2021

    [1]
    A. Bennett and T. White, “Dynamical properties of spiking neural networks with small world topologies,” Proceedings of the 21st ACM International Conference on Intelligent Virtual Agents, Sep. 2021.

    2018

    [1]
    D. McKenney and T. White, “Towards distribution-based control of social networks,” Computational Social Networks, vol. 5, no. 1, p. 3, Mar. 2018.
    [2]
    A. Bennett and T. White, “Synfire Circuits: Constraint Programming Technique for Combining Functional Groupings of Spiking Neurons,” Biologically Inspired Cognitive Architectures, Jul. 2018.

    2017

    [1]
    D. McKenney and T. White, “Selecting transfer entropy thresholds for influence network prediction,” Social Network Analysis and Mining, vol. 7, no. 1, p. 3:1–3:14, 2017.

    2016

    [1]
    D. McKenney and T. White, “Observations on the role of influence in the difficulty of social network control,” in 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2016, pp. 1294–1301.

    2015

    [1]
    A. Runka and T. White, “Evolving Neurocontrollers for the Control of Information Diffusion in Social Networks,” in Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, Madrid, Spain, 2015, pp. 1471–1472.
    [2]
    D. McKenney and T. White, “Using Transfer Entropy for Influence Measurement and Network Prediction,” in SocialCom, ASE Eighth International Conference on Social Computing, 2015, pp. 1–14.
    [3]
    A. Runka and T. White, “Towards Intelligent Control of Influence Diffusion in Social Networks,” Social Network Analysis and Mining, vol. 5, Dec. 2015.

    2014

    [1]
    A. T. S. Cohen and T. White, “CityBreeder: City Design with Evolutionary Computation,” in Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, Vancouver, BC, Canada, 2014, pp. 133–134.

    2013

    [1]
    D. McKenney and T. White, “A Data Dissemination Protocol Using Route Sharing,” in International Conference on Connected Vehicles and Expo (ICCVE 2013), Las Vegas, USA, 2013.
    [2]
    F. Jeanson and T. White, “Decoding Coincidence Detection Thresholds for Dynamic Memory,” in Proceedings of the 12th International Conference on Cognitive Modelling (ICCM ’13), Ottawa, Canada, 2013.
    [3]
    F. Jeanson and T. White, “Dynamic Memory for Robot Control via Delay Neural Networks,” in 23rd International Conference on Artificial Neural Networks (ICANN ’13), Sofia, Bulgaria, 2013.
    [4]
    F. Jeanson and T. White, “Dynamic Memory via Delay Coincidence Detection for Robot Maze Navigation,” in Proceedings of the 22nd International Conference on Genetic and Evolutionary Computation (GECCO ’13), Amsterdam, The Netherlands, 2013.

    2012

    [1]
    B. Hajian and T. White, “On the Interaction of Influence and Trust in Social Networks,” in ACM EC 2012 Workshop on Incentives and Trust in E-Commerce, 2012, pp. 63–74.
    [2]
    F. Jeanson and T. White, “Evolving axonal delay neural networks for robot control,” in Proceedings of the fourteenth international conference on Genetic and Evolutionary Computation Conference, 2012, pp. 121–128.
    [3]
    B. Hajian and T. White, “On Measurement of Influence in Social Networks,” in IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2012, pp. 101–105.
    [4]
    D. McKenney and T. White, “Distributed and Adaptive Traffic Signal Control within a Realistic Traffic Simulation,” Engineering Applications of Artificial Intelligence, 2012.

    2011

    [1]
    D. McKenney and T. White, “Stock Trading Strategy Creation Using GP on GPU,” Journal of Soft Computing, pp. 1–13, Apr. 2011.
    [2]
    T. White, J. Fan, and F. Oppacher, “Basic Object Oriented Genetic Programming,” in Proceedings of the 24th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2011), Syracuse, USA, 2011, pp. 160–170.
    [3]
    B. Hajian and T. White, “Measuring Semantic Similarity using a Multi-tree Model,” in Proceedings of the 9th Workshop on Intelligent Techniques for Web Personalization and Recommender Systems (ITWP 2011), Barcelona, Spain, 2011, pp. 7–14.
    [4]
    J. Schellinck and T. White, “A Review of Attraction and Repulsion Models of Aggregation: Methods, Findings and An Updated Framework for Model Validation,” Ecological Modelling, p. in,press, Mar. 2011.
    [5]
    B. Hajian and T. White, “Measuring Semantic Similarity using a Multi-tree Model,” in Proceedings of the Workshop on Social Web Mining (SWM 2011), Barcelona, Spain, 2011.
    [6]
    A. Etemad and T. White, “An Ant-inspired Algorithm for Detection of Image Edge Features,” Applied Soft Computing, vol. 11, pp. 4883–4893, 2011.
    [7]
    B. Hajian and T. White, “Modelling Influence in a Social Network,” in Proceedings of the 3rd International Conference on Social Computing, MIT, Boston USA, 2011, pp. 497–500.

    2010

    [1]
    A. Salehi-Abari and T. White, “Trust Models and Con-man Agents: From Mathematical to Empirical Analysis,” in AAAI 2010: Proceedings of the 24th International Conference on Artificial Intelligence, Atlanta GA, USA, 2010, pp. 842–847.
    [2]
    A. Salehi-Abari and T. White, “The Impact of Naive Agents in Heterogeneous Trust-Aware Societies,” vol. LNAI 5683, G. D. Tosto and H. V. D. Parunak, Eds. Springer, 2010, pp. 110–122.
    [3]
    A. Salehi-Abari and T. White, “The Relationship of Trust, Demand and Utility: Be More Trustworthy, Then I Will Buy More,” in PST 2010: Proceedings of  the 8th Annual International Conference on Privacy, Security and Trust (Best Student Paper Award), Ottawa ON, Canada, 2010, pp. 72–79.
    [4]
    A. Salehi-Abari and T. White, “DART: A Distributed Analysis of Reputation and Trust Framework,” Journal of Computational Intelligence, p. in,press, Dec. 2010.
    [5]
    T. White, W. Chu, and A. Salehi-Abari, “Media Monitoring Using Social Networks,” in SocialCom 2010: Proceedings of The 2nd International Conference on Social Computing (Best Paper Award), Minneapolis MN, USA, 2010, pp. 661–668.
    [6]
    T. White, A. Salehi-Abari, and B. Box, “On How Ants Put Advertisements on the Web,” in IEA-AIE 2010: Proceedings of the 23rd International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems, Cordoba, Spain, 2010.
    [7]
    C. M. Henein and T. White, “Microscopic information processing and communication in crowd dynamics,” Physica A: Statistical and Theoretical Physics, vol. 389, pp. 4636–4653, 2010.

    2009

    [1]
    T. White, S. McQuaker, and A. Salehi-Abari, “On the Importance of Relational Concept Knowledge in Referral Networks,” Artificial Intelligence Review, 2009.
    [2]
    T. White, S. McQuaker, and A. Salehi-Abari, “Using relational concept knowledge to improve search in referral networks,” in AAMAS ’09: Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems, Budapest, HU, 2009, pp. 1321–1322.
    [3]
    A. Salehi-Abari and T. White, “On the Impact of Witness-Based Collusion in Agent Societies,” in 12th International Conference on Principles of Practice in Multi-Agent Systems (PRIMA 2009), Nagoya, Japan, 2009, pp. 80–96.
    [4]
    A. Salehi-Abari and T. White, “Towards Con-resistant Trust Models for Distributed Agent Systems,” in IJCAI ’09: Proceedings of the Twenty-first International Joint Conference on Artificial Intelligence, Pasadena, CA, USA, 2009, pp. 272–277.
    [5]
    A. Salehi-Abari and T. White, “Detecting and Dealing with Naive Agents in Trust-aware Societies,” in Trust ’09: Proceedings of the 12th International Workshop on Trust in Agent Societies, 2009.
    [6]
    A. Salehi-Abari and T. White, “The Uphill Battle of Ant Programming vs. Genetic Programming,” in IJCCI 2009: Proceedings of the International Joint Conference on Computational Intelligence, Madeira, Portugal, 2009, pp. 171–176.
    [7]
    T. White, A. Salehi-Abari, and G. Abeysundara, “An Adaptive Swarm-based Algorithm for Resource Allocation in Dynamic Environments,” in ICEC ’09: International Conference on Evolutionary Computation, Madeira, Portugal, 2009.
    [8]
    A. Salehi-Abari and T. White, “Witness-Based Collusion and Trust-Aware Societies,” in CSE ’09: Proceedings of the 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009, pp. 1008–1014.
    [9]
    A. Salehi-Abari and T. White, “The Impact of Naive Agents in Heterogeneous Trust-aware Societies,” in MABS ’09: The 10th International Workshop on Multi-Agent-Based Simulation, 2009.

    2008

    [1]
    C. M. Henein and T. White, “The microscopic model and the panicking ball-bearing,” in Pedestrian and evacuation dynamics 2008, 2010, pp. 569–576.
    [2]
    C. M. Henein and T. White, “Front-to-back communication in a microscopic crowd,” in Pedestrian and Evacuation Dynamics 2008, 2010, pp. 321–334.
    [3]
    T. Oda, A. Somayaji, and T. White, “Content Provider Conflict on the Modern Web,” in 3rd Annual Symposium on Information Assurance, 2008.
    [4]
    A. Salehi-Abari and T. White, “Enhanced generalized ant programming (EGAP),” in GECCO ’08: Proceedings of the 10th annual conference on Genetic and evolutionary computation, New York, NY, USA, 2008, pp. 111–118.
    [5]
    T. White and A. Salehi-Abari, “A swarm-based crossover operator for genetic programming,” in GECCO ’08: Proceedings of the 10th annual conference on Genetic and evolutionary computation, New York, NY, USA, 2008, pp. 1345–1346.

    2007

    [1]
    C. M. Henein and T. White, “Macroscopic effects of microscopic forces between agents in crowd models,” Physica A: Statistical and Theoretical Physics, vol. 373, pp. 694–712, 2007.

    2006

    [1]
    A. Bieszczad and T. White, “The Handbook of Mobile Middleware,” P. Bellavista and A. Corradi, Eds. Taylor and Francis Group, 2006, pp. 287–310.
    [2]
    C. M. Henein and T. White, “Information in Crowds: The Swarm Information Model,” in Cellular Automata, 7th International Conference on Cellular Automata, for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006, Proceedings, 2006, pp. 703–706.
    [3]
    K. Webb and T. White, “Cell modeling with reusable agent-based formalisms,” Applied Intelligence, vol. 24, no. 2, pp. 169–181, 2006.

    2005

    [1]
    F. Keshktar, W. Gueaieb, and T. White, “An Agent-Based Approach to Image Segmentation,” in Proceedings of the 13th Multi-disciplinary Iranian Researchers Conference in Europe, Leeds, UK, July 2005, 2005.
    [2]
    T. White, “Expert Assessment of Stigmergy,” for the Department of National Defence, 2005.
    [3]
    T. Oda and T. White, “Immunity from Spam: An Analysis of an Artificial Immune System for Junk Email Detection,” in Artificial Immune Systems: 4th International Conference, ICARIS 2005, Banff, Alberta, Canada, August 14-17, 2005, Proceedings, 2005, pp. 276–289.
    [4]
    I. Nunn and T. White, “The application of antigenic search techniques to time series forecasting,” in GECCO ’05: Proceedings of the 2005 conference on Genetic and evolutionary computation, New York, NY, USA, 2005, pp. 353–360.
    [5]
    T. White, D. Calvert, and J. Litkey, “Design of an Autonomic Element for Server Management,” in Second International Conference on Autonomic Computing (ICAC 2005), 13-16 June 2005, Seattle, WA, USA, 2005, pp. 147–158.
    [6]
    K. Webb and T. White, “UML as a cell and biochemistry modeling language,” Biosystems, vol. 80, no. 3, pp. 283–302, 2005.
    [7]
    J. Schellinck and T. White, “Use of Netlogo as a rapid prototyping tool for the creation of more rigorous spatially explicit individual-based biological models,” in Open International Conference on Modelling and Simulation-OICMS 2005. Blaise Pascal University, France, 2005.

    2004

    [1]
    C. M. Henein and T. White, “Agent-Based Modelling of Forces in Crowds,” in Multi-Agent and Multi-Agent-Based Simulation, Joint Workshop MABS 2004, New York, NY, USA, July 19, 2004, Revised Selected Papers, 2004, pp. 173–184.
    [2]
    K. Webb and T. White, “Cell modeling using agent-based formalisms,” in IEA/AIE’2004: Proceedings of the 17th international conference on Innovations in applied artificial intelligence, 2004, pp. 128–137.
    [3]
    B. Clow and T. White, “An Evolutionary Race: A Comparison of Genetic Algorithms and Particle Swarm Optimization for Training Neural Networks,” in IC-AI, 2004, pp. 582–588.
    [4]
    T. Oda and T. White, “Spam Detection using an Artificial Immune System,” ACM Crossroads, Winter, 2004.
    [5]
    T. White and M. Weiss, “Securing Mobile Agents Implemented in the Scheme Programming Language,” in Proceedings of the Workshop on Safety and Security in Multiagent Systems (SASME) at AAMAS 2004, 19-23 July 2004, 2004.
    [6]
    S. Wilkinson and T. White, “The AntSynNet Algorithm: Network Synthesis Using Ant Colony Optimization,” in Proceedings of the 2004 International Conference on Artificial Intelligence (IC-AI ’04), Las Vegas, 21-24 June 2004, 2004.
    [7]
    T. White and J. P. Helferty, “Emergent Team Formation: Applying Division of Labour Principles to Robot Soccer,” in Engineering Self-Organising Systems, Methodologies and Applications [revised versions of papers presented at the Engineering Selforganising Applications (ESOA 2004) workshop, held during the Autonomous Agents and Multi-agent Systems conference (AAMAS 2004, 2004, pp. 180–194.
    [8]
    K. Webb and T. White, “Combining analysis and synthesis in a model of a biological cell,” in SAC ’04: Proceedings of the 2004 ACM symposium on Applied computing, New York, NY, USA, 2004, pp. 185–190.
    [9]
    K. Webb and T. White, “Cell Modeling Using Agent-Based Formalisms,” in AAMAS ’04: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, Washington, DC, USA, 2004, pp. 1190–1196.

    2003

    [1]
    T. White, S. Kaegi, and T. Oda, “Revisiting Elitism in Ant Colony Optimization,” in Genetic and Evolutionary Computation - GECCO 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part I, 2003, pp. 122–133.
    [2]
    T. White and E. Bacic, “Implementing Policy-Based Content Filtering for Web Servers,” in In Proceedings of the 2003 International Conference on Security and Management (SAM 2003), Las Vegas, June 23-26 2003, 2003, pp. 226–232.
    [3]
    T. Oda and T. White, “Increasing the accuracy of a spam-detecting artificial immune system,” in IEEE Congress on Evolutionary Computation (1), 2003, pp. 390–396.
    [4]
    K. Webb and T. White, “UML as a Cell and Biochemistry Modeling Language,” CUCSTR 2003-05, Carleton University Cognitive Science, November 2003, 2003.
    [5]
    S. Kaegi and T. White, “Using local information to guide ant based search,” in IEA/AIE’2003: Proceedings of the 16th international conference on Developments in applied artificial intelligence, 2003, pp. 692–701.
    [6]
    M. Lawlor and T. White, “A self organizing social insect model for dynamic frequency allocation in cellular telephone networks,” in AAMAS ’03: Proceedings of the second international joint conference on Autonomous agents and multiagent systems, New York, NY, USA, 2003, pp. 1048–1049.
    [7]
    T. Oda and T. White, “Developing an Immunity to Spam,” in Genetic and Evolutionary Computation - GECCO 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part I, 2003, pp. 231–242.

    2002

    [1]
    T. White, “Evolving Optimally Reliable Networks by Adding an Edge,” in PDPTA ’02: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002, pp. 1712–1717.
    [2]
    T. White, B. Pagurek, and D. Deugo, “Biologically-Inspired Agents for Priority Routing in Networks,” in Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference, 2002, pp. 282–287.
    [3]
    T. White, D. Deugo, and S. Gutz, “Sharing @ The Edge: Secure Information Sharing,” in In Proceedings of the 2002 International Conference on Internet Computing (IC 2002), Las Vegas, June 24-27 2002, 2002, pp. 431–436.
    [4]
    B. Ashfield, D. Deugo, F. Oppacher, and T. White, “Distributed Deadlock Detection in Mobile Agent Systems,” in IEA/AIE ’02: Proceedings of the 15th international conference on Industrial and engineering applications of artificial intelligence and expert systems, London, UK, 2002, pp. 146–156.
    [5]
    T. White, B. Pagurek, and D. Deugo, “Management of Mobile Agent Systems using Social Insect Metaphors,” in SRDS ’02: Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems, Washington, DC, USA, 2002, p. 410.
    [6]
    E. Bacic and T. White, “Authorization as a Service Provided by a Generic Policy Engine,” in Proceedings of the 2002 International Conference on Security and Management (SAM 2002), Las Vegas, June 24-27 2002, 2002.
    [7]
    T. White, B. Pagurek, and D. Deugo, “Collective Intelligence and Priority Routing in Networks,” in IEA/AIE ’02: Proceedings of the 15th international conference on Industrial and engineering applications of artificial intelligence and expert systems, London, UK, 2002, pp. 790–800.
    [8]
    T. White, B. Pagurek, and D. Deugo, “Management of Mobile Agent Systems: Learning from the Ants,” in PDPTA ’02: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002, pp. 1831–1837.
    [9]
    M. L. Pilat and T. White, “Using Genetic Algorithms to Optimize ACS-TSP,” in ANTS ’02: Proceedings of the Third International Workshop on Ant Algorithms, London, UK, 2002, pp. 282–287.

    2001

    [1]
    N. Feng, A. Gang, T. White, and B. Pagurek, “Dynamic Evolution of Network Management Software by Software Hot-Swapping,” in In Proc. of the Seventh IFIP/IEEE International Symposium on Integrated Network Management (IM 2001), Seattle, May 14-18, 2001, 2001, pp. 63–76.

    2000

    [1]
    B. Pagurek, Y. Wang, and T. White, “Integration of mobile agents with SNMP: why and how,” in IEEE/IFIP Network Operations and Management Symposium, NOMS 2000, Honolulu, April 10, 2000, 2000, pp. 609–622.
    [2]
    S. Raza, B. Pagurek, and T. White, “Distributed computing for plug-and-play network service configuration,” in The Networked Planet: Management Beyond 2000, 7th IEEE/IFIP Network Operations and Management Symposium, NOMS 2000, Honolulu, HI, USA, April 10-14, 2000. Proceedings, 2000, pp. 933–934.
    [3]
    J. Tang, T. White, B. Pagurek, and R. Glitho, “Advanced service architecture for H.323 Internet Protocol Telephony,” Computer Communications, vol. 23, no. 8, pp. 740–753, 2000.
    [4]
    T. White, “SynthECA: A Synthetic Ecology of Chemical Agents,” Carleton University, 2000.
    [5]
    S. K. Raza, B. Pagurek, and T. White, “Plug-and-Play Network Service Configuration Using Corba,” in SMARTNET ’99: Proceedings of the IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks, Deventer, The Netherlands, The Netherlands, 2000, pp. 307–320.
    [6]
    R. Glitho, B. Pagurek, J. Tang, and T. White, “Advanced service architecture for H.323 Internet Protocol Telephony,” Computer Communications, vol. 23, pp. 740–753, 2000.
    [7]
    B. Pagurek, J. Tang, T. White, and R. Glitho, “Management of Advanced Services in H.323 Internet Protocol Telephony,” in Proceedings of IEEE Infocom 2000,  Tel Aviv, April 2000, 2000, pp. 91–100.

    1999

    [1]
    J. Tang, T. White, B. Pagurek, and R. Glitho, “Advanced Mobile Agent Architectures for H.323 IP Telephony,” in Proceedings of  MATA ’99, Mobile Agents for Telecommunications Applications, Ottawa, Canada, Oct. 1999, 1999.
    [2]
    T. White and B. Pagurek, “Emergent Behaviour and Mobile Agents,” in Proceedings of the Workshop on Mobile Agents in Coordination and Cooperation at Autonomous Agents ’99, Seattle, May 1st-5th, 1999, 1999.
    [3]
    B. Pagurek and T. White, “A Quick Evaluation of H.323/H.450,” SCE-99-02, Systems and Computer Engineering, Carleton University, April, 1999, 1999.
    [4]
    T. White, J. Mann, and G. Smith, “Genetic algorithms and network ring design,” Annals of Operations Research, vol. 86, pp. 347–371, 1999.
    [5]
    N. Feng, G. Ao, T. White, and B. Pagurek, “Dynamic Upgrading of Network Management Software by Software Hot Swapping,” SCE-99-04, Systems and Computer Engineering Department, Carleton University, April, 1999, 1999.
    [6]
    T. White, B. Pagurek, and A. Bieszczad, “Network Modeling for Management Applications Using Intelligent Mobile Agents,” J. Netw. Syst. Manage., vol. 7, no. 3, pp. 295–321, 1999.
    [7]
    T. White and B. Pagurek, “Distributed Fault Location in Networks Using Learning Mobile Agents,” in PRIMA ’99: Proceedings of the Second Pacific Rim International Workshop on Multi-Agents, London, UK, 1999, pp. 182–196.
    [8]
    T. White and B. Pagurek, “Application Oriented Routing with Biologically-inspired Agents,” in GECCO-99: Proceedings of the Genetic and Evolutionary Computation Conference, July 13-17, 1999, Orlando, Florida USA, 1999.
    [9]
    J. Boyer, B. Pagurek, and T. White, “Methodologies for PVC Configuration in Heterogeneous ATM Environments Using Intelligent Mobile Agents,” in Proceedings of MATA ’99, Mobile Agents for Telecommunications Applications, Ottawa, Canada, Oct. 1999, 1999.

    1998

    [1]
    T. White and B. Pagurek, “Towards Multi-Swarm Problem Solving in Networks,” in ICMAS ’98: Proceedings of the 3rd International Conference on Multi Agent Systems, Washington, DC, USA, 1998, p. 333.
    [2]
    T. White, J. Mann, and G. Smith, “Visualization of Communities of Interest Using Genetic Algorithms,” in Combinatorial Optimization ’98, Brussels, Belgium, April 15th-17th, 1998, 1998.
    [3]
    T. White, A. Bieszczad, B. Pagurek, G. Sugar, and X. Tran, “Intelligent Network Modeling using Mobile Agents,” in Proceedings of the IEEE Global Telecommunications Conference GLOBECOM ’98, 1998, pp. 1082–1087.
    [4]
    A. Bieszczad, S. K. Raza, B. Pagurek, and T. White, “Agent-based schemes for plug-and-play network components,” in IATA ’98: Proceedings of the second international workshop on Intelligent agents for telecommunication applications, London, UK, 1998, pp. 89–101.
    [5]
    T. White, B. Pagurek, and F. Oppacher, “Connection Management using Adaptive Agents,” in Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA’98), July 12th-16th, 1998, 1998, pp. 802–809.
    [6]
    T. White, B. Pagurek, and F. Oppacher, “Ant Search with Genetic Algorithms: Application to Path Finding in Networks,” in Combinatorial Optimization ’98, Brussels, Belgium, April 15th-17th, 1998, 1998.
    [7]
    T. White, B. Pagurek, and F. Oppacher, “ASGA: Improving the Ant System by Integration with Genetic Algorithms,” Proceedings of the Third Genetic Programming Conference (SGA ’98), July, 1998, pp. 610–617, 1998.
    [8]
    T. White, A. Bieszczad, and B. Pagurek, “Distributed fault location in networks using mobile agents,” in IATA ’98: Proceedings of the second international workshop on Intelligent agents for telecommunication applications, London, UK, 1998, pp. 130–141.
    [9]
    T. White, A. Bieszczad, B. Pagurek, G. Sugar, and X. Tran, “Intelligent Network Management using Mobile Agents,” in Proceedings of the Second Canadian Conference on Broadband Research (CCBR ’98), 22nd-24th June, 1998, 1998, pp. 376–384.
    [10]
    A. Bieszczad, B. Pagurek, and T. White, “Mobile Agents for Network Management,” In IEEE Communications Surveys, September, 1998, vol. 1, no. 1, 1998.

    1997

    [1]
    T. White and N. Ross, “An Architecture for an Alarm Correlation Engine,” in Object Technology 97, Oxford, April 13th-16th, 1997, 1997.
    [2]
    S. Abu-Hakima, M. Toloo, and T. White, “A Multi-Agent Systems Approach for Fraud Detection in Personal Communication Systems,” in AAAI-97, Fourteenth National Conference on Artificial Intelligence, Rhode Island, July 27th-31th, 1997, 1997.
    [3]
    T. White, “Routing with Swarm Intelligence,” SCE-97-15, Systems and Computer Engineering Department, Carleton University, September, 1997, 1997.
    [4]
    S. Abu-Hakima, M. Toloo, and T. White, “A multi-agent systems approach for fraud detection in personal communication systems,” in Proceedings of the 15th International Joint Conference on Artificial Intelligence (IJCAI-97), Nagoya, Japan: August 23rd-29th, 1997, 1997, pp. 1–8.
    [5]
    T. White, “Swarm Intelligence and Problem Solving in Telecommunications,” Canadian Artificial Intelligence Magazine, Spring, 1997, 1997.
    [6]
    S. Abu-Hakima, M. Toloo, and T. White, “A Multi-Agent Systems Approach for Fraud Detection in Personal Communication Systems,” in Wireless’97, The Ninth Annual International Conference on Wireless Communications, Calgary, Alberta, Canada, July 9th-11th,1997, 1997, pp. 399–408.

    1996

    [1]
    T. White and N. Ross, “Fault Diagnosis and Network Entities in a Next Generation Network Management System,” in Proceedings of EXPERSYS-96, Paris, France, October 21st-22nd, 1996, 1996, pp. 517–522.
    [2]
    T. White, J. Mann, and G. Smith, “Genetic Algorithms and Network Ring Design,” in Symposium on Combinatorial Optimisation ’96, London March 27th-29th, 1996, 1996.

    1995

    [1]
    J. Mann, T. White, and J. Turner, “Optimal Route Finding in ATM Networks Using Genetic Algorithms,” in Proceedings of the Seventh BNR Design Forum, December 4th-5th, 1995, 1995.
    [2]
    T. White and N. Ross, “Virtual Entities and the Rainbow System Manager,” in Proceedings of the Seventh BNR Design Forum, December 4th-5th, 1995, 1995.

    1994

    [1]
    T. White, D. Deugo, and J. Ulvr, “Object Transfer between Smalltalk VMs,” Smalltalk Report, August, 1994, 1994.
    [2]
    T. White and F. Oppacher, “Adaptive Crossover Using Automata,” in PPSN III: Proceedings of the International Conference on Evolutionary Computation. The Third Conference on Parallel Problem Solving from Nature, London, UK, 1994, pp. 229–238.

    1992

    [1]
    A. Bieszczad and T. White, “Customization of Network Surveillance Expert Systems,” in Proceedings of IEEE Global Telecommunications Conference GLOBECOM’92, Orlando, FL, December, 1992, 1992, pp. 1250–1254.
    [2]
    T. White and A. Bieszczad, “A Customization Environment for the Expert Advisor Network Management System,” in Proceedings 9th Canadian Conference on Artificial Intelligence, May 11th-15th, 1992, 1992, pp. 82–89.
    [3]
    T. White and A. Bieszczad, “The Expert Advisor: An Expert System for Real Time Network Monitoring,” in Proceedings of the Workshop on Advances in Real Time Expert Systems Technology, August, 1992, 1992.

    1989

    [1]
    C. Baird and T. White, “A Real Time Network Monitor,” in Proceedings of the 9th International Workshop on Expert Systems and their Applications, March, 1989, 1989, pp. 35–41.