Rose F. Gamble

According to our database1, Rose F. Gamble authored at least 138 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Editorial: Understanding and engineering cyber-physical collectives.
Frontiers Robotics AI, 2024

Knowledge Core: An SCEP Architecture for Smart Installations with Organization-Defined Policies.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
An Architectural Design to Address the Impact of Adaptations on Intrusion Detection Systems.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Threat Intelligence Sharing Component in the Service Mesh Architecture.
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023

A Runtime Trust Evaluation Mechanism in the Service Mesh Architecture.
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023

Automated Extraction of Security Profile Information from XAI Outcomes.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2023

2022
Improving the Expected Performance of Self-Organization in a Collective Adaptive System of Drones using Stochastic Multiplayer Games.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Engineering Collective Adaptive Systems with CASSim.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, 2022

Using Design Questions to Analyze System Adaptation Potential.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, 2022

Toward Enabling Self-Protection in the Service Mesh of the Microservice Architecture.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, 2022

2021
Evaluating verification awareness as a method for assessing adaptation risk.
Future Gener. Comput. Syst., 2021

Employing Stochastic Multiplayer Games to Support Self-Organization over Ad Hoc Networks.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021

Towards a Plug-In Architecture to Enable Self-Adaptation through Middleware.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021

Applying Security-Awareness to Service-Based Systems.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021

2020
Would You Fix This Code for Me? Effects of Repair Source and Commenting on Trust in Code Repair.
Syst., 2020

Trust Perceptions of Metadata in Open-Source Software: The Role of Performance and Reputation.
Syst., 2020

MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases.
Future Gener. Comput. Syst., 2020

Introduction to the Minitrack on Self-Adaptive Systems: Technologies, Domains, Principles, and Practices.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Formal Verification of Functional Requirements for Smart Contract Compositions in Supply Chain Management Systems.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Toward a Negotiation Framework for Self-Integration.
Proceedings of the 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2020

Extending Context Awareness by Anticipating Uncertainty with Enki and Darjeeling.
Proceedings of the 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2020

Assessing Adaptations based on Change Impacts.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2020

2019
Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards.
Requir. Eng., 2019

Developing a platform to evaluate and assess the security of wearable devices.
Digit. Commun. Networks, 2019

Crossing the Adaptation Boundaries of Distinct Testbeds.
Proceedings of the IEEE 4th International Workshops on Foundations and Applications of Self* Systems, 2019

Evaluating the Impact of Design Constraints on Expected System Performance.
Proceedings of the IEEE 4th International Workshops on Foundations and Applications of Self* Systems, 2019

MAPE-SAC: A Framework to Dynamically Manage Security Assurance Cases.
Proceedings of the IEEE 4th International Workshops on Foundations and Applications of Self* Systems, 2019

Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Gait-Based Identification Using Wearables in the Personal Fog.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

The Influence of Personality on Code Reuse.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Evaluating Security Assurance Case Adaptation.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Software Development for Self-Adaptation in Services, Wearables, and IoT Devices.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Observing Team Collaboration Personality Traits in Undergraduate Software Development Projects.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

Trust in Software: Attributes of Computer Code and the Human Factors that Influence Utilization Metrics.
Proceedings of the HCI International 2019 - Posters - 21st International Conference, 2019

Securing Over-The-Air IoT Firmware Updates using Blockchain.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

2018
Predictive Path Planning Algorithm Using Kalman Filters and MTL Robustness.
Proceedings of the 2018 IEEE International Symposium on Safety, 2018

Adaptive Coordination to Complete Mission Goals.
Proceedings of the 2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS*W), 2018

Self-Adaptation Strategies to Maintain Security Assurance Cases.
Proceedings of the 12th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2018

Toward Privacy-Assured Health Insurance Claims.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Toward evaluating the impact of self-adaptation on security control certification.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

Employing the SI Network Model to Evaluate Network Propagation in Bluetooth MANETs.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

Augmentation of Services with Semantic Meta-Information in the Physical Web.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Using System Profiling for Effective Degradation Detection.
Proceedings of the 2018 IEEE International Conference on Autonomic Computing, 2018

Securing Wearables through the Creation of a Personal Fog.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Assessing the Risk of an Adaptation using Prior Compliance Verification.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Individual Differences in Trust in Code: The Moderating Effects of Personality on the Trustworthiness-Trust Relationship.
Proceedings of the HCI International 2018, 2018

Toward Increasing Collaboration Awareness in Software Engineering Teams.
Proceedings of the IEEE Frontiers in Education Conference, 2018

MTL Robustness for Path Planning with A.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

2017
Visualizing Self-Adaptive Plan Simulations Given Embedded Verification Concerns.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

Embedding Verification Concerns in Self-Adaptive System Code.
Proceedings of the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2017

Adapting Compliance of Security Requirements in Multi-Tenant Applications.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

Toward Predicting Secure Environments for Wearable Devices.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Developing a Mechanism to Study Code Trustworthiness.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Examining Collaboration among Student Teams relying on Web Applications to Coordinate Software Development.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Dynamic Change Arcs to Explore Model Forecasts.
Comput. Graph. Forum, 2016

Imposing security awareness on wearables.
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016

Outcomes of emotional content from agile team forum posts.
Proceedings of the 1st International Workshop on Emotion Awareness in Software Engineering, 2016

Practical DoS Attacks on Embedded Networks in Commercial Vehicles.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Configuring an appropriate team environment to satisfy relevant criteria.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

2015
Secu Wear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Measuring the Potential for Victimization in Malicious Content.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

CyberPhishing: A Game-Based Platform for Phishing Awareness Testing.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

DDoS Attacks in Service Clouds.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Gauging influence in software development teams.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Stream Processing with Secure Information Flow Constraints.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Introducing Replaceability into Web Service Composition.
IEEE Trans. Serv. Comput., 2014

A Security Meta-Language for SOAP Messaging.
Int. J. Next Gener. Comput., 2014

Enforcing the Chinese wall model for tenant conflict of interest in the service cloud.
Int. J. Bus. Process. Integr. Manag., 2014

Toward Increasing Awareness of Suspicious Content through Game Play.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Embedding a Distributed Auditing Mechanism in the Service Cloud.
Proceedings of the 2014 IEEE World Congress on Services, 2014

2013
A Design and Verification Framework for Service Composition in the Cloud.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Building a Compliance Vocabulary to Embed Security Controls in Cloud SLAs.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Information flow control for stream processing in clouds.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Analysis of End-to-End SOA Security Protocols with Mobile Devices.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

Assessing individual performance in Agile undergraduate software engineering teams.
Proceedings of the IEEE Frontiers in Education Conference, 2013

An architecture for cross-cloud auditing.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
SecAgreement: Advancing Security Risk Calculations in Cloud Services.
Proceedings of the Eighth IEEE World Congress on Services, 2012

Architecting Web Service Attack Detection Handlers.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Risk propagation of security SLAs in the cloud.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Client-side rendering of collaborative idea networks.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

A Tiered Strategy for Auditing in the Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Self-adapting workflow reconfiguration.
J. Syst. Softw., 2011

SEREBRO: facilitating student project team collaboration.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Analyzing the role of tags as lightweight traceability links.
Proceedings of the TEFSE'11, 2011

Security policy foundations in context UNITY.
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

Developing a Security Meta-Language Framework.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Predicting individual performance in student project teams.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

Collaborative Learning in Software Development Teams.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Security Controls Applied to Web Service Architectures.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010

Using Delta-Federations for On-Demand Crisis Situation Response.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010

Measuring Creativity in Software Development.
Proceedings of the International Conference on Computational Creativity, 2010

Web Service Composition with Dominance-based Filtering and Partial Unfolded Loops.
Proceedings of the 2010 International Conference on Genetic and Evolutionary Methods, 2010

Reasoning about policy noncompliance.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Dynamically Changing Workflows of Web Services.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

2008
Systems interoperability, integration, and composition.
Softw. Process. Improv. Pract., 2008

Isolation in design reuse.
Softw. Process. Improv. Pract., 2008

Monoliths to Mashups: Increasing Opportunistic Assets.
IEEE Softw., 2008

FACT: A fusion architecture with contract templates for semantic and syntactic integration.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2008

Reasoning about Hybrid System of Systems Designs.
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008

Automating Preference and Change in Workflows.
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008

2007
The Impact of Certification Criteria on Integrated COTS-Based Systems.
Proceedings of the Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, 2007

Isolating Mechanisms in COTS-based Systems.
Proceedings of the Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, 2007

Reconfiguring Workflows of Web Services.
Proceedings of the Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, 2007

2006
Patterns of conflict among software components.
J. Syst. Softw., 2006

Interaction Partnering Criteria for COTS Components.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Elevating Interaction Requirements for Web Service Composition.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Forming a Security Certification Enclave for Service-Oriented Architectures.
Proceedings of the 2006 IEEE Services Computing Workshops (SCW 2006), 2006

2005
Understanding solution architecture concerns.
ACM SIGSOFT Softw. Eng. Notes, 2005

Establishing Connectors as Integration Services.
Proceedings of the Fifth Working IEEE / IFIP Conference on Software Architecture (WICSA 2005), 2005

Toward Formalizing Service Integration Glue Code.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
A patterned approach for linking knowledge-based systems to external resources.
IEEE Trans. Syst. Man Cybern. Part B, 2004

Migrating Application Integrations.
Proceedings of the COTS-Based Software Systems, Third International Conference, 2004

Understanding Services for Integration Management.
Proceedings of the COTS-Based Software Systems, Third International Conference, 2004

2003
Methodologies for the development of knowledge-based systems, 1982-2002.
Knowl. Eng. Rev., 2003

Defining Change Management Properties for Component Interoperability Assessment.
Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003

Designing Secure Integration Architectures.
Proceedings of the COTS-Based Software Systems, Second International Conference, 2003

Classifying Interoperability Conflicts.
Proceedings of the COTS-Based Software Systems, Second International Conference, 2003

2002
The impact of component architectures on interoperability.
J. Syst. Softw., 2002

A Framework for Interaction in Software Development Training.
J. Inf. Technol. Educ., 2002

Merging Integration Solutions for Architecture and Security Mismatch.
Proceedings of the COTS-Based Software Systems, First International Conference, 2002

Identifying Evolvability for Integration.
Proceedings of the COTS-Based Software Systems, First International Conference, 2002

2001
A notation for problematic architecture interactions.
Proceedings of the 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001, 2001

Conflict Patterns: Toward Identifying Suitable Middleware.
Proceedings of the ISCA 3rd International Conference on Information Reuse and Integration, 2001

2000
How system architectures impede interoperability.
Proceedings of the Second International Workshop on Software and Performance, 2000

1999
Rule-based systems formalized within a software architectural style.
Knowl. Based Syst., 1999

Using KBS verification techniques to demonstrate the existence of rule anomalies in ADBs.
Inf. Softw. Technol., 1999

1998
Towards a taxonomy of architecture integration strategies.
Proceedings of the Third International Workshop on Software Architecture, 1998

1997
Using meta-knowledge within a multilevel framework for KBS development.
Int. J. Hum. Comput. Stud., 1997

Classifying and detecting anomalies in hybrid knowledge-based systems.
Decis. Support Syst., 1997

1996
Eliminating Redundancy, Conflict, and Incompleteness from Knowledge-Based Systems.
Int. J. Softw. Eng. Knowl. Eng., 1996

A methodology to incorporateformal methods in hybrid KBS verification.
Int. J. Hum. Comput. Stud., 1996

1995
Integrating a formal specification course with a software projects course via an editing tool.
Proceedings of the 26th SIGCSE Technical Symposium on Computer Science Education, 1995

1993
Formal Derivation of Rule-Based Programs.
IEEE Trans. Software Eng., 1993

1992
Seeking Concurrency in Rule-Based Programming.
Proceedings of the 14th International Conference on Software Engineering, 1992

1991
Formal Verification of Pure Production System Programs.
Proceedings of the 9th National Conference on Artificial Intelligence, 1991

1990
Transforming Rule-Based Programs: From the Sequential to the Parallel.
Proceedings of the Third International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 1990, July 15-18, 1990, The Mills House Hotel, Charleston, SC, USA, 1990


  Loading...