Serge Mankovskii

According to our database1, Serge Mankovskii authored at least 53 papers between 1997 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Collaborative Visual Analytics Using Blockchain.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2020

2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Tight Coupling.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Service-Oriented Architecture.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

OASIS.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Loose Coupling.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Coupling and Decoupling.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Privacy Preserving Distributed Deep Learning and Its Application in Credit Card Fraud Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Model-Based Trust Assessment for Internet of Things Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2016
Connecting the dots: anomaly and discontinuity detection in large-scale systems.
J. Ambient Intell. Humaniz. Comput., 2016

2015
Mining Software Logs for Goal-Driven Root Cause Analysis.
Proceedings of the Art and Science of Analyzing Software Data, 2015

2014
Detecting Discontinuities in Large Scale Systems.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

2013
CAPRI: a tool for mining complex line patterns in large log data.
Proceedings of the 2nd International Workshop on Big Data, 2013

Storm prediction in a cloud.
Proceedings of the 5th International ICSE Workshop on Principles of Engineering Service-Oriented Systems, 2013

Looking beyond the Single Pane of Glass: Visualization and Perspective in Enterprise Network.
Proceedings of the Design, User Experience, and Usability. Web, Mobile, and Product Design, 2013

Regression-based utilization prediction algorithms: an empirical investigation.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

2012
Towards a Training-Oriented Adaptive Decision Guidance and Support System.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

Analyzing Assembler to Eliminate Dead Functions: An Industrial Experience.
Proceedings of the 16th European Conference on Software Maintenance and Reengineering, 2012

Requirements-Driven Root Cause Analysis Using Markov Logic Networks.
Proceedings of the Advanced Information Systems Engineering, 2012

Introducing STRATOS: A Cloud Broker Service.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Concrete- and abstract-based access control.
Int. J. Inf. Sec., 2011

Event clustering for log reduction and run time system understanding.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Risk-based decision method for access control systems.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Towards a requirements-driven framework for detecting malicious behavior against software systems.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011

2010
Detecting incompleteness in access control policies using data classification schemes.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Risk management in dynamic role based access control systems.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Risk Analysis in Access Control Systems Based on Trust Theories.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

Towards Practical Runtime Verification and Validation of Self-Adaptive Software Systems.
Proceedings of the Software Engineering for Self-Adaptive Systems II, 2010


Does the Past Say It All? Using History to Predict Change Sets in a CMDB.
Proceedings of the 14th European Conference on Software Maintenance and Reengineering, 2010

Integrated system diagnosis and root cause analysis.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

Symptom-based problem determination using log data abstraction.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

Inconsistency detection method for access control policies.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Service Oriented Architecture.
Proceedings of the Encyclopedia of Database Systems, 2009

Typing for Conflict Detection in Access Control Policies.
Proceedings of the E-Technologies: Innovation in an Open World, 2009

DRACA: decision support for root cause analysis and change impact analysis for CMDBs.
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2009

Root cause analysis and diagnosis in SOA and cloud environments.
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2009

2007
Historic data access in publish/subscribe.
Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, 2007

2006
Decentralized Execution of Event-Driven Scientific Workflows.
Proceedings of the 2006 IEEE Services Computing Workshops (SCW 2006), 2006

2005
The PADRES Distributed Publish/Subscribe System.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VIII, 2005

2000
An Agent Model for Resolution of Feature Conflicts in Telephony.
J. Netw. Syst. Manag., 2000

Policies for Feature Interaction Resolution.
Proceedings of the Managing QoS in Multimedia Networks and Services, IEEE/IFIP TC6, 2000

Feature-Interaction Resolution Using Fuzzy Policies.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VI, 2000

1999
Providing Telecommunication Services through Multi-agent Negotiation.
Proceedings of the Intelligent Agents for Telecommunication Applications, 1999

1998
High Level, Multi-Agent Prototypes from a Scenario-Path Notation: A Feature-Interaction Example.
Proceedings of the Third International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1998

How to Make Your Agents Fulfil Their Obligations.
Proceedings of the Third International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1998

A High Level Visual Notation for Understanding and Designing Collaborative, Adaptive Behavior in Multiagent Systems.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Applying Use Case Maps to Multi-Agent Systems: A Feature Interaction Example.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Coordination Based on Obligation.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Feature-Interaction Visualisation and Resolution in an Agent Environment.
Proceedings of the Feature Interactions in Telecommunications and Software Systems V, September 29, 1998

Coordinating with Obligations.
Proceedings of the Second International Conference on Autonomous Agents, 1998

1997
Issues In Using an Agent Framework For Converged Voice and Data Application.
Proceedings of the Second International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1997

Understanding and Defining the Behaviour of Systems of Agents with Use-Case Maps.
Proceedings of the Second International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1997


  Loading...