Patents

  • Auditable Multi-claim Security Token. U.S. Patent 9,038,155, May 19, 2015. Inventors: R. Gamble and R. Baird.

2011-Present

  • Employing Stochastic Multiplayer Games to Support Self-Organization over Ad Hoc Networks, Ian Riley, R.F. Gamble, 6th eCAS Workshop on Engineering Collective Adaptive Systems, 2021.
  • Applying Security-Awareness to Service-Based Systems, Sharmin Jahan, R.F. Gamble, 6th Workshop on Self-Aware Computing, pp. 170-175, 2021.
  • Towards a Plug-In Architecture to Enable Self-Adaptation through Middleware, Sharmin Jahan, Ian Riley, Alonzo Sabino, R.F. Gamble, 8th Self-Improving Systems Integration Workshop, 2021.
  • Evaluating Verification Awareness as a Method for Assessing Adaptation Risk,  I. Riley, S. Jahan, A. Marshall, C. Walter, R. Gamble, Future Generation Computer Systems, Vol. 119, pp. 110-135, ISSN 0167-739X, 2021, doi: https://doi.org/10.1016/j.future.2021.01.034
  • Trust Perceptions of Metadata in Open-Source Software: The Role of Performance and Reputation, G. Alarcon, A. Gibson, C. Walter, R. F. Gamble, T. Ryan, S. Jessup, B. Boyd, A. Capiola, Systems, 8(3), 2020. https://doi.org/10.3390/systems8030028
  • Would You Fix This Code for Me? Effects of Repair Source and Commenting on Trust in Code Repair, G. Alarcon, C.  Walter, A. Gibson, R. F. Gamble, A. Capiola, S. Jessup, T. Ryan, Systems, 8(1), 2020, DOI: 10.3390/systems8010008
  • Formal Verification of Functional Requirements for Smart Contract Compositions in Supply Chain Management Systems, S. Alqahtani, X. He, R. F. Gamble, M. J. Papa, 53rd. Hawaii International Conference on System Sciences, 2020. DOI: 10.24251/HICSS.2020.650
  • Assessing Adaptations based on Change Impacts, S. Jahan, I. Riley, R. Gamble, 1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems, pp. 48-54, 2020. doi: 10.1109/ACSOS49614.2020.00025.
  • Extending Context Awareness by Anticipating Uncertainty with Enki and Darjeeling,  S. Jahan, I. Riley, C. Walter, R. Gamble, 5th Workshop on Self-Aware Computing, pp. 170-175, 2020. doi: 10.1109/ACSOS-C51401.2020.00051.
  • Toward a Negotiation Framework for Self-Integration, I. Riley, S. Jahan, R. Gamble, 7th Self-Improving Systems Integration Workshop, pp. 95-100, 2020. doi: 10.1109/ACSOS-C51401.2020.00038.
  • MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases, S. Jahan, I. Riley, C. Walter, R. Gamble, M. Pasco, P. K. McKinley, B. H. C. Cheng, Future Generation Computer Systems, Vol. 109, pp. 197-209, March 2020. https://doi.org/10.1016/j.future.2020.03.031
  • Crossing the Adaptation Boundaries of Distinct Testbeds, C. Walter and R. Gamble, 1st Int’l Wksp on Self-Protecting Systems, June 2019.
  • MAPE-SAC: A Framework to Dynamically Manage Security Assurance Cases, S. Jahan, M.W. Pasco, R.F. Gamble, P.K. McKinley, and B.H.C. Cheng, 6th Int’l Wksp on Self-Improving System Integration, June 2019.
  • Evaluating the Impact of Design Constraints on Expected System Performance, I. Riley and R. Gamble, 4th Int’l Wksp on Engineering Collective Adaptive Systems, June 2019.
  • Anomaly Detection Sensors for a Modbus-based Oil and Gas Well-monitoring System, X. He, E. Robards, R. Gamble, and M. Papa, The 2nd International Conference on Data Intelligence and Security (ICDIS 2019), June, 2019.
  • Securing Over-The-Air IoT Firmware Updates using Blockchain, X. He, S. Alqahtani, R. Gamble, and M. Papa, International Conference in Omni-layer Intelligent Systems (COINS 2019), May, 2019.
  • Evaluating Security Assurance Case Adaptation, S. Jahan, A. Marshall, and R. Gamble, Proceedings of the 52nd Hawaii International Conference on System Sciences, Jan. 2019.
  • Gait-based Identification using Wearables in the Personal Fog, C. Walter and R. Gamble, Proceedings of the 52nd Hawaii International Conference on System Sciences, Jan. 2019.
  • Observing Team Collaboration Personality Traits in Undergraduate Software Development Projects, S. Chowdhury, C. Walter, and R. Gamble, Proceedings of the 52nd Hawaii International Conference on System Sciences, Jan. 2019.
  • The Influence of Personality on Code Reuse, T.J. Ryan, C. Walter, G. Alarcon, R. Gamble, S. Jessup, and A. Cappiola, Proceedings of the 52nd Hawaii International Conference on System Sciences, Jan. 2019.
  • Developing a platform to evaluate and assess the security of wearable devices, M.L. Hale, K. Lofty, R.F. Gamble, C. Walter, J. Lin, Digital Communications and Networks, Oct. 2018, https://doi.org/10.1016/j.dcan.2018.10.009.
  • Self-Adaptation Strategies to Maintain Security Control Assurance Cases, S. Jahan, A. Marshall, and R. Gamble, Proceedings of the 12th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Sept. 2018.
  • Using System Profiling for Effective Degradation Detection, I. Riley and R. Gamble, Proceedings of the 15th IEEE International Conference on Autonomic Computing, Sept. 2018.
  • Adaptive Coordination to Complete Mission Goals, S. Jahan, C. Walter, S. Alqahtani, and R. Gamble, Proceedings of the 5th Workshop on Self-Improving System Integration, Sept. 2018.
  • The Influence of Commenting Validity, Placement, and Style on Perceptions of Computer Code Trustworthiness: A Heuristic-Systematic Processing Approach, G.M. Alarcon, R.F. Gamble, C. Walter, S.A. Jessup, and T.J. Ryan, Applied Ergonomics, vol. 70, pp. 182-193, 2018, https://doi.org/10.1016/j.apergo.2018.02.027.
  • Understanding Software Development Team Collaboration, S. Chowdhury, C. Walter, and R. Gamble, in the Proceedings of 48th Frontiers in Education, Oct. 2018.
  • Toward Privacy-Assured Health Insurance Claims, X. He, S. Alqahtani, and R. Gamble, Proceedings of the IEEE International Conference on Blockchain, Aug. 2018.
  • MTL Robustness for Path Planning with A*, S. Alqahtani, I. Riley, S. Taylor, R. Gamble, and R. Mailler, in the Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), July 2018.
  • Toward Evaluating the Impact of Self-adaptation on Security Control Certification, A. Marshall, S. Jahan, and R. Gamble, in the Proceedings of the 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), May 2018.
  • Task allocation in Imperfect, Adversarial Environments using a QuadTree and Flow network, S. Alqahtani, I. Riley, S. Taylor, R. Gamble, and R. Mailler, in the Proceedings of the International Conference on Unmanned Aircraft Systems, June 2018.
  • Employing the SI Network Model to Evaluate Network Propagation in Bluetooth MANETs, I. Riley and R. Gamble, in the Proceedings of the IEEE International Congress on Internet of Things, July 2018.
  • Augmentation of Services with Semantic Meta-information in the Physical Web, A. Marshall, X. He, and R. Gamble, in the Proceedings of the IEEE ICC 2018 Workshop – 3rd workshop on Convergent Internet of Things (C-IoT), May 2018.
  • Assessing the Risk of an Adaptation using Prior Compliance Verification,” A. Marshall, S. Jahan, and R. Gamble, in the Proceedings of the 51st Hawaii International Conference on System Sciences, Jan. 3-6, 2018.
  • Securing Wearables through the Creation of a Personal Fog, C. Walter, I. Riley, and R. Gamble, in the Proceedings of the 51st Hawaii International Conference on System Sciences, nominated for Best Paper Award (top 10%), Jan. 2018.
  • Semantic Hierarchies for Extracting, Modeling, and Connecting Compliance Requirements in Information Security Control Standards, M. Hale and R. Gamble, Requirements Engineering, pp. 1-38, Dec. 2017, https://doi.org/10.1007/s00766-017-0287-5.
  • Verifying the Detection Results of Impersonation Attacks in Service Clouds, S. Alqahtani and R.F. Gamble, Advances in Science, Technology, and Engineering Systems, 2(3): 449-459, 2017, DOI: 10.25046/aj020358.
  • Application of the Heuristic-Systematic Model to Computer Code Trustworthiness: The Influence of Reputation and Transparency, G.M. Alarcon, R. Gamble, S.A. Jessup, C. Walter, T.J. Ryan, D.W. Wood, and C.S. Calhoun, Cogent Psychology, 2017, https://doi.org/10.1080/23311908.2017.1389640/
  • Embedding Verification Concerns in Self-Adaptive System Code, S. Jahan, A. Marshall, and R. Gamble, in the Proceedings of the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Tucson, AZ, Sept. 2017.
  • Visualizing Self-Adaptive Plan Simulations given Embedded Verification Concerns, S. Jahan, A. Marshall, and R. Gamble, in the Proceedings of the11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (Demo Track), Tucson, AZ, Sept. 2017.
  • Adapting Compliance of Security Requirements in Multi-Tenant Applications, S. Alqahtani, X. He, and R. Gamble, in the Proceedings of the 4th International Workshop on Self-Improving System Integration, Tucson, AZ, Sept. 2017.
  • Talent Generation for Vehicle Cyber Security, J. Daily, U. Jonson, and R. Gamble, n the Proceedings of the5th Embedded Security in Cars Conference, June 2017.
  • Toward Predicting Secure Environments for Wearable Devices, C. Walter, I. Riley, X. He, E. Robards, E., and R.F. Gamble, in the Proceedings of the 50th Hawaii International Conference on System Sciences, nominated for Best Paper Award (top 10%), Jan. 2017.
  • Developing a Mechanism to Study Code Trustworthiness, C. Walter, R.F. Gamble, G.M. Alarcon, S.A. Jessup, and C. Calhoun, in the Proceedings of the 50th Hawaii International Conference on System Sciences, nominated for Best Paper Award (top 10%), Jan. 2017.
  • Practical DoS Attacks on Embedded Networks in Commercial Vehicles, S. Mukherjee, H. Shirazi, I. Ray, J. Daily, and R. Gamble, Lecture Notes in Computer Science, I. Ray, et al., eds., Vol. 10062, pp. 23-43, DOI: 10.1007/978-3-319-49806-5 2, Dec. 2016.
  • Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls, J. Daily, R. Gamble, S. Moffitt, C. Raines, J. Miran, I. Ray, S. Mukherjee, H. Shirazi, SAE Int. J. Commer. Veh., 9(2):339-349, 2016, doi:10.4271/2016-01-8142. Also appears in The Best of COMVEC 2016: Select technical papers from the SAE Commercial Vehicle Engineering Congress, pp. 69-80, Published by SAE International with a Product Code of PT-180, ISBN of 978-0-7680-8389-7 in a softbound binding, 9-24-2016.
  • Examining Collaboration among Student Teams relying on Web Applications to Coordinate Software Development, Brian Boyd, Ayden Townsley, Charles Walter, Callen Johnson, Rose Gamble, in the Proceedings of the 50th Hawaii International Conference on Systems Sciences, Jan. 2017.Mitigating Service Impersonation Attacks in Clouds, S. Alqahtani and R.F. Gamble, in the Proceedings of the Future Technologies Conference, Dec. 2016.
  • Configuring an Appropriate Team Environment to Satisfy Relevant Criteria, C. Walter, I. Riley, in the Proceedings of the 46th Frontiers in Education, Oct. 2016.
  • Imposing Security Awareness on Wearables, C. Walter, M.L. Hale, and R.F. Gamble, 2nd International Workshop on Software Engineering for Smart Cyber Physical Systems, May 2016.
  • Outcomes of Emotional Content from Agile Team Forum Posts, A. Marshall and R.F. Gamble, 1st International Workshop on Emotional Awareness in Software Engineering, May 2016.
  • Understanding how Member Influence Affects an Agile Software Development Team, A. Marshall and R. Gamble, 21st Frontiers in Education Conference, Oct. 2015.
  • Combining Coordination with Usage Policies to Improve Mission Scheduling Resilience, A. Marshall, S. Alqahtani, A. Ridgway, C. Walter, R. Gamble, and R. Mailler, 3rd International Symposium on Resilient Cyber Systems, Aug. 2015.
  • Stream Processing with Secure Information Flow Constraints, I. Ray, R. Adaikkalavan, X. Xie, and R.F. Gamble, Lecture Notes in Computer Science, P. Samarati, ed., vol. 9149, pp. 311-329, Springer International Publishing, June 2015.
  • Measuring the Potential for Victimization in Malicious Content, M. Hale, R. Gamble, J. Hale, M. Haney, J. Lin, and C. Walter, 22nd IEEE International Conference on Web Services, June 2015.
  • SecuWear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security, M. Hale, D. Ellis, R. Gamble, C. Walter, J. Lin, 4th IEEE International Conference on Mobile Systems, June 2015.
  • CyberPhishing: A Game-based Platform Phishing Awareness Testing, M. Hale, R. Gamble, and P. Gamble, 48th Annual Hawaii International Conference on System Sciences, January 2015.
  • DDoS Attacks in Service Clouds, S. Alqahtani and R. Gamble, 48th Annual Hawaii International Conference on System Sciences, January 2015.
  • Toward Increasing Awareness of Suspicious Content through Game Play, M. Hale and R. Gamble, IEEE World Congress on Services, pp. 113-120, 2014.
  • Embedding a Distributed Auditing Mechanism in the Service Cloud, S. Alqahtani and R. Gamble, IEEE World Congress on Services, pp. 69-76, 2014.
  • Enforcing the Chinese Wall Model for Tenant Conflict of Interest in the Service Cloud, S. Alqahtani, R. Gamble, and I. Ray, International Journal of Business Process Integration, Vol. 7, No. 2, pp. 166-177, 2014.
  • A Security Meta-Language for SOAP Messaging, R. Baird and R. Gamble, International Journal of Next-Generation Computing, vol. 5, no. 3, pp. 249-273, 2014.
  • R. Xie, R. Gamble, and N. Ahmed, Diagnosing Vulnerability Patterns in Cloud Audit Logs, in High Performance Cloud Auditing and Applications, K. Han, B.-Y. Choi and S. Song, Eds., Springer: New York, 2014, ISBN: 1461432952.
  • Introducing Replaceability into Web Service Composition, H. Al-Helal and R. Gamble, IEEE Transactions on Services Computing, Vol. 7, No. 2, pp. 198-209, 2014.
  • Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud, S. Alqahtani, R. Gamble, and I. Ray, Proceedings of the IEEE 9th World Congress on Services, pp. 298-305.
  • Analysis of End-to-End SOA Security Protocols with Mobile Devices, N. Ahmed, R. Gamble, M. Linderman, and B. Bhargava, International Workshop on Mobile Cloud Computing : Data, Management & Security, 2013.
  • An Architecture for Cross-Cloud Auditing of Service Cloud, R. Xie and R. Gamble, 8th Annual Cyber Security and Information Intelligence Research Workshop, 2013.
  • Assessing Individual Performance in Agile Teams, R. Gamble and M. Hale, 43rd Annual Frontiers in Education Conference, pp. 1678-1684, 2013.
  • Information Flow Control for Stream Processing in Clouds, X. Xie, I. Ray, R. Adaikkalavan, and R. Gamble, Symposium on Access Control Models and Technologies, 2013.
  • M. Hale, M.T. Gamble, and R. Gamble, A Design and Verification Framework for Service Composition in the Cloud, Proceedings of the IEEE Third International Workshop on Security and Privacy Engineering, 2013.
  • M. Hale and R. Gamble, Building a Compliance Vocabulary to Embed Security Controls in Cloud SLAs, Proceeding of the IEEE Third International Workshop on Formal Methods in Services and Cloud Computing, 2013.
  • M. Hale and R. Gamble, Risk Propagation of Security SLAs in the Cloud, Proceeding of the workshop on Management and Security technologies for Cloud Computing 2012, IEEE GLOBECOM, 2012.
  • R. Xie and R. Gamble, A Tiered Strategy for Auditing in the Cloud, 5th IEEE International Conference on Cloud Computing, 2012.
  • A. Andrekanic and R. Gamble, Architecting Web Service Attack Detection Handlers, 19th IEEE International Conference on Web Services, 2012.
  • M. Hale and R. Gamble, SecAgreement: Advancing Security Risk Calculations in Cloud Services, 8th IEEE World Congress on Services, 2012.
  • N. Jorgenson and R. Gamble, Client-Side Rendering of Collaborative Idea Networks, International Conference on Collaboration Technologies and Systems, 2012.

2006-2011

  • Self-Adapting Workflow Reconfiguration, R. Baird, N. Jorgenson, and R. Gamble, Journal of Systems and Software, v. 84, pp. 510-524, 2011.
  • M. Hale, R. F. Gamble, K. S. Wilson, & A. Narayan, Collaborative Learning in Software Engineering Teams, in 17th Americas Conference on Information Systems, 2011.
  • F. Grove, N. Jorgenson, S. Sen, B. Brummel, and R. Gamble, Adapting Rewards to Encourage Creativity, in  Multi-Agent Systems for Education and Interactive Entertainment: Design, Use and Experience, M. Beer, M. Fasli, and D. Richards, eds., IGI Global, 2011.
  • N. Jorgenson, and R. Gamble,Self-Adapting Workflow Reconfiguration, R. Baird, Journal of Systems and Software, v. 84, pp. 510-524, 2011.
  • N. Jorgenson, M. Hale, and R. Gamble, SEREBRO: Facilitating Student Project Team Collaboration, 33rd International Conference on Software Engineering, 2011.
  • M. Hale, N. Jorgenson, and R. Gamble, Predicting Individual Performance in Student Project Teams, in Proceedings of the 24th Conference on Software Engineering Education and Training, 2011.
  • M.T. Gamble, R. Gamble, and M. Hale, Security Policy Foundations in Context UNITY, in Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011.
  • M. Young, B. Nienhaus, and R. Gamble, Abstraction, Uniformity, and Comparison of Security Management Policies, in Proceedings of the 2011 Security Conference, 2011.
  • M. Hale, N. Jorgenson, and R. Gamble, Analyzing the Role of Tags as Lightweight Traceability Links, in Proceedings for the 6th International Workshop on Traceability in Emerging Forms of Software Engineering, 2011.
  • R. Baird, R. Gamble, Developing a Security Meta-Language Framework, 44th Hawaii International Conference on System Sciences, 2011.
  • H. Al-Helal and R. Gamble, Web Service Composition with Dominance-based Filtering and Partial Unfolded Loops, in Proceedings of the International Conference on Genetic and Evolutionary Methods, 2010.
  • R. Baird and R. Gamble, Security Controls Applied to Web Service Architectures, International Conference on Software Engineering and Data Engineering (SEDE), 2010.
  • R. Baird and R. Gamble, Using Δ-Federations for On-Demand Crisis Situation Response, International Conference on Software Engineering and Data
    Engineering
     (SEDE), 2010.
  • J. Hosey and R. Gamble, Extracting Security Control Requirements, Cyber Security and Information Intelligence Research Workshop (CSIIRW), 2010.
  • R. Baird and R. Gamble, Reasoning about Policy Noncompliance, Cyber Security and Information Intelligence Research Workshop (CSIIRW), 2010.
  • C. Nelson, B. Brummel, D.F. Grove, N. Jorgenson, R. Gamble, and S. Sen, Measuring Creativity in Software Design, in the International Conference on Computational Creativity, 2010
  • M. Hepner, R. Baird, R. Gamble, Dynamically Changing Workflows of Web Services3rd International Workshop on Web Service Composition and Adaptation, July 2009.
  • R. Gamble, S. Sen, B. Brummel, F. Grove, N. Jorgenson, D. Guernsey, D. Hampton, D. Baker, and J. Hughes, The SEREBRO Project: Fostering Creativity through Collaboration and Rewards, Presented at EDUMas Workshop, part of 8th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009.
  • M.T. Gamble, R. Gamble, Monoliths to Mashups: Increasing Opportunistic AssetsIEEE Software, vol. 25, no. 6, pp. 71-79, Nov./Dec. 2008
  • R. Gamble, M. Smith, Moving toward “reality” in team selection for software engineeringFrontiers in Education, Oct. 2008.
  • R. Gamble, R. Baird, L. Flagg, and M. McClure, FACT: A Fusion Architecture with Contract Templates for Semantic and Syntactic Integration, IEEE International Conference on Information Reuse and Integration (IRI2008), 2008.
  • R. Baird, M. Hepner, N. Jorgenson, R. Gamble, Automating Preference and Change in Workflows, IEEE International Conference on Composition Based Software Systems, 2008 (ICCBSS’08).
  • M.T. Gamble, R. Gamble, Reasoning about Hybrid System of Systems Designs, IEEE International Conference on Composition Based Software Systems, 2008 (ICCBSS’08).
  • M.T. Gamble, R. Gamble, Isolation in Design ReuseJournal of Software Process Improvement and Practice, Volume 13, Issue 2, Pages 145-156, Feb 2008.
  • M.T. Gamble, Reasoning about Isolation in Distribute System Design, Ph.D. Dissertation, Department of Computer Science, University of Tulsa, 2007.
  • R. Baird, Next Generation Workflow Toolkit (NeWT), M.S. Thesis, Department of Computer Science, University of Tulsa, 2007.
  • M. Hepner, Dynamic Changes To Workflow Instances of Web Services, Ph.D. Dissertation, Department of Mathematical and Computer Sciences, University of Tulsa, 2007.
  • M. Kelkar, Modeling Software Component Security Policies, Ph.D. Dissertation, Department of Mathematical and Computer Sciences, University of Tulsa, 2007.
  • M. Kelkar, R. Perry, R. Gamble, A. Walvekar, The Impact of Certification Criteria on Integrated COTS-Based Systems, IEEE International Conference on COTS-Based Software Systems, 2007 (ICCBSS’07).
  • M.T. Gamble, R.F. Gamble, Isolating Mechanisms in COTS-Based Systems, IEEE International Conference on COTS-Based Software Systems, 2007 (ICCBSS’07).
  • R. Baird, M. Hepner, R. Gamble and M. T. Gamble, Reconfiguring Workflows of Web Services, IEEE International Conference on COTS-Based Software Systems, 2007 (ICCBSS’07).
  • Melanie Smith, Toward Policy Based Logic For Secure Component Interaction, Masters Thesis, University of Tulsa, Oklahoma, 2006.
  • Amit Walvekar, ConPN: Detecting Conflicts in Interdomain Mappings, Masters Thesis, University of Tulsa, Oklahoma, 2006.
  • M. Hepner, M. T. Gamble, and R. Gamble, Forming a Security Certification Enclave for Service-Oriented Architectures, Modeling, Design, and Analysis for Service-oriented Architecture Workshop, 2006(MDA4SOA’06).
  • M. Smith, M. Kelkar, R. Gamble, Examining Security Certification and Access Control Conflicts Using Deontic Logic, 1st International Workshop on Software Certification, 2006 (CERTSOFT’06).
  • A. Walvekar, M. Kelkar, M. Smith, R. Gamble, Determining Conflicts in Interdomain Mappings for Access Control, Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA’06), Seattle, August 15 – 16, 2006.
  • M. Hepner, M.T. Gamble, R. Gamble, Elevating Interaction Requirements for Web Service Integration, 1st International Workshop on Evaluation and Evolution of Component Composition, 2006 (EECC 2006).
  • M. Kelkar, M. Smith, R. Gamble, Interaction Partnering Criteria for COTS Components, 18th International Conference on Software Engineering and Knowledge Engineering, 2006 (SEKE 2006).
  • M. Hepner, R. Gamble, M. Kelkar, L. Davis, D. Flagg, Patterns of Conflict Among Software Components, Journal of Systems and Software, Volume 79, Issue 4, pp. 537-551, 2006.

1992-2005

  • Establishing Connectors as Integration Services, M. Hepner, R. Gamble, 5th IEEE/IFIP Working Conference on Software Architecture, 2005 (WICSA 2005).
  • Connectors as Integration Services, with R. Gamble, 5th IEEE/IFIP Working Conference on Software Architecture (WICSA), Components and Services workshop, 2005.
  • Understanding Solution Architecture Connectors, M.T. Gamble, R. Gamble, M. Hepner, International Workshop on Models and Processes for the Evaluation of OTS Components, 2005 (MPEC’05).
  • Interdomain Policy and Access Control within a Grid Architecture, N. LaMonica, M. Kelkar, R. Baird, R. Gamble, Software Engineering and Application Conference, 2005.
  • Toward Formalizing Service Integration Glue Code, L. Davis, M. Hepner, M. Kelkar, IEEE International Conference on Services Computing, July 2005.
  • PollenPro: A General Pollen Forecasting System, K. Johnson, A. Lyle, B. Waters, S. East, and E. Levetin, Aerobiology 2005, June 2005.
  • Dynamism Gloom and Doom?, T. Gamble, D. Flagg, R. Baird, and R. Gamble, International Workshop on Incorporating COTS into Software Systems: Tools and Techniques, San Francisco, CA, 2004.
  • Architecting COTS Component Services, L. Davis and R. Gamble, IEEE International Conference on COTS-Based Software Systems 2004 (ICCBSS’04).
  • Migrating Application Integrations, D. Flagg, R. Gamble, R. Baird, and W. Stewart, IEEE International Conference on COTS-Based Software Systems, 2004 (ICCBSS’04).
  • Defining Change Management Properties for Component Interoperability Assessment, T. Gamble, R. Gamble, and L. Davis, Fifteenth International Conference on Software Engineering and Knowledge Engineering, San Francisco, CA, 2003 (SEKE’03).
  • Classifying Interoperability Conflicts, L. Davis, D. Flagg, R. Gamble, and C. Karatas, IEEE International Conference on COTS-Based Software Systems, 2003 (ICCBSS’03), Ottawa, Ontario, Canada, Springer-Verlag.
  • Designing Secure Integration Architectures,G. Jonsdottir, L. Davis, and R. Gamble, IEEE International Conference on COTS-Based Software Systems, 2003 (ICCBSS’03), Ottawa, Ontario, Canada, Springer-Verlag.
  • A Framework for Interaction in Software Development Training, Gamble R., Davis L., Journal of Information Technology Education, 2002.
  • Identifying Evolvability for Integration, Davis, L and Gamble, R., International Conference on COTS-Based Software Systems, Orlando FL, Springer-Verlag, 2002.
  • Merging Integration Solutions for Architecture and Security Mismatch, Payton, J, Jónsdóttir, G, Flagg, D, and Gamble R., International Conference on COTS-Based Software Systems, Orlando FL, Springer-Verlag, 2002.
  • Notating Problematic Architecture Interactions, M.S. Thesis, Jónsdóttir G, Department of Mathematical and Computer Sciences: University of Tulsa, 2002.
  • The Impact of Component Architectures on Interoperability, Davis L, Gamble R, Payton J., Journal of Systems and Software, 2002.
  • A Notation for Problematic Architecute Interactions, Davis L, Gamble R, Payton J, Jónsdóttir G, Underwood D., The 3rd joint meeting of the European Software Engineering Conference, and ACM SIGSOFT’s Symposium on the Foundations of Software Engineering, Vienna, Austria, 2001.
  • Conflict Patterns: Toward Identifying Suitable Middleware, Davis L, Gamble R., Int’l Conference on Information Reuse and Integration, Las Vegas, NV, 2001.
  • Examining Software Architecture Property Interactions and the Influence of System Requirements, M.S. Thesis, Davis L, Department of Mathematical and Computer Sciences: University of Tulsa, 2001.
  • Using XML for an Architecture Interaction Conspectus, Payton J, Davis L, Underwood D, Gamble R., Workshop on XML in Software Engineering, Toronto, Canada, 2001.
  • Component Indicators for Architectural Interaction Assessment [UTULSA-MCS-00-15], Davis L, Payton J, Gamble R, Flagg D., Department of Mathematical and Computer Sciences, University of Tulsa, 2000.
  • How System Architectures Impede Interoperability, Davis L, Payton J, Gamble R., the 2nd International Workshop On Software and Performance, 2000.
  • Toward Identifying The Impact Of COTS Evolution On Integrated Systems, Davis L, Payton J, Gamble R., Proceedings of the Workshop on Continuing Collaborations for Successful COTS Development, Limerick, Ireland, 2000.
  • Towards Software Multioperability: Bridging Heterogeneous Software Interoperability Platforms, Medvidovic N, Gamble R, Rosenblum D., Proceedings of the Fourth International Software Architecture Workshop (ISAW-4), pages 77-83, Limerick, Ireland, June 4-5, 2000.
  • The Opportunity for Formal Models of Integration, Payton, J., Gamble, R., Kimson, S., Davis, L., 2nd Int’l Conference on Information Reuse and Integration, 2000.
  • Architecture Integration Elements: Connector Models that Form Middleware, Keshav R, M.S. Thesis, Department of Mathematical and Computer Sciences: University of Tulsa, 1999.
  • Exploiting Inheritance in Modeling Architecture Abstractions, Hasler K, Gamble R, Frasier K, Stiger P., 1st Working IFIP Conference on Software Architecture, 1999 – position paper.
  • System Development Using the Integrating Component Architectures Process, Payton J, Keshav R, Gamble R., The ICSE ’99 Workshop on Ensuring Successful COTS Development, 1999.
  • The Rule-based Architectural Style and its Application to Contemporary Knowledge-based Systems, Gamble R, Stiger P, Plant R., Journal of Knowledge Based Systems, 1999.
  • Understanding the Architectural Characteristics behind Middleware Choices, Kelkar A, Gamble R., 1st International Conference in Information Reuse and Integration, 1999.
  • Integrating Web-Based Interfaces to Legacy Systems [UTULSA-MCS-98-20], Cole D, Gamble R.,  Department of Mathematical and Computer Sciences, University of Tulsa, 1998.
  • Integration Patterns for the Component Web, M.S. Thesis, Cole D., Department of Mathematical and Computer Sciences: University of Tulsa, 1998.
  • Integration Strategies for the Web-based Components [UTULSA-MCS-98-10], Cole D, Gamble R.,  Department of Mathematical and Computer Sciences, University of Tulsa, 1998.
  • Towards a Taxonomy of Architecture Integration Strategies, Keshav R, Gamble R., 3rd International Software Architecture Workshop, 1-2, November, 1998.
  • An Assessment of Architectural Styles and Integration Components, M.S. Thesis, Stiger P., Department of Mathematical and Computer Sciences: University of Tulsa, 1997.
  • Blackboard Systems Formalized Within a Software Architectural Style, Stiger P, Gamble R., IEEE International Conference on Systems, Man, and Cybernetics, 1997.
  • Choosing Interoperable Components, Sitaraman R, Gamble R., USENIX Advanced Topics Workshop on Software Components: Integration & Collaboration, 1997.
  • Integration of Software Systems at an Abstract Architectural Level, M.S. Thesis, Sitaraman R.,Department of Mathematical and Computer Sciences: University of Tulsa, 1997.
  • Using Meta-knowledge Within a Multi-level Framework for KBS Development, Plant A, Gamble R., International Journal of Human Computer Studies, 1997.
  • A Methodology to Incorporate Formal Methods in Hybrid Knowledge Based System Prototypes, Gamble R, Baughman D., International Journal of Human-Computer Studies 1996.
  • Eliminating Concerns for Redundancy, Conflict, and Incompleteness in Knowledge Based Systems, Gamble R, Shaft T., International Journal of Software Engineering and Knowledge Engineering, 1996 (SEKE’96).
  • Integrating a Formal Specification Course with a Software Projects Course via an Editing Tool, Gamble R., Papers of the 26th SISCE Technical Symposium on Computer Sciences Education, 1995.
  • Applying Formal Verification Methods to Rule-Based Programs, Gamble R, Roman G, Ball W, Cunningham H., International Journal of Expert Systems 1994.
  • Distributed Contract-Based Negotiation Using Formal Specification, Gamble R, Sen S., International Conference on Parallel and Distributed Computing, 1994.
  • Formal Derivation of Rule-based Programs, Roman G, Gamble R, Ball W., IEEE Transactions of Software Engineering 1993 March.
  • Seeking Concurrency in Rule-based Programming, Roman G, Gamble R, Ball W., Proceedings of the 14th International Conference on Software Engineering, 1992 (ICSE’92).