Systems management publications

Systems management integration

  1. Metin Feridun, Axel Tanner
    "A Search Engine for Systems Management," Proc. 12th IEEE/IFIP Network Operations and Management Symp. "NOMS 2010," Osaka, Japan (IEEE, April 2010), pp. 697-710.
  2. Metin Feridun, Axel Tanner
    "Using Linked Data for Systems Management,"Proc. 12th IEEE/IFIP Network Operations and Management Symp. "NOMS 2010," Osaka, Japan (IEEE, April 2010), pp. 926-929.
  3. Metin Feridun, Michael Moser, Axel Tanner
    "Building an Abstraction Layer for Management Systems Integration,"
    End-to-end Virtualization and Grid Management, First IEEE/IFIP International Workshop, EVGM 2007.

Data structures, effient processing algorithms and metrics

  1. M. Feridun, A. Tanner
    "A Search Engine for Systems Management"
    Proc. 12th IEEE/IFIP Network Operations and Management Symp. "NOMS 2010," Osaka, Japan (IEEE, April 2010), pp. 697-710.
  2. M. Feridun, A. Tanner
    "Using Linked Data for Systems Management"
    Proc. 12th IEEE/IFIP Network Operations and Management Symp. "NOMS 2010," Osaka, Japan (IEEE, April 2010), pp. 926-929.
  3. H. Ludwig, K. Bhattacharya, R. Sheftic, M. Nidd, M. Moser, A. Kind
    "Aligning Infrastructure and Business Processes using Watermarks"
    Proc. 6th Int'l Conf. on Network and Service Management "CNSM 2010," Niagara Falls, Canada, October 25-29, 2010.
  4. Kristijan Dragicevic, Daniel Bauer
    "Optimization techniques for concurrent STM-based implementations: A concurrent binary heap as a case study," IEEE IPDPS 2009.
  5. Xenofontas Dimitropoulos, Paul Hurley, Andreas Kind, Marc Stoecklin
    "On the 95-percentile billing method,"
    In Springer Proceedings of Passive and Active Measurements (PAM) Conference 2009.
  6. Xenofontas Dimitropoulos, Paul Hurley, Andreas Kind
    "Probabilistic Lossy Counting: An Efficient Algorithm for Finding Heavy Hitters,"
    ACM SIGCOMM Computer Communication Review, Jan. 2008.
  7. Xenofontas Dimitropoulos, Marc Stoecklin, Paul Hurley, Andreas Kind
    "The Eternal Sunshine of the Sketch Data Structure,"
    Elsevier Computer Networks, 2008.
  8. Paul Hurley, Marcel Waldvogel
    "Bloom Filters: One Size Fits All?"
    In Proceedings of IEEE Conference on Local Computer Networks (LCN), 2007.
  9. Daniel Bauer, Paul Hurley, Marcel Waldvogel
    "Replica Placement and Location using Distributed Hash Tables,"
    In Proceedings of IEEE Conference on Local Computer Networks (LCN), 2007.
  10. Paul Hurley, Ted Hurley
    "Module Codes in Group Rings,"
    In Proceedings of IEEE International Symposium on Information Theory (ISIT), 2007.

Dependency mining

  1. Alexandru Caracas¸ Dimitrios Dechouniotis, Stefan Fussenegger, Dieter Gantenbein, Andreas Kind
    "Mining Semantic Relations using NetFlow,"
    Third IEEE/IFIP International Workshop on Business-driven IT Management (BDIM 2008), in conjunction with IEEE Network Operations and Management Symposium (NOMS 2008), Salvador, Bahia, Brazil, April 7, 2008.
  2. Dimitrios Dechouniotis, Xenofontas Dimitropoulos, Andreas Kind, Spyros Denazis
    "Dependency Detection Using a Fuzzy Engine,"
    18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM '07), October 29-31, San Jose, California, USA, 2007.
  3. Andreas Kind, Dieter Gantenbein, Hiroaki Etoh
    "Relationship Discovery with NetFlow to Enable Business-Driven IT Management,"
    In Proceedings of IEEE/IFIP International Workshop on Business-Driven IT Management (BDIM), 2006.

Anomaly and intrusion detection

  1. Dimitrios Dechouniotis, Nikolaos Leontiou, Xenofontas Dimitropoulos, Andreas Kind, Spyros Denazis
    "Unveiling the underlying relationships over a network for monitoring purposes,"
    International Journal of Network Management, Vol. 19 (6), Pages 513 - 526, John Wiley & Sons, Ltd., 2009.
  2. Andreas Kind, Marc Stoecklin, Xenofontas Dimitropoulos
    "Histogram-based Traffic Anomaly Detection,"
    IEEE Transactions on Network and Service Management, 2009.
  3. Bernhard Jansen, Hari Govind V. Ramasamy, Matthias Schunter, Axel Tanner
    "Architecting Dependable and Secure Systems Using Virtualization, in Architecting Dependable Systems V,"
    Lecture Notes in Computer Science Volume 5135/2008, Springer 2008 (ISBN 978-3-540-85570-5), pp 124-149.
  4. Tadeusz Pietraszek, Axel Tanner
    "Data Mining and Machine Learning—Towards Reducing False Positives in Intrusion Detection,"
    Information Security Technical Report Journal, Volume 10(3), pages 169–183, 2005.
  5. Marc Stoecklin, Andreas Kind
    "Dynamic Adaptation of Flow Information Granularity for Incident Analysis,"
    In Proceedings of CERT FloCon 2008.
  6. Xenofontas Dimitropoulos, Andreas Kind
    "Automating the Configuration of Flow Monitoring Probes,"
    In Proceedings of CERT FloCon 2008.
  7. Marc Stoecklin, Jean-Yves Le Boudec, Andreas Kind
    "A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models,"
    In Springer Proceedings of Passive and Active Measurements Conference 2008.
  8. Marc Stoecklin
    "Anomaly Detection by Finding Feature Distribution Outliers,"
    In Proceedings of CoNEXT Conference 2006 (poster).

Sensor networks

  1. Luis Garcés-Erice, Daniel Bauer, Paolo Scotton
    "A Flexible and Scalable Message Broker for Sensor Network Integration,"
    ACM/IEEE COMSWARE 2009.
  2. Urs Hunkeler, Paolo Scotton
    "A Code Generator for Distributing Sensor Data Models,"
    S-CUBE 2009.

Edison intelligent power grid

[an error occurred while processing this directive]

Other publications

  1. F. Kuhn, C. Lenzen, T. Locher, R. Oshman
    "Optimal Gradient Clock Synchronization in Dynamic Networks"
    Proc. 29th ACM SIGACT-SIGOPS Symp. on Principles of Distributed Computing "PODC 2010," Zurich, Switzerland (ACM, July 2010) 430-439.
  2. M. Feridun, J. Hellerstein
    "Guest Editorial: Special Issue on Managing Emerging Computing Environments"
    Computer Networks 54(16) (2010) 2807-2808 (invited).
  3. C. Araujo, A. Biazetti, A. Bussani, J. Derringer, M. Feridun, A. Tanner
    "Simplifying Correlation Rule Creation for Effective Systems Monitoring"
    in "Utility Computing" Proc. 15th IFIP/IEEE Distributed Systems: Operations and Management "DSOM 2004," Davis, CA, Lecture Notes in Computer Science, vol. 3278 (Springer, Berlin / Heidelberg, 2004), 266-268.
  4. Tomas Tuma, Sean Rooney, Paul Hurley
    "On the Applicability of Compressive Sampling in Fine Grained Processor Performance Monitoring,"
    IEEE ICECCS.
  5. Carl Binding, François Dolivo, Reto Hermann, Dirk Husemann, Andreas Schade
    "Securing trade lanes using an autonomous tracking device,
    IET Intelligent Transport Systems, Vol 3, No. 3, pp.268-281, 2009.
  6. Luis Garcés-Erice
    "Admission Control for Distributed Complex Responsive Systems,"
    IEEE ISPDC 2009.
  7. Luis Garcés-Erice
    "Building an Enterprise Service Bus for Real-Time SOA: A Messaging Middleware Stack,"
    IEEE COMPSAC 2009.
  8. Xenofontas Dimitropoulos, Dmitri Krioukov, Amin Vahdat, George Riley
    "Graph Annotations in Modeling Complex Network Topologies,"
    ACM Transactions on Modeling and Computer Simulation (TOMACS), 2009.
  9. Andreas Kind, Spyros Denazis, Xenofontas Dimitropoulos, Benoit Claise
    "Advanced Network Monitoring Brings Life to the Awareness Plane,"
    IEEE Communications Magazine, Network & Service Management Series, 2008.
  10. Ronnie Sarkar, Murthy V. Devarakonda, Axel Tanner
    "Policy-Based Automation to Improve Solution Engineering in IT Services,"
    IEEE SCC (2) 2008: 52-59.
  11. Xenofontas Dimitropoulos, M. Angeles Serrano, Dmitri Krioukov
    "On Cycles in AS Relationships,"
    ACM SIGCOMM Computer Communication Review (CCR), Jul. 2008 (invited).
  12. Andreas Kind, Paul Hurley, Jeroen Massar
    "A Light-Weight and Scalable Network Profiling System,"
    In ERCIM News, European Research Consortium for Informatics and Mathematics, pp. 67-68, Jan 2005.
  13. Anthony Bussani, John Linwood Griffin, Bernhard Jansen, Klaus Julisch, Guenter Karjoth, Hiroshi Maruyama, Megumi Nakamura, Ronald Perez, Matthias Schunter, Axel Tanner, Leendert Van Doorn, Els A. Van Herreweghen, Michael Waidner, Sachiko Yoshihama
    "Trusted Virtual Domains: Secure Foundations for Business and IT Services,"
    RC23792, IBM Watson T.J. Watson, New York, NY, November 2005.