default search action
Serge Mankovskii
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c42]Darius Coelho, Rubin Trailor, Daniel Sill, Sophie Engle, Alark Joshi, Serge Mankovskii, Maria C. Velez-Rojas, Steven Greenspan, Klaus Mueller:
Collaborative Visual Analytics Using Blockchain. CDVE 2020: 209-219
2010 – 2019
- 2018
- [c41]Yang Wang, Stephen C. Adams, Peter A. Beling, Steven Greenspan, Sridhar Rajagopalan, Maria C. Velez-Rojas, Serge Mankovski, Steven M. Boker, Donald E. Brown:
Privacy Preserving Distributed Deep Learning and Its Application in Credit Card Fraud Detection. TrustCom/BigDataSE 2018: 1070-1078 - [c40]Stephen C. Adams, Peter A. Beling, Steven Greenspan, Maria C. Velez-Rojas, Serge Mankovski:
Model-Based Trust Assessment for Internet of Things Networks. TrustCom/BigDataSE 2018: 1838-1843 - [r7]Serge Mankovski:
Coupling and Decoupling. Encyclopedia of Database Systems (2nd ed.) 2018 - [r6]Serge Mankovski:
Loose Coupling. Encyclopedia of Database Systems (2nd ed.) 2018 - [r5]Serge Mankovski:
OASIS. Encyclopedia of Database Systems (2nd ed.) 2018 - [r4]Serge Mankovski:
Service-Oriented Architecture. Encyclopedia of Database Systems (2nd ed.) 2018 - [r3]Serge Mankovski:
Tight Coupling. Encyclopedia of Database Systems (2nd ed.) 2018 - [r2]Serge Mankovski:
W3C. Encyclopedia of Database Systems (2nd ed.) 2018 - 2016
- [j3]Haroon Malik, Ian J. Davis, Michael W. Godfrey, Douglas Neuse, Serge Mankovskii:
Connecting the dots: anomaly and discontinuity detection in large-scale systems. J. Ambient Intell. Humaniz. Comput. 7(4): 509-522 (2016) - 2015
- [p1]Hamzeh Zawawy, Serge Mankovskii, Kostas Kontogiannis, John Mylopoulos:
Mining Software Logs for Goal-Driven Root Cause Analysis. The Art and Science of Analyzing Software Data 2015: 519-554 - 2014
- [c39]Haroon Malik, Ian J. Davis, Michael W. Godfrey, Douglas Neuse, Serge Mankovskii:
Detecting Discontinuities in Large Scale Systems. UCC 2014: 345-354 - 2013
- [c38]Ian J. Davis, Hadi Hemmati, Richard C. Holt, Michael W. Godfrey, Douglas Neuse, Serge Mankovskii:
Regression-based utilization prediction algorithms: an empirical investigation. CASCON 2013: 106-120 - [c37]Maria C. Velez-Rojas, Serge Mankovskii, Michael Roberts, Steven Greenspan, Esin Kiris:
Looking beyond the Single Pane of Glass: Visualization and Perspective in Enterprise Network. HCI (12) 2013: 581-590 - [c36]Ian J. Davis, Hadi Hemmati, Richard C. Holt, Michael W. Godfrey, Douglas Neuse, Serge Mankovskii:
Storm prediction in a cloud. PESOS@ICSE 2013: 37-40 - [c35]Farhana H. Zulkernine, Patrick Martin, Wendy Powley, Sima Soltani, Serge Mankovski, Mark Addleman:
CAPRI: a tool for mining complex line patterns in large log data. BigMine 2013: 47-54 - 2012
- [c34]Przemyslaw Pawluk, Bradley Simmons, Michael Smit, Marin Litoiu, Serge Mankovski:
Introducing STRATOS: A Cloud Broker Service. IEEE CLOUD 2012: 891-898 - [c33]Hamzeh Zawawy, Kostas Kontogiannis, John Mylopoulos, Serge Mankovski:
Requirements-Driven Root Cause Analysis Using Markov Logic Networks. CAiSE 2012: 350-365 - [c32]Ian J. Davis, Michael W. Godfrey, Richard C. Holt, Serge Mankovski, Nick Minchenko:
Analyzing Assembler to Eliminate Dead Functions: An Industrial Experience. CSMR 2012: 467-470 - [c31]Farhana H. Zulkernine, Patrick Martin, Sima Soltani, Wendy Powley, Serge Mankovski, Mark Addleman:
Towards a Training-Oriented Adaptive Decision Guidance and Support System. ICDE Workshops 2012: 111-120 - 2011
- [j2]Yacine Bouzida, Luigi Logrippo, Serge Mankovski:
Concrete- and abstract-based access control. Int. J. Inf. Sec. 10(4): 223-238 (2011) - [c30]Hamzeh Zawawy, Kostas Kontogiannis, John Mylopoulos, Serge Mankovski:
Towards a requirements-driven framework for detecting malicious behavior against software systems. CASCON 2011: 15-29 - [c29]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk-based decision method for access control systems. PST 2011: 189-192 - [c28]Kostas Kontogiannis, Ahmed Wasfy, Serge Mankovski:
Event clustering for log reduction and run time system understanding. SAC 2011: 191-192 - 2010
- [c27]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Inconsistency detection method for access control policies. IAS 2010: 204-209 - [c26]Liang Huang, Xiaodi Ke, Kenny Wong, Serge Mankovski:
Symptom-based problem determination using log data abstraction. CASCON 2010: 313-326 - [c25]Kenny Wong, Serge Mankovski, Kostas Kontogiannis, Hausi A. Müller, John Mylopoulos:
Integrated system diagnosis and root cause analysis. CASCON 2010: 427-428 - [c24]Sarah Nadi, Richard C. Holt, Serge Mankovski:
Does the Past Say It All? Using History to Predict Change Sets in a CMDB. CSMR 2010: 97-106 - [c23]Rogério de Lemos, Holger Giese, Hausi A. Müller, Mary Shaw, Jesper Andersson, Marin Litoiu, Bradley R. Schmerl, Gabriel Tamura, Norha M. Villegas, Thomas Vogel, Danny Weyns, Luciano Baresi, Basil Becker, Nelly Bencomo, Yuriy Brun, Bojan Cukic, Ronald J. Desmarais, Schahram Dustdar, Gregor Engels, Kurt Geihs, Karl M. Göschka, Alessandra Gorla, Vincenzo Grassi, Paola Inverardi, Gabor Karsai, Jeff Kramer, Antónia Lopes, Jeff Magee, Sam Malek, Serge Mankovski, Raffaela Mirandola, John Mylopoulos, Oscar Nierstrasz, Mauro Pezzè, Christian Prehofer, Wilhelm Schäfer, Richard D. Schlichting, Dennis B. Smith, João Pedro Sousa, Ladan Tahvildari, Kenny Wong, Jochen Wuttke:
Software Engineering for Self-Adaptive Systems: A Second Research Roadmap. Software Engineering for Self-Adaptive Systems 2010: 1-32 - [c22]Gabriel Tamura, Norha M. Villegas, Hausi A. Müller, João Pedro Sousa, Basil Becker, Gabor Karsai, Serge Mankovski, Mauro Pezzè, Wilhelm Schäfer, Ladan Tahvildari, Kenny Wong:
Towards Practical Runtime Verification and Validation of Self-Adaptive Software Systems. Software Engineering for Self-Adaptive Systems 2010: 108-132 - [c21]Ji Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski:
Risk Analysis in Access Control Systems Based on Trust Theories. Web Intelligence/IAT Workshops 2010: 415-418 - [c20]Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk management in dynamic role based access control systems. ICDIM 2010: 1-8 - [c19]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Detecting incompleteness in access control policies using data classification schemes. ICDIM 2010: 417-422 - [i1]Rogério de Lemos, Holger Giese, Hausi A. Müller, Mary Shaw, Jesper Andersson, Luciano Baresi, Basil Becker, Nelly Bencomo, Yuriy Brun, Bojan Cukic, Ronald J. Desmarais, Schahram Dustdar, Gregor Engels, Kurt Geihs, Karl M. Göschka, Alessandra Gorla, Vincenzo Grassi, Paola Inverardi, Gabor Karsai, Jeff Kramer, Marin Litoiu, Antónia Lopes, Jeff Magee, Sam Malek, Serge Mankovskii, Raffaela Mirandola, John Mylopoulos, Oscar Nierstrasz, Mauro Pezzè, Christian Prehofer, Wilhelm Schäfer, Richard D. Schlichting, Bradley R. Schmerl, Dennis B. Smith, João Pedro Sousa, Gabriel Tamura, Ladan Tahvildari, Norha M. Villegas, Thomas Vogel, Danny Weyns, Kenny Wong, Jochen Wuttke:
Software Engineering for Self-Adaptive Systems: A second Research Roadmap. Software Engineering for Self-Adaptive Systems 2010
2000 – 2009
- 2009
- [c18]Sarah Nadi, Richard C. Holt, Ian J. Davis, Serge Mankovski:
DRACA: decision support for root cause analysis and change impact analysis for CMDBs. CASCON 2009: 1-11 - [c17]Serge Mankovski, Kostas Kontogiannis, Hausi A. Müller, Ken Wong:
Root cause analysis and diagnosis in SOA and cloud environments. CASCON 2009: 335-336 - [c16]Kamel Adi, Yacine Bouzida, Ikhlass Hattak, Luigi Logrippo, Serge Mankovski:
Typing for Conflict Detection in Access Control Policies. MCETECH 2009: 212-226 - [r1]Serge Mankovski:
Service Oriented Architecture. Encyclopedia of Database Systems 2009: 2633-2636 - 2007
- [c15]Guoli Li, Alex King Yeung Cheung, Shuang Hou, Songlin Hu, Vinod Muthusamy, R. Sherafat, Alex Wun, Hans-Arno Jacobsen, Serge Mankovski:
Historic data access in publish/subscribe. DEBS 2007: 80-84 - 2006
- [c14]Guoli Li, Vinod Muthusamy, Hans-Arno Jacobsen, Serge Mankovski:
Decentralized Execution of Event-Driven Scientific Workflows. SCW 2006: 73-82 - 2005
- [c13]E. Fidler, Hans-Arno Jacobsen, Guoli Li, Serge Mankovski:
The PADRES Distributed Publish/Subscribe System. FIW 2005: 12-30 - 2000
- [j1]Magdi Amer, Ahmed Karmouch, Tom Gray, Serge Mankovski:
An Agent Model for Resolution of Feature Conflicts in Telephony. J. Netw. Syst. Manag. 8(3): 419-437 (2000) - [c12]Magdi Amer, Ahmed Karmouch, Tom Gray, Serge Mankovski:
Feature-Interaction Resolution Using Fuzzy Policies. FIW 2000: 94-112 - [c11]Magdi Amer, Ahmed Karmouch, Tom Gray, Serge Mankovski:
Policies for Feature Interaction Resolution. MMNS 2000: 207-223
1990 – 1999
- 1999
- [c10]Mihai Barbuceanu, Tom Gray, Serge Mankovski:
Providing Telecommunication Services through Multi-agent Negotiation. IATA 1999: 124-136 - 1998
- [c9]Mihai Barbuceanu, Tom Gray, Serge Mankovski:
Coordinating with Obligations. Agents 1998: 62-69 - [c8]Raymond J. A. Buhr, Daniel Amyot, Mohamed Elammari, Darcy Quesnel, Tom Gray, Serge Mankovski:
Feature-Interaction Visualisation and Resolution in an Agent Environment. FIW 1998: 135-149 - [c7]Mihai Barbuceanu, Tom Gray, Serge Mankovski:
Coordination Based on Obligation. HICSS (7) 1998: 14-23 - [c6]Raymond J. A. Buhr, Mohamed Elammari, Tom Gray, Serge Mankovski:
Applying Use Case Maps to Multi-Agent Systems: A Feature Interaction Example. HICSS (6) 1998: 171-179 - [c5]Raymond J. A. Buhr, Mohamed Elammari, Tom Gray, Serge Mankovski:
A High Level Visual Notation for Understanding and Designing Collaborative, Adaptive Behavior in Multiagent Systems. HICSS (6) 1998: 180- - [c4]Mihai Barbuceanu, Tom Gray, Serge Mankovski:
How to Make Your Agents Fulfil Their Obligations. PAAM 1998: 255-276 - [c3]Raymond J. A. Buhr, Daniel Amyot, Mohamed Elammari, Darcy Quesnel, Tom Gray, Serge Mankovski:
High Level, Multi-Agent Prototypes from a Scenario-Path Notation: A Feature-Interaction Example. PAAM 1998: 277-296 - 1997
- [c2]Debbie Pinard, Tom Gray, Serge Mankovski, Michael Weiss:
Issues In Using an Agent Framework For Converged Voice and Data Application. PAAM 1997: 487-506 - [c1]Raymond J. A. Buhr, Mohamed Elammari, Tom Gray, Debbie Pinard, Serge Mankovski:
Understanding and Defining the Behaviour of Systems of Agents with Use-Case Maps. PAAM 1997: 527-528
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint