19 found
Order:
Disambiguations
Stephen F. Bush [18]Stephen F. S. F. Bush [2]Stephen Francis Bush [1]
  1.  43
    Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches.Sanjay Goel & Stephen F. Bush - 2003 - Complexity 9 (2):54-73.
  2.  26
    5.Stephen F. Bush - 2013 - In Information Theory and Network Science for Power Systems. Wiley-Ieee Press. pp. 128--161.
  3.  28
    Active Net.Stephen F. Bush - 2007 - In Hossein Bidgoli, Volume Iii: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications. Wiley. pp. 985--1011.
    Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  13
    (1 other version)Active Networks and Active Network Management: A Proactive Management Framework.Stephen F. Bush & Amit B. Kulkarni - 2001 - Springer.
    Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  19
    A Simple Metric for Ad Hoc Network Adaptation.Stephen F. S. F. Bush - 2005 - Ieee Journal on Selected Areas in Communications Journal 23 (12):2272--2287.
    This paper examines flexibility in ad hoc networks and suggests that, even with cross-layer design as a mechanism to improve adaptation, a fundamental limitation exists in the ability of a single optimization function, defined a priori, to adapt the network to meet all quality-of-service requirements. Thus, code implementing multiple algorithms will have to be positioned within the network. Active networking and programmable networking enable unprecedented autonomy and flexibility for ad hoc communication networks. However, in order to best leverage the results (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  31
    Brittle System Analysis.Stephen F. Bush, John Hershey & Kirby Vosburgh - forthcoming - Arxiv Preprint Cs/9904016.
    The goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system approaches the limits of tolerance. This can be due to input parameters which exceed a specified input, or environmental conditions which exceed specified operating boundaries. An analogy is made between brittle commmunication systems in particular and materials science.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  47
    Genetically induced communication network fault tolerance.Stephen F. Bush - 2003 - Complexity 9 (2):19-33.
    This paper presents the architecture and initial feasibility results of a proto-type communication network that utilizes genetic programming to evolve services and protocols as part of network operation. The network evolves responses to environmental conditions in a manner that could not be preprogrammed within legacy network nodes a priori. A priori in this case means before network operation has begun. Genetic material is exchanged, loaded, and run dynamically within an active network. The transfer and execution of code in support of (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Graph Spectra for Communications in Biological and Carbon Nanotube Networks.Stephen F. Bush & Sanjay Goel - forthcoming - Ieee Journal on Selected Areas in Communications:1--10.
    No categories
     
    Export citation  
     
    Bookmark  
  9. Information Theory and Network Science for Power Systems.Stephen F. Bush - 2013 - Wiley-Ieee Press.
  10. Nano-Communications: A New Field? An Exploration into a Carbon Nanotube Communication Network.Stephen F. Bush & Yun Li - 2006 - Technical Information Series.
     
    Export citation  
     
    Bookmark  
  11.  10
    Nanoscale Communication Networks.Stephen F. Bush - 2010 - Artech House.
    A highly useful resource for professionals and students alike, this cutting-edge, first-of-its-kind book provides a thorough introduction to nanoscale communication networks. Written in a clear tutorial style, this volume covers a wide range of the most important topics in the area, from molecular communication and carbon nanotube nano-networks, to nanoscale quantum networking and the future direction of nano networks. Moreover, the book features numerous exercise problems at the end of each chapter to ensure a solid understanding of the material.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  20
    Persistence Length as a Metric for Modeling and Simulation of Nanoscale Communication Networks.Stephen F. Bush & Sanjay Goel - 2013 - Ieee Journal on Selected Areas in Communications 31 (12):815-824.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13. Reasoning about Information Assurance Policy with Uncertainty using the Semantic Web.Stephen F. Bush - forthcoming - Annual Symposium on Information Assurance:1--7.
    This is a brief letter outlining speculative ideas for semantic web reasoning about information assurance. Much work has been done on the development of semantic web applications for reasoning about information assurance. A significant portion of this work is focused upon semantic web ontologies and reasoning about security policies and the underlying implementation of those policies. While numerous semantic web-based security policy ontologies and reasoners exist, both academically and commercially, I will briefly focus on ideas related to solutions to the (...)
     
    Export citation  
     
    Bookmark  
  14.  10
    Smart Grid: Communication-Enabled Intelligence for the Electric Power Grid.Stephen F. Bush - 2014 - Wiley-Ieee Press.
    This book bridges the divide between the fields of power systems engineering and computer communication through the new field of power system information theory. Written by an expert with vast experience in the field, this book explores the smart grid from generation to consumption, both as it is planned today and how it will evolve tomorrow. The book focuses upon what differentiates the smart grid from the "traditional" power grid as it has been known for the last century. Furthermore, the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile Atm Network.Stephen F. Bush - 1999 - Dissertation,
    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such (...)
     
    Export citation  
     
    Bookmark  
  16. Toward in vivo nanoscale communication networks: utilizing an active network architecture.Stephen F. Bush - 2011 - Frontiers of Computer Science in China 5 (1):1--9.
     
    Export citation  
     
    Bookmark  
  17.  28
    The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance.Stephen F. Bush & Nathan Smith - forthcoming - Arxiv Preprint Cs/0512092:27--30.
    A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain for (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  26
    Wireless ad hoc nanoscale networking.Stephen F. Bush - 2009 - Ieee Wireless Communications 16 (5):6--7.
    Wireless ad hoc communication on the nanoscale will require thinking outside of the traditional radio spectrum. New applications will utilize new forms of wireless communication channels. For example, nanoscale communication will enable precise mechanisms for directly interacting with cells in vivo. Information may be sent to and from specific cells within the body, allowing detection and healing of diseases on the cellular scale. From a medical standpoint, the use of current wireless techniques to communicate with implants is unacceptable for many (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  36
    Biological models of security for virus propagation in computer networks.Sanjay Goel & Stephen F. S. F. Bush - 2004 - Login, December 29 (6):49--56.
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for disease (...)
    Direct download  
     
    Export citation  
     
    Bookmark