Author of the publication

Towards More Effective Solution Retrieval in IT Support Services Using Systems Log.

, , , , , and . ICSOC, volume 9936 of Lecture Notes in Computer Science, page 730-744. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards automated provisioning of secure virtualized networks., , , and . ACM Conference on Computer and Communications Security, page 235-245. ACM, (2007)Automated Incident Management for a Platform-as-a-Service Cloud., , , , and . Hot-ICE, USENIX Association, (2011)Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System., , and . PRDC, page 9-18. IEEE Computer Society, (2002)Providing Resiliency to Orchestration and Automation Engines in Hybrid Cloud., , , and . DSN Workshops, page 125-128. IEEE Computer Society, (2017)Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast., and . IACR Cryptology ePrint Archive, (2006)Scheduling Physical Machine Maintenance on Qualified Clouds: What if Migration is not Allowed?, , and . CLOUD, page 485-492. IEEE, (2020)Disaster Recovery for Cloud-Hosted Enterprise Applications., , , and . CLOUD, page 432-439. IEEE Computer Society, (2016)Activating Protection and Exercising Recovery Against Large-Scale Outages on the Cloud., , , and . DSN Workshops, page 264. IEEE Computer Society, (2016)Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems., , , , and . DSN, page 229-238. IEEE Computer Society, (2002)Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures., , , , and . LADC, volume 2847 of Lecture Notes in Computer Science, page 81-101. Springer, (2003)