhanced network security for seamless service provisioning in the smart mobile ecosystem. In: Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2013. LNEE, vol. 264, pp. 369\u2013378. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-01604-7_36"},{"key":"1_CR136","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., et al.: Security for smart mobile networks: the NEMESYS approach. In: 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/PRISMS.2013.6927181"},{"key":"1_CR137","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Gorbil, G., Wu, F.J.: Emergency cyber-physical-human systems. In: 2012 21st International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20137. IEEE (2012)","DOI":"10.1109\/ICCCN.2012.6289183"},{"key":"1_CR138","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., G\u00fcnd\u00fcz, D.: Optimum power level for communications with interference. In: 2013 24th Tyrrhenian International Workshop on Digital Communications-Green ICT (TIWDC), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/TIWDC.2013.6664203"},{"key":"1_CR139","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-642-02924-0_3","volume-title":"Computer Performance Engineering","author":"E Gelenbe","year":"2009","unstructured":"Gelenbe, E., Gy\u00f6rfi, L.: Performance of auctions and sealed bids. In: Bradley, J.T. (ed.) EPEW 2009. LNCS, vol. 5652, pp. 30\u201343. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02924-0_3"},{"key":"1_CR140","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Hebrail, G.: A probability model of uncertainty in data bases. In: Proceedings of the Second International Conference on Data Engineering, pp. 328\u2013333. IEEE Computer Society (1986)","DOI":"10.1109\/ICDE.1986.7266237"},{"key":"1_CR141","doi-asserted-by":"publisher","unstructured":"Gelenbe, E., Hussain, K.: Learning in the multiple class random neural network. IEEE Trans. Neural Netw. 13(6), 1257\u20131267 (2002). https:\/\/doi.org\/10.1109\/TNN.2002.804228","DOI":"10.1109\/TNN.2002.804228"},{"key":"1_CR142","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Hussain, K., Kaptan, V.: Simulating autonomous agents in augmented reality. J. Syst. Softw. 74(3), 255\u2013268 (2005)","DOI":"10.1016\/j.jss.2004.01.016"},{"issue":"6","key":"1_CR143","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1109\/TNN.2002.804228","volume":"13","author":"E Gelenbe","year":"2002","unstructured":"Gelenbe, E., Hussain, K.F.: Learning in the multiple class random neural network. IEEE Trans. Neural Netw. 13(6), 1257\u20131267 (2002)","journal-title":"IEEE Trans. Neural Netw."},{"key":"1_CR144","unstructured":"Gelenbe, E., Iasnogorodski, R.: A queue with server of walking type (autonomous service). Annales de l\u2019institut Henri Poincar\u00e9 (B) Probabilit\u00e9s et Statistiques 16(1), 63\u201373 (1980)"},{"key":"1_CR145","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/S0166-5316(99)00019-X","volume":"36","author":"E Gelenbe","year":"1999","unstructured":"Gelenbe, E., Kammerman, P., Lam, T.: Performance considerations in totally mobile wireless. Perform. Eval. 36, 387\u2013399 (1999)","journal-title":"Perform. Eval."},{"key":"1_CR146","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/978-3-540-30182-0_67","volume-title":"Computer and Information Sciences - ISCIS 2004","author":"E Gelenbe","year":"2004","unstructured":"Gelenbe, E., Kaptan, V., Wang, Yu.: Biological metaphors for agent behavior. In: Aykanat, C., Dayar, T., K\u00f6rpeo\u011flu, \u0130. (eds.) ISCIS 2004. LNCS, vol. 3280, pp. 667\u2013675. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30182-0_67"},{"key":"1_CR147","doi-asserted-by":"publisher","unstructured":"Gelenbe, E., Kazhmaganbetova, Z.: Cognitive packet network for bilateral asymmetric connections. IEEE Trans. Indus. Inform. 10(3), 1717\u20131725 (2014). https:\/\/doi.org\/10.1109\/TII.2014.2321740","DOI":"10.1109\/TII.2014.2321740"},{"key":"1_CR148","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Ko\u00e7ak, T.: Area-based results for mine detection. IEEE Trans. Geosci. Remote Sens. 38(1), 12\u201324 (2000)","DOI":"10.1109\/36.823897"},{"issue":"2","key":"1_CR149","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.mee.2004.05.006","volume":"75","author":"E Gelenbe","year":"2004","unstructured":"Gelenbe, E., Ko\u00e7ak, T., Wang, R.: Wafer surface reconstruction from top-down scanning electron microscope images. Microelectron. Eng. 75(2), 216\u2013233 (2004)","journal-title":"Microelectron. Eng."},{"key":"1_CR150","unstructured":"Gelenbe, E., Koubi, V., Pekergin, F.: Dynamical random neural network approach to the traveling salesman problem. In: International Conference on Systems, Man and Cybernetics. Systems Engineering in the Service of Humans, Conference Proceedings, pp. 630\u2013635. IEEE (1993)"},{"issue":"1","key":"1_CR151","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.1978.231462","volume":"4","author":"E Gelenbe","year":"1978","unstructured":"Gelenbe, E., Kurinckx, A.: Random injection control of multiprogramming in virtual memory. IEEE Trans. SE Softw. Eng. 4(1), 2\u201317 (1978)","journal-title":"IEEE Trans. SE Softw. Eng."},{"key":"1_CR152","unstructured":"Gelenbe, E., Labed, A.: ESPRIT LTR project 8144 LYDIA load balancing and G-networks: design, implementation and evaluation. Technical report, IHEI, Univ. Ren\u00e9 Descartes, Paris V (1996)"},{"issue":"2","key":"1_CR153","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S0377-2217(97)00371-8","volume":"108","author":"E Gelenbe","year":"1998","unstructured":"Gelenbe, E., Labed, A.: G-networks with multiple classes of signals and positive customers. Eur. J. Oper. Res. 108(2), 293\u2013305 (1998). https:\/\/doi.org\/10.1016\/S0377-2217(97)00371-8","journal-title":"Eur. J. Oper. Res."},{"issue":"2","key":"1_CR154","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S0377-2217(97)00371-8","volume":"108","author":"E Gelenbe","year":"1998","unstructured":"Gelenbe, E., Labed, A.: G-networks with multiple classes of signals and positive customers. Eur. J. Oper. Res. 108(2), 293\u2013305 (1998)","journal-title":"Eur. J. Oper. Res."},{"key":"1_CR155","doi-asserted-by":"publisher","unstructured":"Gelenbe, E., Lenfant, J., Potier, D.: Analyse d\u2019un algorithme de gestion simultan\u00e9e m\u00e9moire centrale - disque de pagination. Acta Informatica 3, 321\u2013345 (1974). https:\/\/doi.org\/10.1007\/BF00263587","DOI":"10.1007\/BF00263587"},{"key":"1_CR156","doi-asserted-by":"publisher","unstructured":"Gelenbe, E., Lenfant, J., Potier, D.: Response time of a fixed-head disk to transfers of variable length. SIAM J. Comput. 4(4), 461\u2013473 (1975). https:\/\/doi.org\/10.1137\/0204039","DOI":"10.1137\/0204039"},{"issue":"3","key":"1_CR157","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.adhoc.2004.03.009","volume":"2","author":"E Gelenbe","year":"2004","unstructured":"Gelenbe, E., Lent, R.: Power-aware ad hoc cognitive packet networks. Ad Hoc Netw. 2(3), 205\u2013216 (2004)","journal-title":"Ad Hoc Netw."},{"key":"1_CR158","doi-asserted-by":"publisher","first-page":"257","DOI":"10.2478\/v10179-012-0016-1","volume":"24","author":"E Gelenbe","year":"2012","unstructured":"Gelenbe, E., Lent, R.: Optimising server energy consumption and response time. Theoret. Appl. Inform. 24, 257\u2013270 (2012)","journal-title":"Theoret. Appl. Inform."},{"key":"1_CR159","unstructured":"Gelenbe, E., Lent, R.: Trade-offs between energy and quality of service. In: 2012 Sustainable Internet and ICT for Sustainability (SustainIT), pp. 1\u20135. IEEE (2012)"},{"key":"1_CR160","series-title":"27th International Symposium on Computer and Information Sciences, Paris, France, October 3\u20134, 2012","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4594-3","volume-title":"Computer and Information Sciences III","year":"2013","unstructured":"Gelenbe, E., Lent, R. (eds.): Computer and Information Sciences III. 27th International Symposium on Computer and Information Sciences, Paris, France, October 3\u20134, 2012. Springer, London (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4594-3"},{"key":"1_CR161","series-title":"2013 - Proceedings of the 28th International Symposium on Computer and Information Sciences, ISCIS 2013, Paris, France, October 28\u201329, Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01604-7","volume-title":"Information Sciences and Systems 2013","year":"2013","unstructured":"Gelenbe, E., Lent, R. (eds.): Information Sciences and Systems 2013. 2013 - Proceedings of the 28th International Symposium on Computer and Information Sciences, ISCIS 2013, Paris, France, October 28\u201329, Lecture Notes in Electrical Engineering, vol. 264. Springer, London (2013). https:\/\/doi.org\/10.1007\/978-3-319-01604-7"},{"key":"1_CR162","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Lent, R., Douratsos, M.: Choosing a local or remote cloud. In: 2012 Second Symposium on Network Cloud Computing and Applications, pp. 25\u201330. IEEE (2012)","DOI":"10.1109\/NCCA.2012.16"},{"key":"1_CR163","unstructured":"Gelenbe, E., Lent, R., Montuori, A., Xu, Z.: Cognitive packet networks: QoS and performance. In: 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, MASCOTS 2002. Proceedings, pp. 3\u20139. IEEE (2002)"},{"issue":"9","key":"1_CR164","doi-asserted-by":"publisher","first-page":"1478","DOI":"10.1109\/JPROC.2004.832952","volume":"92","author":"E Gelenbe","year":"2004","unstructured":"Gelenbe, E., Lent, R., Nunez, A.: Self-aware networks and QoS. Proc. IEEE 92(9), 1478\u20131489 (2004)","journal-title":"Proc. IEEE"},{"key":"1_CR165","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2155-8","volume-title":"Computer and Information Sciences II","year":"2012","unstructured":"Gelenbe, E., Lent, R., Sakellari, G. (eds.): Computer and Information Sciences II. Springer, London (2012). https:\/\/doi.org\/10.1007\/978-1-4471-2155-8"},{"key":"1_CR166","doi-asserted-by":"publisher","unstructured":"Gelenbe, E., Lent, R., Sakellari, G., Sacan, A., Toroslu, I.H., Yazici, A. (eds.): Computer and Information Sciences - Proceedings of the 25th International Symposium on Computer and Information Sciences, London, UK, 22\u201324 September 2010. LNEE, vol. 62. Springer, London (2010). https:\/\/doi.org\/10.1007\/978-90-481-9794-1","DOI":"10.1007\/978-90-481-9794-1"},{"issue":"2","key":"1_CR167","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/S0166-5316(01)00042-6","volume":"46","author":"E Gelenbe","year":"2001","unstructured":"Gelenbe, E., Lent, R., Xu, Z.: Design and performance of cognitive packet networks. Perform. Eval. 46(2), 155\u2013176 (2001)","journal-title":"Perform. Eval."},{"issue":"6","key":"1_CR168","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/S1389-1286(01)00253-5","volume":"37","author":"E Gelenbe","year":"2001","unstructured":"Gelenbe, E., Lent, R., Xu, Z.: Measurement and performance of a cognitive packet network. Comput. Netw. 37(6), 691\u2013701 (2001)","journal-title":"Comput. Netw."},{"key":"1_CR169","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-1-4471-0705-7_1","volume-title":"Performance and QoS of Next Generation Networking","author":"E Gelenbe","year":"2001","unstructured":"Gelenbe, E., Lent, R., Xu, Z.: Towards networks with cognitive packets. In: Goto, K., Hasegawa, T., Takagi, H., Takahashi, Y. (eds.) Performance and QoS of Next Generation Networking, pp. 3\u201317. Springer, London (2001). https:\/\/doi.org\/10.1007\/978-1-4471-0705-7_1"},{"key":"1_CR170","unstructured":"Gelenbe, E., Liu, P.: QoS and routing in the cognitive packet network. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM 2005, pp. 517\u2013521. IEEE (2005)"},{"issue":"5","key":"1_CR171","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1016\/j.comnet.2006.09.009","volume":"51","author":"E Gelenbe","year":"2007","unstructured":"Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Comput. Netw. 51(5), 1299\u20131314 (2007)","journal-title":"Comput. Netw."},{"key":"1_CR172","unstructured":"Gelenbe, E., Mahmoodi, T.: Energy-aware routing in the cognitive packet network. Energy, pp. 7\u201312 (2011)"},{"key":"1_CR173","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-1-4471-2155-8_18","volume-title":"Computer and Information Sciences II","author":"E Gelenbe","year":"2012","unstructured":"Gelenbe, E., Mahmoodi, T.: Distributed energy-aware routing protocol. In: Gelenbe, E., Lent, R., Sakellari, G. (eds.) Computer and Information Sciences II, pp. 149\u2013154. Springer, London (2012). https:\/\/doi.org\/10.1007\/978-1-4471-2155-8_18"},{"key":"1_CR174","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Mahmoodi, T., Morfopoulou, C.: Energy aware routing in packet networks. E-Energy (2010)","DOI":"10.1093\/comjnl\/bxq092"},{"key":"1_CR175","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/0166-5316(96)00033-8","volume":"27","author":"E Gelenbe","year":"1996","unstructured":"Gelenbe, E., Mang, X., \u00d6nvural, R.: Diffusion based statistical call admission control in ATM. Perform. Eval. 27, 411\u2013436 (1996)","journal-title":"Perform. Eval."},{"issue":"5","key":"1_CR176","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/35.592106","volume":"35","author":"E Gelenbe","year":"1997","unstructured":"Gelenbe, E., Mang, X., Onvural, R.: Bandwidth allocation and call admission control in high-speed networks. IEEE Commun. Mag. 35(5), 122\u2013129 (1997)","journal-title":"IEEE Commun. Mag."},{"issue":"1\u20132","key":"1_CR177","first-page":"143","volume":"12","author":"E Gelenbe","year":"2004","unstructured":"Gelenbe, E., Mao, Z.H., Li, Y.D.: Function approximation by random neural networks with a bounded number of layers. Differ. Equ. Dynam. Syst. 12(1\u20132), 143\u2013170 (2004)","journal-title":"Differ. Equ. Dynam. Syst."},{"issue":"1","key":"1_CR178","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/72.737488","volume":"10","author":"E Gelenbe","year":"1999","unstructured":"Gelenbe, E., Mao, Z.W., Li, Y.D.: Function approximation with spiked random networks. IEEE Trans. Neural Netw. 10(1), 3\u20139 (1999)","journal-title":"IEEE Trans. Neural Netw."},{"key":"1_CR179","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-18579-8_7","volume-title":"Analytical and Stochastic Modelling Techniques and Applications","author":"E Gelenbe","year":"2015","unstructured":"Gelenbe, E., Marin, A.: Interconnected wireless sensors with energy harvesting. In: Gribaudo, M., Manini, D., Remke, A. (eds.) ASMTA 2015. LNCS, vol. 9081, pp. 87\u201399. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18579-8_7"},{"key":"1_CR180","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-19322-4_18","volume-title":"Energy-Efficient Computing and Networking","author":"E Gelenbe","year":"2011","unstructured":"Gelenbe, E., Morfopoulou, C.: Routing and G-networks to optimise energy and quality of service in packet networks. In: Hatziargyriou, N., Dimeas, A., Tomtsi, T., Weidlich, A. (eds.) E-Energy 2010. LNICST, vol. 54, pp. 163\u2013173. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19322-4_18"},{"issue":"6","key":"1_CR181","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1093\/comjnl\/bxq092","volume":"54","author":"E Gelenbe","year":"2011","unstructured":"Gelenbe, E., Morfopoulou, C.: A framework for energy-aware routing in packet networks. Comput. J. 54(6), 850\u2013859 (2011)","journal-title":"Comput. J."},{"issue":"1","key":"1_CR182","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF00265220","volume":"7","author":"E Gelenbe","year":"1976","unstructured":"Gelenbe, E., Muntz, R.R.: Probabilistic models of computer systems. Part I Exact Results. Acta Informatica 7(1), 35\u201360 (1976)","journal-title":"Part I Exact Results. Acta Informatica"},{"issue":"7","key":"1_CR183","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1093\/comjnl\/bxp082","volume":"53","author":"E Gelenbe","year":"2010","unstructured":"Gelenbe, E., Ngai, E.: Adaptive random re-routing for differentiated QoS in sensor networks. Comput. J. 53(7), 1052\u20131061 (2010)","journal-title":"Comput. J."},{"key":"1_CR184","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Ngai, E.C.H.: Adaptive QoS routing for significant events in wireless sensor networks. In: 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 410\u2013415. IEEE (2008)","DOI":"10.1109\/MAHSS.2008.4660035"},{"key":"1_CR185","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1007\/3-540-44989-2_107","volume-title":"Artificial Neural Networks and Neural Information Processing \u2014 ICANN\/ICONIP 2003","author":"E Gelenbe","year":"2003","unstructured":"Gelenbe, E., N\u00fa\u00f1ez, A.: Self-aware networks and quality of service. In: Kaynak, O., Alpaydin, E., Oja, E., Xu, L. (eds.) ICANN\/ICONIP -2003. LNCS, vol. 2714, pp. 901\u2013908. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-44989-2_107"},{"key":"1_CR186","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Oklander, B.: Cognitive users with useful vacations. In: 2013 IEEE International Conference on Communications Workshops (ICC), pp. 370\u2013374. IEEE (2013)","DOI":"10.1109\/ICCW.2013.6649261"},{"key":"1_CR187","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Pavloski, M.: Performance of a security control scheme for a health data exchange system. In: IEEE International Black Sea Conference on Communications and Networking, 26\u201329 May 2020. Virtual Conference (2020)","DOI":"10.1109\/BlackSeaCom48709.2020.9235005"},{"key":"1_CR188","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/3-540-06600-4_12","volume-title":"5th Conference on Optimization Techniques Part II","author":"E Gelenbe","year":"1973","unstructured":"Gelenbe, E., Potier, D., Brandwajn, A., Lenfant, J.: Gestion Optimale d\u2019un Ordinateur Multiprogramme a Memoire Virtuelle. In: Conti, R., Ruberti, A. (eds.) Optimization Techniques, Part II. LNCS, vol. 4, pp. 132\u2013143. Springer, Heidelberg (1973). https:\/\/doi.org\/10.1007\/3-540-06600-4_12"},{"key":"1_CR189","unstructured":"Gelenbe, E., Pujolle, G.: Introduction aux r\u00e9seaux de files d\u2019attente. Eyrolles (1982)"},{"issue":"8","key":"1_CR190","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1287\/mnsc.36.8.928","volume":"36","author":"E Gelenbe","year":"1990","unstructured":"Gelenbe, E., Rosenberg, C.: Queues with slowly varying arrival and service processes. Manage. Sci. 36(8), 928\u2013937 (1990)","journal-title":"Manage. Sci."},{"key":"1_CR191","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Sakellari, G., D\u2019arienzo, M.: Admission of QoS aware users in a smart network. ACM Trans. Auton. Adap. Syst. (TAAS) 3(1), 1\u201328 (2008)","DOI":"10.1145\/1342171.1342175"},{"key":"1_CR192","unstructured":"Gelenbe, E., Sakellari, G., Filippoupolitis, A.: PerNEM 2012: second international workshop on pervasive networks for emergency management 2012, committees and welcome. In: Proceedings of the PerCOM 2012 (2012)"},{"key":"1_CR193","unstructured":"Gelenbe, E., Sakellari, G., Filippoupolitis, A.: PerNEM 2013: third international workshop on pervasive networks for emergency management 2013-committees and welcome. In: Proceedings of the PerCOM 2013 (2013)"},{"issue":"2","key":"1_CR194","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/5.910851","volume":"89","author":"E Gelenbe","year":"2001","unstructured":"Gelenbe, E., Seref, E., Xu, Z.: Simulation with learning agents. Proc. IEEE 89(2), 148\u2013157 (2001)","journal-title":"Proc. IEEE"},{"issue":"10","key":"1_CR195","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1109\/TC.1979.1675241","volume":"28","author":"E Gelenbe","year":"1979","unstructured":"Gelenbe, E., Sevcik, K.: Analysis of update synchronization for multiple copy data bases. IEEE Trans. Comput. 28(10), 737\u2013747 (1979)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"1_CR196","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/S0377-2217(99)00480-4","volume":"126","author":"E Gelenbe","year":"2000","unstructured":"Gelenbe, E., Shachnai, H.: On g-networks and resource allocation in multimedia systems. Eur. J. Oper. Res. 126(2), 308\u2013318 (2000)","journal-title":"Eur. J. Oper. Res."},{"key":"1_CR197","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/978-3-642-10625-5_45","volume-title":"Quality of Service in Heterogeneous Networks","author":"E Gelenbe","year":"2009","unstructured":"Gelenbe, E., Silvestri, S.: Optimisation of power consumption in wired packet networks. In: Bartolini, N., Nikoletseas, S., Sinha, P., Cardellini, V., Mahanti, A. (eds.) QShine 2009. LNICST, vol. 22, pp. 717\u2013729. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10625-5_45"},{"key":"1_CR198","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Silvestri, S.: Reducing power consumption in wired networks. In: 2009 24th International Symposium on Computer and Information Sciences, pp. 292\u2013297. IEEE (2009)","DOI":"10.1109\/ISCIS.2009.5291829"},{"issue":"10","key":"1_CR199","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/0307-904X(91)90055-T","volume":"15","author":"E Gelenbe","year":"1991","unstructured":"Gelenbe, E., Stafylopatis, A.: Global behavior of homogeneous random neural systems. Appl. Math. Model. 15(10), 534\u2013541 (1991)","journal-title":"Appl. Math. Model."},{"issue":"6","key":"1_CR200","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s005300050037","volume":"4","author":"E Gelenbe","year":"1996","unstructured":"Gelenbe, E., Sungur, M., Cramer, C., Gelenbe, P.: Traffic and video quality with adaptive neural compression. Multimedia Syst. 4(6), 357\u2013369 (1996)","journal-title":"Multimedia Syst."},{"issue":"9","key":"1_CR201","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.1162\/neco.2008.04-07-509","volume":"20","author":"E Gelenbe","year":"2008","unstructured":"Gelenbe, E., Timotheou, S.: Random neural networks with synchronized interactions. Neural Comput. 20(9), 2308\u20132324 (2008)","journal-title":"Neural Comput."},{"issue":"6","key":"1_CR202","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1093\/comjnl\/bxn004","volume":"51","author":"E Gelenbe","year":"2008","unstructured":"Gelenbe, E., Timotheou, S.: Synchronized interactions in spiked neuronal networks. Comput. J. 51(6), 723\u2013730 (2008)","journal-title":"Comput. J."},{"issue":"9","key":"1_CR203","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1093\/comjnl\/bxq010","volume":"53","author":"E Gelenbe","year":"2010","unstructured":"Gelenbe, E., Timotheou, S., Nicholson, D.: Fast distributed near-optimum assignment of assets to tasks. Comput. J. 53(9), 1360\u20131369 (2010)","journal-title":"Comput. J."},{"key":"1_CR204","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-01665-3_8","volume-title":"Agent and Multi-Agent Systems: Technologies and Applications","author":"E Gelenbe","year":"2009","unstructured":"Gelenbe, E., Velan, K.: An approximate model for bidders in sequential automated auctions. In: H\u00e5kansson, A., Nguyen, N.T., Hartung, R.L., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2009. LNCS (LNAI), vol. 5559, pp. 70\u201379. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01665-3_8"},{"key":"1_CR205","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-642-35208-9_8","volume-title":"Agent and Multi-Agent Systems in Distributed Systems-Digital Economy and E-Commerce","author":"E Gelenbe","year":"2013","unstructured":"Gelenbe, E., Velan, K.: Mathematical models of automated auctions. In: Hakansson, A., Hartung, R. (eds.) Agent and Multi-Agent Systems in Distributed Systems-Digital Economy and E-Commerce, pp. 137\u2013161. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35208-9_8"},{"key":"1_CR206","unstructured":"Gelenbe, E., Wang, L.: Tap: a task allocation platform for the EU FP7 PANACEA project. In: Advances in Service-Oriented and Cloud Computing: Workshops of ESOCC 2015, Taormina, Italy, 15\u201317 September 2015, Revised Selected Paper, vol. 567, p. 425 (2016)"},{"key":"1_CR207","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Wang, Y.: A mathematical approach for mission planning and rehearsal. In: Defense and Security Symposium, pp. 62490Q\u201362490Q. International Society for Optics and Photonics (2006)","DOI":"10.1117\/12.661278"},{"key":"1_CR208","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Wang, Y.: Modelling large scale autonomous systems. In: 2006 9th International Conference on Information Fusion, pp. 1\u20137. IEEE (2006)","DOI":"10.1109\/ICIF.2006.301746"},{"key":"1_CR209","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Wu, F.J.: Distributed networked emergency evacuation and rescue. In: 2012 IEEE International Conference on Communications (ICC), pp. 6334\u20136338. IEEE (2012)","DOI":"10.1109\/ICC.2012.6364740"},{"issue":"12","key":"1_CR210","doi-asserted-by":"publisher","first-page":"3869","DOI":"10.1016\/j.camwa.2012.03.056","volume":"64","author":"E Gelenbe","year":"2012","unstructured":"Gelenbe, E., Wu, F.J.: Large scale simulation for human evacuation and rescue. Comput. Math. Appl. 64(12), 3869\u20133880 (2012)","journal-title":"Comput. Math. Appl."},{"key":"1_CR211","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Wu, F.J.: Sensors in cyber-physical emergency systems. In: IET Conference on Wireless Sensor Systems (WSS 2012), pp. 1\u20137. IET (2012)","DOI":"10.1049\/cp.2012.0578"},{"issue":"3","key":"1_CR212","doi-asserted-by":"publisher","first-page":"336","DOI":"10.3390\/fi5030336","volume":"5","author":"E Gelenbe","year":"2013","unstructured":"Gelenbe, E., Wu, F.J.: Future research on cyber-physical emergency management systems. Future Internet 5(3), 336\u2013354 (2013)","journal-title":"Future Internet"},{"key":"1_CR213","unstructured":"Gelenbe, E., Xu, Z., Seref, E.: Cognitive packet networks. In: 11th IEEE International Conference on Conference Tools with Artificial Intelligence. Proceedings, pp. 47\u201354. IEEE (1999)"},{"key":"1_CR214","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95189-8","volume-title":"Security in Computer and Information Sciences","year":"2018","unstructured":"Gelenbe, E., et al. (eds.): Euro-CYBERSEC 2018. CCIS, vol. 821. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95189-8"},{"issue":"4","key":"1_CR215","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1109\/TE.2008.930511","volume":"52","author":"M Georgiopoulos","year":"2009","unstructured":"Georgiopoulos, M., et al.: A sustainable model for integrating current topics in machine learning research into the undergraduate curriculum. IEEE Trans. Educ. 52(4), 503\u2013512 (2009)","journal-title":"IEEE Trans. Educ."},{"key":"1_CR216","doi-asserted-by":"crossref","unstructured":"Ghalut, T., Larijani, H.: Non-intrusive method for video quality prediction over LTE using random neural networks (RNN). In: 9th International Symposium on Communication Systems, Networks & Digital Signal Processing, CSNDSP 2014, Manchester, UK, 23\u201325 July 2014, pp. 519\u2013524. IEEE (2014). https:\/\/doi.org\/10.1109\/CSNDSP.2014.6923884","DOI":"10.1109\/CSNDSP.2014.6923884"},{"key":"1_CR217","doi-asserted-by":"crossref","unstructured":"Ghalut, T., Larijani, H.: Content-aware and QOE optimization of video stream scheduling over LTE networks using genetic algorithms and random neural networks. J. Ubiquit. Syst. Perv. Netw. 9(2), 21\u201333 (2018). https:\/\/doi.org\/10.5383\/JUSPN.09.02.003","DOI":"10.5383\/JUSPN.09.02.003"},{"key":"1_CR218","doi-asserted-by":"crossref","unstructured":"Gorbil, G., Abdelrahman, O.H., Gelenbe, E.: Storms in mobile networks. In: Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 119\u2013126. ACM (2014)","DOI":"10.1145\/2642687.2642688"},{"key":"1_CR219","doi-asserted-by":"crossref","unstructured":"G\u00f6rbil, G., Abdelrahman, O.H., Gelenbe, E.: Storms in mobile networks. In: Mueller, P., Foschini, L., Yu, R. (eds.) Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2014, Montreal, QC, Canada, 21\u201322 September 2014, pp. 119\u2013126. ACM (2014). http:\/\/doi.acm.org\/10.1145\/2642687.2642688","DOI":"10.1145\/2642687.2642688"},{"issue":"1","key":"1_CR220","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/TETC.2015.2389662","volume":"4","author":"G Gorbil","year":"2016","unstructured":"Gorbil, G., Abdelrahman, O.H., Pavloski, M., Gelenbe, E.: Modeling and analysis of RRC-based signalling storms in 3G networks. IEEE Trans. Emerg. Topics Comput. 4(1), 113\u2013127 (2016)","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"key":"1_CR221","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-1-4471-2155-8_43","volume-title":"Computer and Information Sciences II","author":"G Gorbil","year":"2011","unstructured":"Gorbil, G., Filippoupolitis, A., Gelenbe, E.: Intelligent navigation systems for building evacuation. In: Gelenbe, E., Lent, R., Sakellari, G. (eds.) Computer and Information Sciences II, pp. 339\u2013345. Springer, London (2011). https:\/\/doi.org\/10.1007\/978-1-4471-2155-8_43"},{"key":"1_CR222","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-14379-3_4","volume-title":"Critical Information Infrastructures Security","author":"G G\u00f6rbil","year":"2010","unstructured":"G\u00f6rbil, G., Gelenbe, E.: Design of a mobile agent-based adaptive communication middleware for federations of critical infrastructure simulations. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 34\u201349. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14379-3_4"},{"key":"1_CR223","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.procs.2011.07.008","volume":"5","author":"G Gorbil","year":"2011","unstructured":"Gorbil, G., Gelenbe, E.: Opportunistic communications for emergency support systems. Procedia Comput. Sci. 5, 39\u201347 (2011)","journal-title":"Procedia Comput. Sci."},{"key":"1_CR224","doi-asserted-by":"crossref","unstructured":"Gorbil, G., Gelenbe, E.: Disruption tolerant communications for large scale emergency evacuation. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 540\u2013546. IEEE (2013)","DOI":"10.1109\/PerComW.2013.6529555"},{"key":"1_CR225","doi-asserted-by":"crossref","unstructured":"Grochla, K., et al.: LP WAN gateway location selection using modified k-dominating set algorithm. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 209\u2013223. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_14"},{"key":"1_CR226","doi-asserted-by":"crossref","unstructured":"Hasselquist, D., Lindstr\u00f6m, C., Korzhitskii, N., Carlsson, N., Gurtov, A.: Quic throughput and fairness over dual connectivity. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 175\u2013190. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_12"},{"key":"1_CR227","doi-asserted-by":"crossref","unstructured":"Hasselquist, D., Wahl, C., Bergdal, O., Carlsson, N.: Hypothesis-based comparison of ipv6 and ipv4 path distances. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 191\u2013208. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_13"},{"issue":"1\u20132","key":"1_CR228","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11235-010-9338-7","volume":"48","author":"L Hey","year":"2011","unstructured":"Hey, L., Gelenbe, E.: Adaptive packet prioritisation for large wireless sensor networks. Telecommun. Syst. 48(1\u20132), 125\u2013150 (2011)","journal-title":"Telecommun. Syst."},{"key":"1_CR229","doi-asserted-by":"crossref","unstructured":"Hocaoglu, A.K., Gader, P.D., Gelenbe, E., Kocak, T.: Optimal linear combination of order statistics filters and their relationship to the delta-operator. In: AeroSense 1999, pp. 1323\u20131329. International Society for Optics and Photonics (1999)","DOI":"10.1117\/12.357016"},{"issue":"2","key":"1_CR230","first-page":"89","volume":"38","author":"KF Hussain","year":"2004","unstructured":"Hussain, K.F., Kaptan, V.: Modeling and simulation with augmented reality. Int. J. Oper. Res. 38(2), 89\u2013103 (2004)","journal-title":"Int. J. Oper. Res."},{"issue":"2","key":"1_CR231","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/TITS.2012.2226239","volume":"14","author":"KF Hussain","year":"2013","unstructured":"Hussain, K.F., Radwan, E., Moussa, G.S.: Augmented reality experiment: drivers\u2019 behavior at an unsignalized intersection. IEEE Trans. Intell. Transp. Syst. 14(2), 608\u2013617 (2013)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"1_CR232","doi-asserted-by":"crossref","unstructured":"Hussain, K.F., Bassyouni, M.Y., Gelenbe, E.: Accurate and energy-efficient classification with spiking random neural network. Probability in the Engineering and Informational Sciences (2019)","DOI":"10.1017\/S0269964819000147"},{"key":"1_CR233","doi-asserted-by":"publisher","unstructured":"Jr., E.G.C., Gelenbe, E., Plateau, B.: Optimization of the number of copies in a distributed data base. IEEE Trans. Softw. Eng. 7(1), 78\u201384 (1981). https:\/\/doi.org\/10.1109\/TSE.1981.234510. http:\/\/doi.ieeecomputersociety.org\/10.1109\/TSE.1981.234510","DOI":"10.1109\/TSE.1981.234510"},{"key":"1_CR234","doi-asserted-by":"crossref","unstructured":"Kieffer, A., Maill\u00e9, P., Tuffin, B.: Non-neutrality with users deciding differentiation: a satisfying option?\u2019. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 119\u2013128. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_8"},{"key":"1_CR235","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-642-13568-2_27","volume-title":"Analytical and Stochastic Modeling Techniques and Applications","author":"G Kim","year":"2010","unstructured":"Kim, G., Gelenbe, E.: Analysis of an automated auction with concurrent multiple unit acceptance capacity. In: Al-Begain, K., Fiems, D., Knottenbelt, W.J. (eds.) ASMTA 2010. LNCS, vol. 6148, pp. 382\u2013396. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13568-2_27"},{"issue":"2","key":"1_CR236","doi-asserted-by":"publisher","first-page":"8-1","DOI":"10.4051\/ibc.2011.3.2.0008","volume":"3","author":"HS Kim","year":"2011","unstructured":"Kim, H.S., Gelenbe, E.: G-networks based two layer stochastic modeling of gene regulatory networks with post-translational processes. Interdisc. Bio Central 3(2), 8-1 (2011)","journal-title":"Interdisc. Bio Central"},{"key":"1_CR237","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-1-4471-2155-8_32","volume-title":"Computer and Information Sciences II","author":"H Kim","year":"2011","unstructured":"Kim, H., Atalay, R., Gelenbe, E.: G-network modelling based abnormal pathway detection in gene regulatory networks. In: Gelenbe, E., Lent, R., Sakellari, G. (eds.) Computer and Information Sciences II, pp. 257\u2013263. Springer, London (2011). https:\/\/doi.org\/10.1007\/978-1-4471-2155-8_32"},{"key":"1_CR238","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-13624-5_22","volume-title":"Proceedings of the EU-Korea Conference on Science and Technology","author":"H Kim","year":"2010","unstructured":"Kim, H., Gelenbe, E.: Stochastic gene expression model base gene regulatory networks. In: Lee, J.H., Lee, H., Kim, J.S. (eds.) EKC 2009, pp. 235\u2013244. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-3-642-13624-5_22"},{"key":"1_CR239","doi-asserted-by":"crossref","unstructured":"Kim, H., Gelenbe, E.: Reconstruction of large-scale gene regulatory networks using Bayesian model averaging. In: 2011 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 202\u2013207. IEEE (2011)","DOI":"10.1109\/BIBM.2011.95"},{"issue":"3","key":"1_CR240","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/TNB.2012.2214233","volume":"11","author":"H Kim","year":"2012","unstructured":"Kim, H., Gelenbe, E.: Reconstruction of large-scale gene regulatory networks using Bayesian model averaging. IEEE Trans. NanoBiosci. 11(3), 259\u2013265 (2012). https:\/\/doi.org\/10.1109\/TNB.2012.2214233","journal-title":"IEEE Trans. NanoBiosci."},{"issue":"4","key":"1_CR241","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1109\/TCBB.2011.153","volume":"9","author":"H Kim","year":"2012","unstructured":"Kim, H., Gelenbe, E.: Stochastic gene expression modeling with hill function for switch-like gene responses. IEEE\/ACM Trans. Comput. Biol. Bioinform. 9(4), 973\u2013979 (2012). https:\/\/doi.org\/10.1109\/TCBB.2011.153","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"issue":"2","key":"1_CR242","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1504\/IJDMB.2014.064014","volume":"10","author":"H Kim","year":"2014","unstructured":"Kim, H., Park, T., Gelenbe, E.: Identifying disease candidate genes via large-scale gene network analysis. Int. J. Data Mining Bioinform. 10(2), 175\u2013188 (2014). https:\/\/doi.org\/10.1504\/IJDMB.2014.064014","journal-title":"Int. J. Data Mining Bioinform."},{"issue":"2","key":"1_CR243","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1504\/IJDMB.2014.064014","volume":"10","author":"H Kim","year":"2014","unstructured":"Kim, H., Park, T., Gelenbe, E.: Identifying disease candidate genes via large-scale gene network analysis. Int. J. Data Mining Bioinform. 10(2), 175\u2013188 (2014)","journal-title":"Int. J. Data Mining Bioinform."},{"issue":"8","key":"1_CR244","doi-asserted-by":"publisher","first-page":"15387","DOI":"10.3390\/s140815387","volume":"14","author":"A Kokuti","year":"2014","unstructured":"Kokuti, A., Gelenbe, E.: Directional navigation improves opportunistic communication for emergencies. Sensors 14(8), 15387\u201315399 (2014)","journal-title":"Sensors"},{"issue":"12","key":"1_CR245","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1002\/cpe.2997","volume":"25","author":"J Kolodiej","year":"2013","unstructured":"Kolodiej, J., Khan, S., Gelenbe, E., Talbi, E.: Scalable optimization in grid, cloud, and intelligent network computing. Concur. Comput. Pract. Experience 25(12), 1719\u20131721 (2013)","journal-title":"Concur. Comput. Pract. Experience"},{"key":"1_CR246","doi-asserted-by":"crossref","unstructured":"Kulandai, A.D.R., J, S., Rose, J., Schwarz, T.: Balanced gray codes for reduction of bit-flips in phase change memories. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 159\u2013171. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_11"},{"key":"1_CR247","doi-asserted-by":"crossref","unstructured":"Lent, R., Abdelrahman, O.H., Gorbil, G., Gelenbe, E.: Fast message dissemination for emergency communications. In: 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 370\u2013375. IEEE (2010)","DOI":"10.1109\/PERCOMW.2010.5470641"},{"key":"1_CR248","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11902140","volume-title":"Computer and Information Sciences \u2013 ISCIS 2006","year":"2006","unstructured":"Levi, A., Sava\u015f, E., Yenig\u00fcn, H., Balc\u0131soy, S., Sayg\u0131n, Y. (eds.): ISCIS 2006. LNCS, vol. 4263. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11902140"},{"key":"1_CR249","doi-asserted-by":"crossref","unstructured":"Li, J., Mishra, D., Seneviratne, A.: Network traffic classification using wifi sensing. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 48\u201361. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_3"},{"key":"1_CR250","doi-asserted-by":"crossref","unstructured":"Liu, P., Gelenbe, E.: Recursive routing in the cognitive packet network. In: 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, TridentCom 2007, pp. 1\u20136. IEEE (2007)","DOI":"10.1109\/TRIDENTCOM.2007.4444727"},{"key":"1_CR251","doi-asserted-by":"crossref","unstructured":"Mclean, R., Karamollahi, M., Williamson, C.: Measurement and modeling of tumblr traffic. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 237\u2013253. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_16"},{"key":"1_CR252","doi-asserted-by":"crossref","unstructured":"Nalin, M.: The European cross-border health data exchange roadmap: case study in the Italian setting. J. Biomed. Inform. 94, 103183 (2019)","DOI":"10.1016\/j.jbi.2019.103183"},{"issue":"1","key":"1_CR253","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1186\/s12911-018-0664-0","volume":"18","author":"P Natsiavas","year":"2018","unstructured":"Natsiavas, P., et al.: Comprehensive user requirements engineering methodology for secure and interoperable health data exchange. BMC Med. Inform. Decis. Mak. 18(1), 85 (2018)","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"1_CR254","doi-asserted-by":"crossref","unstructured":"Ngai, E.C.H., Gelenbe, E., Humber, G.: Information-aware traffic reduction for wireless sensor networks. In: 2009 IEEE 34th Conference on Local Computer Networks, pp. 451\u2013458. IEEE (2009)","DOI":"10.1109\/LCN.2009.5355166"},{"issue":"6","key":"1_CR255","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1093\/comjnl\/bxm066","volume":"50","author":"G Oeke","year":"2007","unstructured":"Oeke, G., Loukas, G.: A denial of service detector based on maximum likelihood detection and the random neural network. Comput. J. 50(6), 717\u2013727 (2007)","journal-title":"Comput. J."},{"key":"1_CR256","doi-asserted-by":"crossref","unstructured":"Oke, G., Loukas, G., Gelenbe, E.: Detecting denial of service attacks with bayesian classifiers and the random neural network. In: 2007 IEEE International Fuzzy Systems Conference, pp. 1\u20136. IEEE (2007)","DOI":"10.1109\/FUZZY.2007.4295666"},{"key":"1_CR257","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-01604-7_9","volume-title":"Information Sciences and Systems 2013","author":"B Oklander","year":"2013","unstructured":"Oklander, B., Gelenbe, E.: Optimal behaviour of smart wireless users. In: Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2013, pp. 87\u201395. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-01604-7_9"},{"key":"1_CR258","doi-asserted-by":"crossref","unstructured":"\u00d6ren, T.I., Numrich, S.K., Uhrmacher, A.M., Wilson, L.F., Gelenbe, E.: Agent-directed simulation: challenges to meet defense and civilian requirements. In: Proceedings of the 32nd Conference on Winter Simulation, pp. 1757\u20131762. Society For Computer Simulation International (2000)","DOI":"10.1109\/WSC.2000.899166"},{"key":"1_CR259","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-319-68069-9_10","volume-title":"Information Technologies and Mathematical Modelling. Queueing Theory and Applications","author":"E Pankratova","year":"2017","unstructured":"Pankratova, E., Farkhadov, M., Gelenbe, E.: Research of heterogeneous queueing system SM\u2014M$$^{(n)}|\\infty $$. In: Dudin, A., Nazarov, A., Kirpichnikov, A. (eds.) ITMM 2017. CCIS, vol. 800, pp. 122\u2013132. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68069-9_10"},{"key":"1_CR260","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-22635-4_9","volume-title":"Information Sciences and Systems 2015","author":"M Pavloski","year":"2016","unstructured":"Pavloski, M., G\u00f6rbil, G., Gelenbe, E.: Bandwidth usage\u2014based detection of signaling attacks. In: Abdelrahman, O.H., Gelenbe, E., Gorbil, G., Lent, R. (eds.) Information Sciences and Systems 2015. LNEE, vol. 363, pp. 105\u2013114. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-22635-4_9"},{"issue":"1","key":"1_CR261","first-page":"18","volume":"30","author":"B Pernici","year":"2012","unstructured":"Pernici, B., Aiello, M., Vom Brocke, J., Donnellan, B., Gelenbe, E., Kretsis, M.: What is can do for environmental sustainability: a report from CAiSE\u201911 panel on green and sustainable is. Commun. Assoc. Inf. Syst. 30(1), 18 (2012)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"1_CR262","doi-asserted-by":"crossref","unstructured":"Phan, H.T., Stemberg, M.J., Gelenbe, E.: Aligning protein-protein interaction networks using random neural networks. In: 2012 IEEE International Conference on Bioinformatics and Biomedicine, pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/BIBM.2012.6392664"},{"key":"1_CR263","doi-asserted-by":"publisher","unstructured":"Potier, D., Gelenbe, E., Lenfant, J.: Adaptive allocation of central processing unit quanta. J. ACM 23(1), 97\u2013102 (1976). https:\/\/doi.org\/10.1145\/321921.321932","DOI":"10.1145\/321921.321932"},{"key":"1_CR264","doi-asserted-by":"crossref","unstructured":"Qureshi, A., Larijani, H., Ahmad, J., Mtetwa, N.: A novel random neural network based approach for intrusion detection systems. In: 2018 10th Computer Science and Electronic Engineering Conference, CEEC 2018, University of Essex, Colchester, UK, 19\u201321 September 2018, pp. 50\u201355. IEEE (2018). https:\/\/doi.org\/10.1109\/CEEC.2018.8674228","DOI":"10.1109\/CEEC.2018.8674228"},{"key":"1_CR265","doi-asserted-by":"crossref","unstructured":"Radhakrishnan, K., Larijani, H.: Evaluating perceived voice quality on packet networks using different random neural network architectures. Perform. Eval. 68(4), 347\u2013360 (2011). https:\/\/doi.org\/10.1016\/j.peva.2011.01.001","DOI":"10.1016\/j.peva.2011.01.001"},{"key":"1_CR266","doi-asserted-by":"crossref","unstructured":"Robert, S., Zertal, S., Couve, P.: Demonstration of shaman: a flexible framework for auto-tuning hpc systems. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 147\u2013158. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_10"},{"key":"1_CR267","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/11840817_32","volume-title":"Artificial Neural Networks \u2013 ICANN 2006","author":"G Rubino","year":"2006","unstructured":"Rubino, G., Tirilly, P., Varela, M.: Evaluating users\u2019 satisfaction in packet networks using random neural networks. In: Kollias, S.D., Stafylopatis, A., Duch, W., Oja, E. (eds.) ICANN 2006, Part I. LNCS, vol. 4131, pp. 303\u2013312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11840817_32"},{"key":"1_CR268","unstructured":"Sakellari, G., Gelenbe, E.: Adaptive resilience of the cognitive packet network in the presence of network worms. In: Proceedings of the NATO Symposium on C3I for Crisis, Emergency and Consequence Management, pp. 11\u201312 (2009)"},{"key":"1_CR269","unstructured":"Sakellari, G., Hey, L., Gelenbe, E.: Adaptability and failure resilience of the cognitive packet network. In: DemoSession of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, Arizona, USA (2008)"},{"key":"1_CR270","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-1-4471-2155-8_28","volume-title":"Computer and Information Sciences II","author":"G Sakellari","year":"2011","unstructured":"Sakellari, G., Leung, T., Gelenbe, E.: Auction-based admission control for self-aware networks. In: Gelenbe, E., Lent, R., Sakellari, G. (eds.) Computer and Information Sciences II, pp. 223\u2013230. Springer, London (2011). https:\/\/doi.org\/10.1007\/978-1-4471-2155-8_28"},{"key":"1_CR271","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-1-4471-4594-3_7","volume-title":"Computer and Information Sciences III","author":"G Sakellari","year":"2013","unstructured":"Sakellari, G., Morfopoulou, C., Mahmoodi, T., Gelenbe, E.: Using energy criteria to admit flows in a wired network. In: Gelenbe, E., Lent, R. (eds.) Computer and Information Sciences III, pp. 63\u201372. Springer, London (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4594-3_7"},{"key":"1_CR272","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.neucom.2017.08.075","volume":"280","author":"W Serrano","year":"2018","unstructured":"Serrano, W., Gelenbe, E.: The random neural network in a neurocomputing application for web search. Neurocomputing 280, 123\u2013134 (2018)","journal-title":"Neurocomputing"},{"key":"1_CR273","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.neucom.2018.07.101","volume":"396","author":"W Serrano","year":"2020","unstructured":"Serrano, W., Gelenbe, E.: Deep learning clusters in the cognitive packet network. Neurocomputing 396, 406\u2013428 (2020)","journal-title":"Neurocomputing"},{"key":"1_CR274","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.neucom.2018.05.134","volume":"396","author":"W Serrano","year":"2020","unstructured":"Serrano, W., Gelenbe, E., Yin, Y.: The random neural network with deep learning clusters in smart search. Neurocomputing 396, 394\u2013405 (2020)","journal-title":"Neurocomputing"},{"key":"1_CR275","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-319-95189-8_13","volume-title":"Security in Computer and Information Sciences","author":"M Siavvas","year":"2018","unstructured":"Siavvas, M., Gelenbe, E., Kehagias, D., Tzovaras, D.: static analysis-based approaches for\u00a0secure software development. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 142\u2013157. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95189-8_13"},{"key":"1_CR276","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-319-95189-8_2","volume-title":"Security in Computer and Information Sciences","author":"M Staffa","year":"2018","unstructured":"Staffa, M., et al.: KONFIDO: an OpenNCP-based secure eHealth data exchange system. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 11\u201327. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95189-8_2"},{"key":"1_CR277","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.jnca.2018.05.012","volume":"116","author":"M Staffa","year":"2018","unstructured":"Staffa, M., et al.: An openNCP-based solution for secure eHealth data exchange. J. Netw. Comput. Appl. 116, 65\u201385 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"1_CR278","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.neucom.2009.02.023","volume":"73","author":"S Timotheou","year":"2009","unstructured":"Timotheou, S.: A novel weight initialization method for the random neural network. Neurocomputing 73(2), 160\u2013168 (2009)","journal-title":"Neurocomputing"},{"key":"1_CR279","doi-asserted-by":"crossref","unstructured":"Tomak, J., Gorlatch, S.: Measuring performance of fault management in a legacy system: An alarm system study. In: Calzarossa, M.C., et al. (eds.) MASCOTS 2020. LNCS, vol. 12527, pp. 129\u2013146. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68110-4_9"},{"key":"1_CR280","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-13541-5_5","volume-title":"Agent and Multi-Agent Systems: Technologies and Applications","author":"K Velan","year":"2010","unstructured":"Velan, K., Gelenbe, E.: Analysing bidder performance in randomised and fixed-deadline automated auctions. In: J\u0119drzejowicz, P., Nguyen, N.T., Howlet, R.J., Jain, L.C. (eds.) KES-AMSTA 2010. LNCS (LNAI), vol. 6071, pp. 42\u201351. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13541-5_5"},{"key":"1_CR281","doi-asserted-by":"crossref","unstructured":"Wang, L., Brun, O., Gelenbe, E.: Adaptive workload distribution for local and remote clouds. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 003984\u2013003988. IEEE (2016)","DOI":"10.1109\/SMC.2016.7844856"},{"key":"1_CR282","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-09465-6_4","volume-title":"Information Sciences and Systems 2014","author":"L Wang","year":"2014","unstructured":"Wang, L., Gelenbe, E.: An implementation of voice over IP in the cognitive packet network. In: Czach\u00f3rski, T., Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2014, pp. 33\u201340. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-09465-6_4"},{"issue":"1","key":"1_CR283","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/TCC.2015.2474406","volume":"6","author":"L Wang","year":"2018","unstructured":"Wang, L., Gelenbe, E.: Adaptive dispatching of tasks in the cloud. IEEE Trans. Cloud Comput. 6(1), 33\u201345 (2018)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"1_CR284","unstructured":"Witkowski, M., White, G., Louvieris, P., Gorbil, G., Gelenbe, E., Dodd, L.: High-level information fusion and mission planning in highly anisotropic threat spaces. In: 2008 11th International Conference on Information Fusion, pp. 1\u20138. IEEE (2008)"},{"key":"1_CR285","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b14229","volume-title":"Computer and Information Sciences - ISCIS 2003","year":"2003","unstructured":"Yaz\u0131c\u0131, A., \u015eener, C. (eds.): ISCIS 2003. LNCS, vol. 2869. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/b14229"},{"key":"1_CR286","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11569596","volume-title":"Computer and Information Sciences - ISCIS 2005","year":"2005","unstructured":"Yolum, I., G\u00fcng\u00f6r, T., G\u00fcrgen, F., \u00d6zturan, C. (eds.): ISCIS 2005. LNCS, vol. 3733. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11569596"},{"issue":"1","key":"1_CR287","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TIFS.2013.2291326","volume":"9","author":"CM Yu","year":"2014","unstructured":"Yu, C.M., Ni, G.K., Chen, I.Y., Gelenbe, E., Kuo, S.Y.: Top-k query result completeness verification in tiered sensor networks. IEEE Trans. Inf. Forensics Secur. 9(1), 109\u2013124 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"1_CR288","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.peva.2007.10.001","volume":"65","author":"Q Zhu","year":"2008","unstructured":"Zhu, Q., Gelenbe, E., Qiao, Y.: Adaptive prefetching algorithm in disk controllers. Perform. Eval. 65(5), 382\u2013395 (2008)","journal-title":"Perform. Eval."}],"container-title":["Lecture Notes in Computer Science","Modelling, Analysis, and Simulation of Computer and Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68110-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T03:34:30Z","timestamp":1724384070000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-68110-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030681098","9783030681104"],"references-count":288,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68110-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"29 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MASCOTS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mascots2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mascots.iitis.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}