time. SeeDep will also be used for deploying cyber
attacks simulations. Consequently, implementing be-
havioral agents to generate realistic traffic, workflows
and dataflows is also investigated.
REFERENCES
Aiello, W., Chung, F., and Lu, L. (2000). A random graph
model for massive graphs. In Proceedings of the
thirty-second annual ACM symposium on Theory of
computing, pages 171–180. Acm.
Allen, A., Aragon, C., Becker, C., Carver, J., Chis, A.,
Combemale, B., Croucher, M., Crowston, K., Garijo,
D., Gehani, A., Goble, C., Haines, R., Hirschfeld, R.,
Howison, J., Huff, K., Jay, C., Katz, D. S., Kirchner,
C., Kuksenok, K., L
¨
ammel, R., Nierstrasz, O., Turk,
M., van Nieuwpoort, R., Vaughn, M., and Vinju, J. J.
(2017). Engineering Academic Software (Dagstuhl
Perspectives Workshop 16252). Dagstuhl Manifestos,
6(1):1–20.
Austin, J., Jackson, T., Fletcher, M., Jessop, M., Liang,
B., Weeks, M., Smith, L., Ingram, C., and Watson, P.
(2011). Carmen: Code analysis, repository and mod-
eling for e-neuroscience. Procedia Computer Science,
4:768 – 777. Proceedings of the International Confer-
ence on Computational Science, ICCS 2011.
Barab
´
asi, A.-L. and Albert, R. (1999). Emergence of scal-
ing in random networks. science, 286(5439):509–512.
Bu, T. and Towsley, D. (2002). On distinguishing between
internet power law topology generators. In INFO-
COM 2002. Twenty-First Annual Joint Conference of
the IEEE Computer and Communications Societies.
Proceedings. IEEE, volume 2, pages 638–647. IEEE.
Calvert, K. L., Doar, M. B., and Zegura, E. W. (1997). Mod-
eling internet topology. IEEE Communications mag-
azine, 35(6):160–163.
Donoho, D. L., Maleki, A., Rahman, I. U., Shahram, M.,
and Stodden, V. (2009). Reproducible research in
computational harmonic analysis. Computing in Sci-
ence Engineering, 11(1):8–18.
Erdos, P. and Renyi, A. (1960). On the evolution of random
graphs. Publ. Math. Inst. Hungary. Acad. Sci., 5:17–
61.
Faloutsos, M., Faloutsos, P., and Faloutsos, C. (1999). On
power-law relationships of the internet topology. SIG-
COMM Comput. Commun. Rev., 29(4):251–262.
Gavish, M. and Donoho, D. (2011). A universal identifier
for computational results. Procedia Computer Sci-
ence, 4:637 – 647. Proceedings of the International
Conference on Computational Science, ICCS 2011.
Gorp, P. V. and Mazanek, S. (2011). Share: a web portal for
creating and sharing executable research papers. Pro-
cedia Computer Science, 4:589 – 597. Proceedings of
the International Conference on Computational Sci-
ence, ICCS 2011.
Hutchinson, J. (2001). Culture, communication, and an in-
formation age madonna. IEEE Professional Commu-
nication Society Newsletter, 45:1–7.
Jin, C., Chen, Q., and Jamin, S. (2000). Inet: Internet topol-
ogy generator.
Koop, D., Santos, E., Mates, P., Vo, H. T., Bonnet, P., Bauer,
B., Surer, B., Troyer, M., Williams, D. N., Tohline,
J. E., Freire, J., and Silva, C. T. (2011). A provenance-
based infrastructure to support the life cycle of exe-
cutable papers. Procedia Computer Science, 4:648 –
657. Proceedings of the International Conference on
Computational Science, ICCS 2011.
LeVeque, R. J. (2009). Python tools for reproducible re-
search on hyperbolic problems. Computing in Science
Engineering, 11(1):19–27.
Medina, A., Lakhina, A., Matta, I., and Byers, J. (2001).
Brite: An approach to universal topology generation.
In Modeling, Analysis and Simulation of Computer
and Telecommunication Systems, 2001. Proceedings.
Ninth International Symposium on, pages 346–353.
IEEE.
Munaf
`
o, M. R., Nosek, B. A., Bishop, D. V. M., Button,
K. S., Chambers, C. D., Percie du Sert, N., Simon-
sohn, U., Wagenmakers, E.-J., Ware, J. J., and Ioan-
nidis, J. P. A. (2017). A manifesto for reproducible
science. Nature Human Behaviour, 1(1):0021+.
Nsnam (2006). Topology Generator - nsnam.
http://www.eg.bucknell.edu/
∼
perrone/research-docs/
NSFProjectDescription.pdf. Accessed: 2018-11-26.
Nyren, R., Edmonds, A., Papaspyrou, A., Metsch, T., and
Parak, B. (2016). Open cloud computing interface -
core. http://ogf.org/documents/GFD.221.pdf.
Saino, L., Cocora, C., and Pavlou, G. (2013). A toolchain
for simplifying network simulation setup. In Pro-
ceedings of the 6th International ICST Conference on
Simulation Tools and Techniques, SIMUTOOLS ’13,
ICST, Brussels, Belgium, Belgium. ICST.
Stodden, V., Hurlin, C., and P
´
erignon, C. (2012). Run-
mycode.org: A novel dissemination and collabora-
tion platform for executing published computational
results. In 2012 IEEE 8th International Conference
on E-Science, pages 1–8.
Tomasik Joanna, W. M.-A. (2012). The inter-domain hi-
erarchy in measured and randomly generated as-level
topologies. In IEEE International Conference on
Communications (ICC), Otawa, Canada.
TOSCA (25 November 2013). Topology and orches-
tration specification for cloud applications version
1.0. http://docs.oasis-open.org/tosca/TOSCA/v1.0/os/
TOSCA-v1.0-os.html. OASIS Standard.
Waxman, B. M. (1988). Routing of multipoint connections.
IEEE journal on selected areas in communications,
6(9):1617–1622.
CLOSER 2019 - 9th International Conference on Cloud Computing and Services Science
370