Search the dblp DataBase
Mark Burgess :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mark Burgess Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems. [Citation Graph (0, 0)][DBLP ] DSOM, 2002, pp:169-180 [Conf ] Mark Burgess An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation. [Citation Graph (0, 0)][DBLP ] DSOM, 2005, pp:97-108 [Conf ] Mark Burgess , Sven Ingebrigt Ulland Uncertainty in Global Application Services with Load Sharing Policy. [Citation Graph (0, 0)][DBLP ] DSOM, 2006, pp:37-48 [Conf ] Mark Burgess , Gard Undheim Predictable Scaling Behaviour in the Data Centre with Multiple Application Servers. [Citation Graph (0, 0)][DBLP ] DSOM, 2006, pp:49-60 [Conf ] Kyrre M. Begnum , Mark Burgess , John A. Sechrest Adaptive provisioning using virtual machines and autonomous role-based management. [Citation Graph (0, 0)][DBLP ] ICAS, 2006, pp:7- [Conf ] Kyrre M. Begnum , Mark Burgess A Scaled, Immunological Approach to Anomaly Countermeasures: Combining pH with Cfengine. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2003, pp:31-42 [Conf ] Mark Burgess , Geoffrey Canright Scalability of Peer Configuration Management in Partially Reliable and Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2003, pp:293-305 [Conf ] Mark Burgess Talking to the Walls (Again). [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Mark Burgess Theoretical System Administration. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:1-13 [Conf ] Mark Burgess Anomaly Detection: Whatever Happened to Computer Immunology? [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Mark Burgess Computer Immunology. [Citation Graph (0, 0)][DBLP ] LISA, 1998, pp:283-298 [Conf ] Mark Burgess , Demosthenes Skipitaris Adaptive Locks For Frequently Scheduled Tasks With Unpredictable Runtimes. [Citation Graph (0, 0)][DBLP ] LISA, 1997, pp:113-122 [Conf ] Tuva Stang , Fahimeh Pourbayat , Mark Burgess , Geoffrey Canright , Kenth Engø , Åsmund Weltzien Archipelago: A Network Security Analysis Tool. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:149-158 [Conf ] Mark Burgess , Kyrre M. Begnum Voluntary Cooperation in Pervasive Computing Services. [Citation Graph (0, 0)][DBLP ] LISA, 2005, pp:143-154 [Conf ] Mark Burgess , Alva L. Couch Modeling Next Generation Configuration Management Tools. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:131-147 [Conf ] Kyrre M. Begnum , Mark Burgess , Tore M. Jonassen , Siri Fagernes Summary of Stability of Adaptive Service Level Agreements. [Citation Graph (0, 0)][DBLP ] POLICY, 2005, pp:111-114 [Conf ] Mark Burgess , Frode Eika Sandnes A Promise Theory Approach to Collaborative Power Reduction in a Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:615-624 [Conf ] Mark Burgess , Siri Fagernes Promise theory - a model of autonomous objects for pervasive computing and swarms. [Citation Graph (0, 0)][DBLP ] ICNS, 2006, pp:118- [Conf ] Mark Burgess On the theory of system administration [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Mark Burgess A Site Configuration Engine. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1995, v:8, n:2, pp:309-337 [Journal ] Mark Burgess , Geoffrey Canright , Kenth Engø-Monsen A graph-theoretical model of computer security. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:2, pp:70-85 [Journal ] Hanan Lutfiyya , Mark Burgess , Duminda Wijesekera Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2006, v:14, n:4, pp:599-602 [Journal ] Kyrre M. Begnum , Mark Burgess Principle Components and Importance Ranking of Distributed Anomalies. [Citation Graph (0, 0)][DBLP ] Machine Learning, 2005, v:58, n:2-3, pp:217-230 [Journal ] Mark Burgess On the theory of system administration. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2003, v:49, n:1-3, pp:1-46 [Journal ] Mark Burgess Configurable immunity for evolving human-computer systems. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2004, v:51, n:3, pp:197-213 [Journal ] Mark Burgess Topics in system administration. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2004, v:53, n:2, pp:123-124 [Journal ] Mark Burgess Probabilistic anomaly detection in distributed computer networks. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2006, v:60, n:1, pp:1-26 [Journal ] Mark Burgess , Trond Reitan A risk analysis of disk backup or repository maintenance. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2007, v:64, n:3, pp:312-331 [Journal ] Mark Burgess Automated System Administration with Feedback Regulation. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1998, v:28, n:14, pp:1519-1530 [Journal ] Mark Burgess , Ricky Ralston Distributed Resource Administration Using Cfengine. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1997, v:27, n:9, pp:1083-1101 [Journal ] Mark Burgess , Hårek Haugerud , Sigmund Straumsnes , Trond Reitan Measuring system normality. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 2002, v:20, n:2, pp:125-160 [Journal ] Remi Badonnel , Mark Burgess Fault Detection in Autonomic Networks Using the Concept of Promised Cooperation. [Citation Graph (0, 0)][DBLP ] DSOM, 2007, pp:62-73 [Conf ] Jon Henrik Bjornstad , Mark Burgess Reliability of Service Level Estimators in the Data Centre. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2007, pp:733-736 [Conf ] Kyrre M. Begnum , Mark Burgess Improving Anomaly Detection Event Analysis Using the EventRank Algorithm. [Citation Graph (0, 0)][DBLP ] AIMS, 2007, pp:145-155 [Conf ] Kyrre M. Begnum , Mark Burgess Understanding Promise Theory Using Rewriting Logic. [Citation Graph (0, 0)][DBLP ] AIMS, 2007, pp:204-207 [Conf ] Mark Burgess , Siri Fagernes Norms and Swarms. [Citation Graph (0, 0)][DBLP ] AIMS, 2007, pp:109-120 [Conf ] Jan A. Bergstra , Inge Bethke , Mark Burgess A process algebra based framework for promise theory [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Management without (Detailed) Models. [Citation Graph (, )][DBLP ] Network Patterns in Cfengine and Scalable Data Aggregation. [Citation Graph (, )][DBLP ] Master Education Programmes in Network and System Administration. [Citation Graph (, )][DBLP ] Knowledge Management and Promises. [Citation Graph (, )][DBLP ] Service Load Balancing with Autonomic Servers: Reversing the Decision Making Process. [Citation Graph (, )][DBLP ] Integrating cfengine and scli: Managing network devices like host systems. [Citation Graph (, )][DBLP ] On the complexity of determining autonomic policy constrained behaviour. [Citation Graph (, )][DBLP ] Dynamic pull-based load balancing for autonomic servers. [Citation Graph (, )][DBLP ] Program Promises [Citation Graph (, )][DBLP ] A static theory of promises [Citation Graph (, )][DBLP ] Local and Global Trust Based on the Concept of Promises [Citation Graph (, )][DBLP ] Eigenvectors of directed graphs and importance scores: dominance, T-Rank, and sink remedies. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.460secs