{"id":239,"date":"2020-10-02T14:31:38","date_gmt":"2020-10-02T18:31:38","guid":{"rendered":"https:\/\/carleton.ca\/rads\/?page_id=239"},"modified":"2026-03-16T14:31:07","modified_gmt":"2026-03-16T18:31:07","slug":"publications-2019-2020","status":"publish","type":"page","link":"https:\/\/carleton.ca\/rads\/publications-2019-2020\/","title":{"rendered":"Publications 2019-2020"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Publications 2019-2020\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<h2 id=\"2019-2020\" class=\"wp-block-heading\">2019-2020<\/h2>\n\n\n\n<h3 id=\"journal-publications\" class=\"wp-block-heading\">Journal Publications<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>C.-H. Lung, Y. Qiu, S. Ajila, P. Srivastava, \u201cExperimental Evaluation of LXC Container Migration for Cloudlets Using Multipath TCP\u201d, Computer Networks, Vol. 164, pp 1 \u2013 14, December 9, 2019.<\/li>\n\n\n\n<li>Y. Cao, C.-H. Lung, S.Ajila, X.Li, \u201cSupport Mechanisms for Cloud Configuration Using XML Filtering Techniques: a Case Study in SaaS\u201d Future Generation Computer Systems (FGCS), Vol. 39, June 2019, pp 52-67.<\/li>\n\n\n\n<li>A. Das, S. Ajila, C.-H. Lung, \u201cA Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection\u201d, IFIP International Federation for Information Processing 2020, Published by Springer Nature Switzerland AG 2020, S. Boumerdassi et al. (Eds.): MLN 2019, LNCS 12081, pp. 40\u201357,<\/li>\n\n\n\n<li>T. Kunz, S. Ngozi Echegini, B Esfandiari, \u201cA P2P Approach to Routing in Hierarchical MANETs\u201d, to appear in Communications and Network, Scientific Research Publishing, 2020.<\/li>\n\n\n\n<li>M.R. Alam, M. St-Hilaire, T. Kunz, \u201cTowards optimal planning and scheduling in smart homes\u201d, Smart Grid and Renewable Energy, Vol. 10, No. 7, pages 179-202, July 2019.<\/li>\n\n\n\n<li>A. Cormier, F. Gagnon, B. Esfandiari, T. Kunz, \u201cApproaches to Securing P2PSIP in Manets\u201d, in E-Business and Telecommunications, (eds: Mohammad S. Obaidat and E. Cabello), invited extended paper from DCNET2017, pages 38-62, Springer 2019.<\/li>\n\n\n\n<li>Z. Zhang, C.-H. Lung, M. St-Hilaire, I. Lambadaris, \u201cSmart Proactive Caching: Empower the Video Delivery for Autonomous Vehicles in ICN-based Networks\u201d, IEEE Transactions on Vehicular Technology, Volume Volume: 69, Issue: 7, July 2020, pp. 7955\u20137965.<\/li>\n\n\n\n<li>Y. Cai, G.O.M. Yee, Y. Gu, C.-H. Lung, \u201cThreats to Online Advertising and Countermeasures: A Technical Survey\u201d, Digital Threats: Research and Practice, Article 11, May 2020, pp. 1\u201327<\/li>\n\n\n\n<li>D. Luzuriaga, C.-H. Lung and M. Funmilayo, \u201cSoftware-Based Video-Audio Production Mixer via an IP Network\u201d, IEEE ACCESS, Jan 2020, pp. 11456 \u2013 11468.<\/li>\n\n\n\n<li>Z. Zhang, C.-H. Lung, M. St-Hilaire, I. Lambadaris, \u201cAn SDN-based Caching Decision Policy for Video Caching in Information-centric Networking\u201d, IEEE Transactions on Multimedia, Aug. 2019, pp. 1\u201315.<\/li>\n\n\n\n<li>R. Elhabyan, W. Shi, W., M. St-Hilaire, \u201cA Coverage and Obstacle-aware Clustering Protocol for Wireless Sensor Networks in 3D Terrain\u201d, Elsevier\u2019s Journal of Computer Communications, 2019, vol. 146, pp. 48-54.<\/li>\n\n\n\n<li>R. Elhabyan, W. Shi, M, St-Hilaire, \u201cCoverage Protocols for Wireless Sensor Networks: Review and Future Directions\u201d, Journal of Communications and Networks (JCN). vol. 21, no. 1, pp. 45-60, February 2019.<\/li>\n\n\n\n<li>M.R. Alam, M. R., M. St-Hilaire, T. Kunz, \u201cTowards Optimal Planning and Scheduling in Smart Homes\u201d, Smart Grid and Renewable Energy, vol. 10, no 7, pp. 179-202, July 2019.<\/li>\n\n\n\n<li>F.F. Firouzeh, J.W. Chinneck, and S. Rajan (2020), \u201cMaximum Feasible Subsystem Algorithms for Recovery of Compressively Sensed Speech\u201d, IEEE Access, vol. 8, pp. 82539-82550, 2020.<\/li>\n\n\n\n<li>K. Al-Zoubi, G. Wainer, \u201cFog and Cloud Collaboration to Perform Virtual Simulation Experiments\u201d, Simulation, Practice and Experience, Vol. 101, May 2020.<\/li>\n\n\n\n<li>M. Tavanpour, B. Kazi, G. Wainer, \u201cDiscrete Event Systems Specifications for Modeling and Simulation of Wireless Networking Applications\u201d, Journal of Simulation, Taylor and Francis, Accepted for publication: March 2020.<\/li>\n\n\n\n<li>A. Magalhaes, M. Reis, G. Wainer, W. Calixto, \u201cParametric regression applied for determination of electrical parameters of synchronous and induction generators operating in parallel on the electrical energy repowering system\u201d, Journal of Control, Automation and Electrical Systems \u2013 Springer, In Press. 2020.<\/li>\n\n\n\n<li>H. Khalil, G. Wainer. \u201cCell-DEVS for Social Phenomena Modelling\u201d, IEEE Transactions on Computational Social Sciences, Accepted for Publication: March 2020.<\/li>\n\n\n\n<li>M. Moallemi, G. Wainer, \u201cDesigning Real-Time Systems Using Imprecise Discrete-Event System Specifications\u201d, Software Practice and Experience (Wiley), Accepted for Publication: March 2020.<\/li>\n\n\n\n<li>A. Magalhaes, M. Reis, G. Wainer, W. Calixto, \u201cExperimental study of induction generator as a repowering solution\u201d, Intl. Transactions on Electrical Energy Systems, Wiley, In Press, First Published: February 2020.<\/li>\n\n\n\n<li>B. Kazi, G. Wainer, \u201cCoordinated Multi-Cell Cooperation with User Centric Dynamic Coordination Station\u201d, Computer Networks, Elsevier. Volume 166, 15. pp. 1-14, January 2020.<\/li>\n\n\n\n<li>M. Rodrigues da Cunha, V. Margarida Gomes, F. dos Santos, G. Wainer, W. Pacheco Calixto. \u201cOptimized techniques for driving and control of the switched reluctance motor to improve efficiency New Method and Apparatus for 3-D Mapping of Soil Electrical Conductivity\u201d, Control Engineering Practice, Elsevier, vol. 90, Issue: 70, pp. 1-19. September 2019.<\/li>\n\n\n\n<li>A. Al-Habashna, G. Wainer, \u201cQoE awareness in Progressive Caching and DASH-based D2D Video Streaming in Cellular Networks\u201d, Wireless Networks, Vol. 26, June 2019.<\/li>\n\n\n\n<li>V. Gomes, J. Paiva, M. Reis, G. Wainer, W. Calixto. Complexity \u201cMechanism for Measuring System Complexity Applying Sensitivity Analysis\u201d, Complexity, Vol. 2019, Article ID 1303241 April 2019.<\/li>\n\n\n\n<li>B. Kazi, G. Wainer, \u201cNext Generation Wireless Cellular Networks: Ultra-Dense Multi-Tier and Multi-Cell Cooperation Perspective\u201d, Wireless Networks, Elsevier, Vol. 25 No. 4: 2041-2064, 2019.<\/li>\n\n\n\n<li>G.O.M. Yee, \u201cVerified Metrics for Continuous Active Defence\u201d, International Journal on Advances in Security, Vol. 12, no. 3&amp;4, pp. 153-163, 2019.<\/li>\n\n\n\n<li>Q. Rouland, B. Hamid, J., Jaskolka. \u201cFormal specification and verification of reusable communication models for distributed systems architecture\u201d, Future Generation Computer Systems, 108:178\u2013197, July 2020.<\/li>\n\n\n\n<li>M. Buyse, J. Jaskolka, \u201cFormal specification and verification of reusable communication models for distributed systems architecture\u201d, Archive of Formal Proofs, p. 22, August 2019.<\/li>\n\n\n\n<li>Z. Jahedi, T. Kunz, \u201cOptimal VNF placement: Addressing multiple min-cost solutions\u201d, in E-Business and Telecommunications, Mohammad S. Obaidat (editor), invited extended paper from DCNET2018, pages 1-23, Springer 2019.<\/li>\n\n\n\n<li>A. Raoof, A. Matrawy, C.H. Lung, \u201cRouting Attacks and Mitigation Methods for RPL-Based Internet of Things\u201d, IEEE Communications Surveys and Tutorials, vol. 21, no. 2, 2nd Quarter 2019, pp. 1582\u20131606.<\/li>\n\n\n\n<li>P. Garcia, F. Darroch, L. West, L. Brooks, L. Cleator, \u201cEthical Applications of Big Data-Driven AI on Social Systems: Literature Analysis and Example Deployment Use Case\u201d, Information 2020, 11, 235.<\/li>\n\n\n\n<li>R. Stewart, B. Berthomieu, P. Garcia, I. Ibrahim, G. Michaelson, A. Wallace, \u201cVerifying parallel dataflow transformations with model checking and its application to FPGAs\u201d, Journal of Systems Architecture, Vol. 101, 2019.<\/li>\n\n\n\n<li>Z. Wang, T. Ji, Z. Tian, B. Fang, Q. Ruan, H. Wang, W. Shi, \u201cAFLPro: Direction Sensitive Fuzzing\u201d, Elsevier\u2019s Journal of Information Security and Applications. Volume 54, October 2020.<\/li>\n\n\n\n<li>D. Wu, D., W. Shi, X. Ma, \u201cA Novel Real-time Anti-Spam Framework\u201d, ACM Transactions on Internet of Things (ACM-TIOT), 2020, In press.<\/li>\n\n\n\n<li>W.L. Croft, J.-R.Sack, W. Shi, \u201cDifferential Privacy via a Truncated and Normalized Laplace Mechanism\u201d, Journal of Computer Science and Technology (Springer), 2020.<\/li>\n\n\n\n<li>X. Ma, W. Shi, \u201cAESMOTE: Adversarial Reinforcement Learning with SMOTE for Anomaly Detection\u201d, IEEE Transactions on Network Science and Engineering (accepted), 2020.<\/li>\n\n\n\n<li>D. Xu, Z. Tian, R. Lai, X. Kong, Z. Tan, W. Shi, \u201cDeep Learning Based Emotional Analysis of Microblog Texts\u201d, Information Fusion (accepted), 2020.<\/li>\n\n\n\n<li>K. Yu, W. Shi, N. Santoro, \u201cDesigning a Streaming Algorithm for Outlier Detection in Data Mining: An Incremental Approach\u201d, Journal of Sensors, March 2020; 20(5): 1261.<\/li>\n\n\n\n<li>D. Xu, X. Kong, Z. Chen Z., Z. Tian, W. Shi, \u201cMulti-candidate Voting Model Based on Blockchain\u201d, Transactions on Blockchain Technology and Applications, 2020, In press.<\/li>\n\n\n\n<li>Z. Wang, Y. Zhang, Z. Tian, Q. Ruan, T. Liu, H. Wang, Z. Liu, J. Lin, B. Fang, B., W. Shi, \u201cAutomated Vulnerability Discovery and Exploitation in the Internet of Things\u201d, Journal of Sensors \u2013 Special Issues on Advanced Intrusion Detection &amp; Mitigation Systems in Wireless Sensor Network, July 2019.<\/li>\n\n\n\n<li>Z. Tian, W. Shi, Z. Tan, J. Qiu, Y. Sun, F. Jiang, \u201cDeep Learning and Dempster-Shafer Theory Based Insider Threat Detection\u201d, ACM\/Springer Journal of Mobile Networks and Applications, In press.<\/li>\n\n\n\n<li>W. Han, Z. Tian, W. Shi, Z. Huang, S. Li, \u201cLow-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things\u201d, 2019 Journal of Sensors (Special Issue on Intelligent Systems in Sensor Networks and Internet of Things), 19(12), 2804, June 2019.<\/li>\n\n\n\n<li>Y. Sun, M. Li, S. Su, Z. Tian, Z, W. Shi, M. Han, \u201cSecure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets\u201d, ACM\/Springer Mobile Networks and Applications, 2019.<\/li>\n\n\n\n<li>Z. Gu, Y. Wang, W. Shi, Z. Tian, K. Ren, F.C.M. Lau, \u201cA Practical Neighbor Discovery Framework for Wireless Sensor Networks\u201d, Journal of Sensors, 19(8), 1887, 2019.<\/li>\n\n\n\n<li>Z. Tian, W. Shi, \u201cReal-time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment\u201d, IEEE Transactions on Industrial Informatics, Volume: 15, Issue: 7, pp. 4285-4294, July 2019.<\/li>\n<\/ol>\n\n\n\n<h3 id=\"book-chapters\" class=\"wp-block-heading\">Book Chapters<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>C. Ruiz-Martin, G. Wainer, \u201cDEVS formal modeling and simulation in Manufacturing Systems\u201d In Applied Simulation and Optimization. Vol.3: Innovative Applications In Logistics, Industrial, and Aeronautical Practice, (eds.: M. Mujica Mota, I. Flores, G. Wainer), Springer, 2019.<\/li>\n\n\n\n<li>G. Wainer. \u201cConverting high level models into DEVS modeling and simulation applications\u201d, In Summer of Simulation \u2013 50 Years of Seminal Computing Research (eds: J. Sokolowski, U. Durak Nav Mustafee, A. Tolk), Springer, 2019.<\/li>\n\n\n\n<li>G. Wainer, A. Al-Habashna, \u201cAn introduction to pedestrian modeling using spatial discrete-event modeling and simulation\u201d, In Summer of Simulation \u2013 50 Years of Seminal Computing Research, (eds: J. Sokolowski, U. Durak Nav Mustafee, A. Tolk), Springer, 2019.<\/li>\n\n\n\n<li>U. Durak, A. D\u2019Ambrogio, A. Tolk, G. Wainer, S. Diallo, G. Zacharewicz, J-L. Risco Martin, J. Barhak, R. Huntsinger and M. Raunak, \u201c50 Summers of Computer Simulation\u201d, In Summer of Simulation \u2013 50 Years of Seminal Computing Research. (eds: J. Sokolowski, U. Durak Nav Mustafee, A. Tolk Eds), Springer, 2019.<\/li>\n\n\n\n<li>E. Markou, W. Shi, \u201cDangerous Graphs\u201d, In Distributed Computing by Mobile Entities (eds: P. Flocchini, G. Prencipe, N. Santoro), LNCS 11340, Springer, 2019, pp. 455-515.<\/li>\n<\/ol>\n\n\n\n<h3 id=\"conference-publications\" class=\"wp-block-heading\">Conference Publications<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>J.-D. Medjo Me Biomo, T. Kunz, M. St-Hilaire, \u201cMBA-DbMAC: A random-access MAC protocol for MBAs\u201d, Proceedings of the 11th EAI International Conference on Ad Hoc Networks (AdHocNets 2019), Queenstown, New Zealand, November 2019.<\/li>\n\n\n\n<li>O. Ashour, T. Kunz, M. St-Hilaire, M. Wang, \u201cA survey of applying reinforcement learning techniques to multicast routing\u201d, Proceedings of the 10th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON 2019), New York, USA, November 2019.<\/li>\n\n\n\n<li>A. Das, S. Ajila, C.-H. Lung, \u201cA Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection\u201d, 2nd IFIP International Conference on Machine Learning for Networking (MLN), Dec. 2019.<\/li>\n\n\n\n<li>S. Macwan, C.-H. Lung, \u201cInvestigation of Moving Target Defense Technique to Prevent Poisoning Attacks in SDN\u201d, Proc. of the 1st IEEE Services Workshop on Networks Services, in collaboration with IEEE Big Data Congress, Milan, Italy, pp. 178\u2013183, July 2019.<\/li>\n\n\n\n<li>M. Rahman, A. G. Quraishi, C.-H. Lung, \u201cDDoS Attacks Detection and Mitigation in SDN using Machine Learning\u201d, Proc. of the 1st IEEE Services Workshop on Networks Services, in collaboration with IEEE Big Data Congress, Milan, Italy, pp. 184\u2013189, July 2019.<\/li>\n\n\n\n<li>J. Singh, M. St-Hilaire, S. Majumdar, J. Kurosky, S. Weng, \u201cA Proactive System to Allocate Virtual Machines in Clouds using Autoregression\u201d, 29th Annual International Conference on Computer Science and Software Engineering (CASCON 2019), Toronto, Canada, November 2019.<\/li>\n\n\n\n<li>Z. Zhang, C.-H. Lung, M. St-Hilaire, I. lambadaris, \u201cSmart Caching: Empower the Video Delivery for 5G-ICN Networks\u201d, IEEE International Conference on Communications (ICC), pp. 1-7, Shanghai, China, May 2019.<\/li>\n\n\n\n<li>A.K. Mohindeen, S. Majumdar, M. St-Hilaire, A. El-Haraki, \u201cGraph-Based Indexing Technique to Enhance the Performance of Boolean AND Queries in Big Data Systems\u201d, Proc. IEEE\/ACM Intl. Conference on Cluster, Cloud and Grid Computing, Melbourne, Australia, May 2020.<\/li>\n\n\n\n<li>G. Wainer, A. Al-Habashna, \u201cStudying Malware Propagation in Wireless Sensor Networks with Cell-DEVS\u201d, Spring Simulation Conference, Fairfax, VA., 2020.<\/li>\n\n\n\n<li>G. Wainer, A. Singh, \u201cA Model Library For Finite State Machines In Cadmium\u201d, A. Shaw, SCS\/ACM\/IEEE Theory of Modeling and Simulation (TMS-DEVS), Fairfax, VA., 2020.<\/li>\n\n\n\n<li>G. Wainer, \u201cStrategic Airlift Operationalizing Constructive Simulations\u201d, R. Barwell, SCS\/ACM\/IEEE Annual Simulation Symposium (ANSS), Fairfax, VA., 2020.<\/li>\n\n\n\n<li>C. Ruiz-Martin, G. Wainer, K. Bjornson, B. Earle, \u201cDevelopment Of A Real-Time DEVS Kernel: RT-Cadmium\u201d, SCS\/ACM\/IEEE Spring Simulation Conference, Fairfax, VA., 2020.<\/li>\n\n\n\n<li>C. Ruiz-Martin, A. Lopez-Paredes, G. Wainer. \u201cStudying Communications Resiliency In Emergency Plans\u201d, SCS\/ACM\/IEEE Spring Simulation Conference. Fairfax, VA., 2020.<\/li>\n\n\n\n<li>J. Lanuza, G. Trabes, G. Wainer, \u201cParallel Execution Of DEVS In Shared-Memory Multicore Architectures\u201d, SCS\/ACM\/IEEE Spring Simulation Conference. Fairfax, VA., 2020.<\/li>\n\n\n\n<li>G. Wainer, J. Boi-Ukeme, \u201cA Framework For The Extension Of DEVS With Sensor Fusion Capabilities\u201d, SCS\/ACM\/IEEE Spring Simulation Conference. Fairfax, VA., 2020.<\/li>\n\n\n\n<li>A. Al-Habashna, V. Subashini, N. Arellano, C. Ruiz-Martin, G. Wainer, S. Fai, L. O\u2019Brien. \u201cIndoor Localization and Building Occupancy Count Estimation using LTE-A Ultra-Dense Networks Symposium on Simulation\u201d, in Architecture and Urban Design (SimAUD 2020). Vienna, Austria, 2020.<\/li>\n\n\n\n<li>A. Vicino, L. Belolli, C. Ruiz-Martin, G. Wainer, \u201cBuilding DEVS Models with the Cadmium Tool\u201d, Proceedings of Winter Simulation Conference, National Harbor, MD., 2019.<\/li>\n\n\n\n<li>G. Wainer, \u201cAn Introduction to Cellular Automata Models with Cell-DEVS\u201d, Winter Simulation Conference, National Harbor, MD., 2019.<\/li>\n\n\n\n<li>A. Vicino, G. Trabes, G. Wainer, \u201cNew Datatypes to Represent Time in Discrete-event Simulation\u201d, Winter Simulation Conference, National Harbor, MD., 2019.<\/li>\n\n\n\n<li>G. Wainer. \u201cApplying Modelling and Simulation for Development of Embedded Systems\u201d, Proceedings of SummerSim 2019, Berlin, Germany.<\/li>\n\n\n\n<li>B. St-Aubin, E. Yammine, M. Nayef, G. Wainer, \u201cAnalytics And Visualization Of Spatial Models As A Service\u201d, Proceedings of SummerSim 2019, Berlin, Germany.<\/li>\n\n\n\n<li>G. Trabes, I. Oyelowo, M. Dan\u2019gana, G. Wainer. \u201cCellular Discrete-Event Models For Social Systems\u201d, Proceedings of SummerSim 2019, Berlin, Germany.<\/li>\n\n\n\n<li>G. Wainer, \u201cTraffic Modeling and Simulation: a DEVS library\u201d, Proceedings of SummerSim 2019, Berlin, Germany.<\/li>\n\n\n\n<li>B. Earle, J. B. Ukeme, G. Wainer, A. Davoust, P. Gavigan, K. Bjornson, \u201cDesign And Implementation Of A Building Control System In Embedded-DEVSP\u201d, Proceedings of Symposium on Theory of Modeling and Simulation, Tucson AZ. 2019.<\/li>\n\n\n\n<li>C. Ruiz-Martin, G, Trabes, B. Esfandiari, G. Wainer, J. James, \u201cAn Architecture for Integrating BDI Agents with a Simulation Environment\u201d, EMAS-2019. LNAI vol. 12058. Montr\u00e9al, QC. 2019.<\/li>\n\n\n\n<li>B. St-Aubin, G. Wainer, \u201cA Cell-DEVS Model For Logistic Urban Growth\u201d, Proceedings of Annual Simulation Symposium, Tucson AZ. 2019.<\/li>\n\n\n\n<li>S. Janapalli, O. Hesham, G. Wainer. \u201cHeterogeneous Crowd Simulation\u201d, Proceedings of Annual Simulation Symposium, Tucson AZ. 2019.<\/li>\n\n\n\n<li>A. Al-Habashna, L. Belolli, C. Ruiz-Mart\u00edn, G. Wainer, \u201cControl of a Quadcopter Application With DEVS\u201d, Proceedings of Symposium on Theory of Modeling and Simulation, Tucson AZ. 2019.<\/li>\n\n\n\n<li>A. Al-Habashna, C. Ruiz-Mart\u00edn, G. Wainer, \u201cAnalyzing The Impact Of Quantum Size On The Accuracy And Performance Of Cell-DEVS Fire Models\u201d, Proceedings of Symposium on Theory of Modeling and Simulation, Tucson AZ. 2019.<\/li>\n\n\n\n<li>A. Onyedinma, P. Gavigan, B. Esfandiari, \u201cToward Campus Mail Delivery using BDI\u201d, in: Proceedings of the First Workshop on Agents and Robots for reliable Engineered Autonomy (AREA 2020), 4th September 2020, Electronic Proceedings in Theoretical Computer Science 319, pp. 127\u2013143. Published: 23rd July 2020.<\/li>\n\n\n\n<li>A. Peters, B. Esfandiari, R. West, \u201cCharacterizing Human vs Machine GamePlay in StarCraft II\u201d, to appear in Proceedings of 18th International Conference on Cognitive Modelling (ICCM 2020).<\/li>\n\n\n\n<li>T. Highstead, B. Esfandiari, R. West, \u201cEthical Test-Driven Development: A Design Process for Building Ethical AI\u201d, to appear in Proceedings of 18th International Conference on Cognitive Modelling (ICCM 2020).<\/li>\n\n\n\n<li>M. Vezina, B. Esfandiari, \u201cThe Requirement Gatherers\u2019 Approach to the 2019 Multi-Agent Programming Contest Scenario\u201d, to appear in LNAI Challenges Series, Springer, 2020.<\/li>\n\n\n\n<li>A. Peters, B. Esfandiari, A. Gunaratne and R. L. West, \u201cBehavioral Cloning in OpenAI using Case-Based Reasoning\u201d, in Proceedings of Adaptive and Learning Agents (ALA 2019), May 2019, Montreal, Canada.<\/li>\n\n\n\n<li>C. Peters, T.C. Stewart, R.L. West and B. Esfandiari, \u201cDynamic Action Selection in OpenAI using Spiking Neural Networks\u201d, in Proceedings of 32nd International Florida Artificial Intelligence Research Society Conference (FLAIRS-32), 19-22 May 2019, Sarasota, Florida, AAAI Press 2019, pp. 318-323.<\/li>\n\n\n\n<li>F. F. Firouzeh, S. Rajan and J. W. Chinneck, \u201cMAXimum Feasible Subsystem Recovery of Compressed ECG Signals\u201d, 2020 IEEE International Symposium on Medical Measurements and Applications (MeMeA), Bari, Italy, 2020, pp. 1-6<\/li>\n\n\n\n<li>37. M. Raithatha, A.U. Chaudhry, R.H.M. Hafez, and J.W. Chinneck , \u201cLocating Gateways for Maximizing Backhaul Network Capacity of 5G Ultra-Dense Networks\u201d, WTS 2020 Conference, April 22-24, 2020 in Washington DC, USA<\/li>\n\n\n\n<li>B. Al Shboul, D. C. Petriu. 2019. \u201cPattern-based transformation of SysML Models into Fault Tree models, In Proceedings of CASCON\u20192019, Toronto, ON, Canada, November 4-6, 2019.<\/li>\n\n\n\n<li>G.O.M. Yee, \u201cModeling and reducing the attack surface in software systems\u201d, Proceedings of the 11th International Workshop on Modelling in Software Engineering (MiSE \u201919), Montreal, Canada, pp. 55-62, May 2019.<\/li>\n\n\n\n<li>G.O.M. Yee, \u201cAttack Surface Identification and Reduction Model Applied in Scrum\u201d, Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, United Kingdom, pp. 1-8, June 2019.<\/li>\n\n\n\n<li>G.O.M. Yee, \u201cDesigning Good Security Metrics\u201d, Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA, pp. 580-585, July 2019.<\/li>\n\n\n\n<li>G.O.M. Yee, \u201cReducing the Attack Surface for Private Data\u201d, Proceedings of the Thirteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2019), Nice, France, pp. 28-34, October 2019.<\/li>\n\n\n\n<li>G.O.M. Yee, \u201cTowards the Intelligent Application of Security Controls\u201d, Proceedings of the 2020 Annual Reliability and Maintainability Symposium (RAMS), Palm Springs, CA, USA, pp. 1-6, January 2020.<\/li>\n\n\n\n<li>B. Hamid, Q. Rouland, J. Jaskolka, \u201cDistributed maintenance of a spanning tree of k-connected graphs\u201d, In Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, pages 217\u2013226,Kyoto, Japan, December 2019.<\/li>\n\n\n\n<li>W.A. Gelil, T. Kunz, \u201cA hierarchical P2P overlay for hierarchical mobile ad hoc networks (MANETs)\u201d, Proceedings of the 10th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON 2019), New York, USA, November 2019.<\/li>\n\n\n\n<li>M.O. Farooq, T. Kunz, \u201cRevealing insights for improvements in LoRaWAN in multiple applications scenarios\u201d, Poster, 17th ACM Conference on Embedded Networked Sensor Systems (SenSys 2019), New York, USA, November 2019<\/li>\n\n\n\n<li>I. Frye, P. Garcia, \u201cTowards a Programming Paradigm for Reconfigurable Computing: Asynchronous Graph Programming\u201c, 2020 IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)<\/li>\n\n\n\n<li>R. Fife, I. Udoh, P. Garcia, \u201cCoherency overhead of Processing-in-Memory in the presence of shared data\u201d, 2020 IEEE International Conference on Industrial Technology (ICIT).<\/li>\n\n\n\n<li>S. Dewan, P. Garcia, \u201cProgramming Abstractions for Configurable Hardware: Survey and Research Directions\u201d, The 2020 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020.<\/li>\n\n\n\n<li>V. Venkataramanachary, E. Reveron, W. Shi, \u201cStorage and Rack Sensitive Replica Placement Algorithm for Distributed Platform with Data as Files\u201d, Proceedings of the 11th International Conference on Communication Systems &amp; Networks. (COMSNETS 2020). pp. 535-538. Jan 7-11, 2020, Bengaluru, India.<\/li>\n\n\n\n<li>I. Tang, S. Liao, A. Bhuiyan, W. Shi, \u201cSecrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks\u201d, Proceedings of the 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2019), pp. 3-17. Nov 5, 2019. Guangzhou, China.<\/li>\n\n\n\n<li>W. Ou, M. Deng, E. Luo, W. Shi, W., Z. Tan, M. Bhuiyan, \u201cMultiminer\u2019s Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method\u201d, Proceedings of the 2019 IEEE International Conference on Cyber Physical and Social Computing (CPSCom-2019), pp. 687-693. July 14-17, 2019. Atlanta, USA.<\/li>\n\n\n\n<li>W.L. Croft, J. Sack, W. Shi, \u201cDifferentially Private Obfuscation of Facial Images\u201d, Proceedings of the International IFIP Cross Domain Conference for Machine Learning &amp; Knowledge Extraction (CD-MAKE). pp. 229-249. Canterbury, UK, August 2019.<\/li>\n\n\n\n<li>I. Yu, W. Shi, N. Santoro, X. Ma, \u201cReal-time Outlier Detection over Streaming Data\u201d, Proceedings of the IEEE Smart World Congress (SWC 2019). pp. 125-132. August 19-23, 2019. Leicester, UK.<\/li>\n\n\n\n<li>M. Vbraski, M., Bolic, S. Majumdar, \u201cA Performance Driven Micro Services- Based Architecture\/System for Analyzing Noisy IoT Data\u201d, Proc. IEEE\/ACM Intl. Conference on Cluster, Cloud and Grid Computing (Doctoral Symp.), Larnaka (Cyprus), May 2019.<\/li>\n\n\n\n<li>T. Ajila, S. Majumdar, \u201cData Driven Priority Scheduling on a Spark Streaming System\u201d, IEEE\/ACM Intl. Conference on Cluster, Cloud and Grid Computing (4th IEEE\/ACM International Workshop on Distributed Big Data Management) Larnaka (Cyprus), May 2019.<\/li>\n<\/ol>\n\n\n\n<h3 id=\"non-refereed-technical-reports\" class=\"wp-block-heading\">Non-Refereed Technical Reports<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>B. Singh, R. Kaur, C.M. Woodside, and J.W. Chinneck (2019), \u201cLow-Power Deployment of Many-Process Applications on Multiple Clouds\u201d, Les Cahiers du GERAD G-2019-101. https:\/\/www.gerad.ca\/en\/papers\/G-2019-101.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>2019-2020 Journal Publications Book Chapters Conference Publications Non-Refereed Technical Reports<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[28],"class_list":["post-239","page","type-page","status-publish","hentry","cu_page_type-publications"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/pages\/239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":2,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/pages\/239\/revisions"}],"predecessor-version":[{"id":410,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/pages\/239\/revisions\/410"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/media?parent=239"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/rads\/wp-json\/wp\/v2\/cu_page_type?post=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}