The SCEAS System
Navigation Menu

Search the dblp DataBase


Mark Burgess: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mark Burgess
    Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems. [Citation Graph (0, 0)][DBLP]
    DSOM, 2002, pp:169-180 [Conf]
  2. Mark Burgess
    An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation. [Citation Graph (0, 0)][DBLP]
    DSOM, 2005, pp:97-108 [Conf]
  3. Mark Burgess, Sven Ingebrigt Ulland
    Uncertainty in Global Application Services with Load Sharing Policy. [Citation Graph (0, 0)][DBLP]
    DSOM, 2006, pp:37-48 [Conf]
  4. Mark Burgess, Gard Undheim
    Predictable Scaling Behaviour in the Data Centre with Multiple Application Servers. [Citation Graph (0, 0)][DBLP]
    DSOM, 2006, pp:49-60 [Conf]
  5. Kyrre M. Begnum, Mark Burgess, John A. Sechrest
    Adaptive provisioning using virtual machines and autonomous role-based management. [Citation Graph (0, 0)][DBLP]
    ICAS, 2006, pp:7- [Conf]
  6. Kyrre M. Begnum, Mark Burgess
    A Scaled, Immunological Approach to Anomaly Countermeasures: Combining pH with Cfengine. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2003, pp:31-42 [Conf]
  7. Mark Burgess, Geoffrey Canright
    Scalability of Peer Configuration Management in Partially Reliable and Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2003, pp:293-305 [Conf]
  8. Mark Burgess
    Talking to the Walls (Again). [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  9. Mark Burgess
    Theoretical System Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:1-13 [Conf]
  10. Mark Burgess
    Anomaly Detection: Whatever Happened to Computer Immunology? [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  11. Mark Burgess
    Computer Immunology. [Citation Graph (0, 0)][DBLP]
    LISA, 1998, pp:283-298 [Conf]
  12. Mark Burgess, Demosthenes Skipitaris
    Adaptive Locks For Frequently Scheduled Tasks With Unpredictable Runtimes. [Citation Graph (0, 0)][DBLP]
    LISA, 1997, pp:113-122 [Conf]
  13. Tuva Stang, Fahimeh Pourbayat, Mark Burgess, Geoffrey Canright, Kenth Engø, Åsmund Weltzien
    Archipelago: A Network Security Analysis Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:149-158 [Conf]
  14. Mark Burgess, Kyrre M. Begnum
    Voluntary Cooperation in Pervasive Computing Services. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:143-154 [Conf]
  15. Mark Burgess, Alva L. Couch
    Modeling Next Generation Configuration Management Tools. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:131-147 [Conf]
  16. Kyrre M. Begnum, Mark Burgess, Tore M. Jonassen, Siri Fagernes
    Summary of Stability of Adaptive Service Level Agreements. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:111-114 [Conf]
  17. Mark Burgess, Frode Eika Sandnes
    A Promise Theory Approach to Collaborative Power Reduction in a Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:615-624 [Conf]
  18. Mark Burgess, Siri Fagernes
    Promise theory - a model of autonomous objects for pervasive computing and swarms. [Citation Graph (0, 0)][DBLP]
    ICNS, 2006, pp:118- [Conf]
  19. Mark Burgess
    On the theory of system administration [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  20. Mark Burgess
    A Site Configuration Engine. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1995, v:8, n:2, pp:309-337 [Journal]
  21. Mark Burgess, Geoffrey Canright, Kenth Engø-Monsen
    A graph-theoretical model of computer security. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:70-85 [Journal]
  22. Hanan Lutfiyya, Mark Burgess, Duminda Wijesekera
    Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2006, v:14, n:4, pp:599-602 [Journal]
  23. Kyrre M. Begnum, Mark Burgess
    Principle Components and Importance Ranking of Distributed Anomalies. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 2005, v:58, n:2-3, pp:217-230 [Journal]
  24. Mark Burgess
    On the theory of system administration. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2003, v:49, n:1-3, pp:1-46 [Journal]
  25. Mark Burgess
    Configurable immunity for evolving human-computer systems. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2004, v:51, n:3, pp:197-213 [Journal]
  26. Mark Burgess
    Topics in system administration. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2004, v:53, n:2, pp:123-124 [Journal]
  27. Mark Burgess
    Probabilistic anomaly detection in distributed computer networks. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2006, v:60, n:1, pp:1-26 [Journal]
  28. Mark Burgess, Trond Reitan
    A risk analysis of disk backup or repository maintenance. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:64, n:3, pp:312-331 [Journal]
  29. Mark Burgess
    Automated System Administration with Feedback Regulation. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1998, v:28, n:14, pp:1519-1530 [Journal]
  30. Mark Burgess, Ricky Ralston
    Distributed Resource Administration Using Cfengine. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1997, v:27, n:9, pp:1083-1101 [Journal]
  31. Mark Burgess, Hårek Haugerud, Sigmund Straumsnes, Trond Reitan
    Measuring system normality. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2002, v:20, n:2, pp:125-160 [Journal]
  32. Remi Badonnel, Mark Burgess
    Fault Detection in Autonomic Networks Using the Concept of Promised Cooperation. [Citation Graph (0, 0)][DBLP]
    DSOM, 2007, pp:62-73 [Conf]
  33. Jon Henrik Bjornstad, Mark Burgess
    Reliability of Service Level Estimators in the Data Centre. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:733-736 [Conf]
  34. Kyrre M. Begnum, Mark Burgess
    Improving Anomaly Detection Event Analysis Using the EventRank Algorithm. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:145-155 [Conf]
  35. Kyrre M. Begnum, Mark Burgess
    Understanding Promise Theory Using Rewriting Logic. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:204-207 [Conf]
  36. Mark Burgess, Siri Fagernes
    Norms and Swarms. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:109-120 [Conf]
  37. Jan A. Bergstra, Inge Bethke, Mark Burgess
    A process algebra based framework for promise theory [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  38. Management without (Detailed) Models. [Citation Graph (, )][DBLP]

  39. Network Patterns in Cfengine and Scalable Data Aggregation. [Citation Graph (, )][DBLP]

  40. Master Education Programmes in Network and System Administration. [Citation Graph (, )][DBLP]

  41. Knowledge Management and Promises. [Citation Graph (, )][DBLP]

  42. Service Load Balancing with Autonomic Servers: Reversing the Decision Making Process. [Citation Graph (, )][DBLP]

  43. Integrating cfengine and scli: Managing network devices like host systems. [Citation Graph (, )][DBLP]

  44. On the complexity of determining autonomic policy constrained behaviour. [Citation Graph (, )][DBLP]

  45. Dynamic pull-based load balancing for autonomic servers. [Citation Graph (, )][DBLP]

  46. Program Promises [Citation Graph (, )][DBLP]

  47. A static theory of promises [Citation Graph (, )][DBLP]

  48. Local and Global Trust Based on the Concept of Promises [Citation Graph (, )][DBLP]

  49. Eigenvectors of directed graphs and importance scores: dominance, T-Rank, and sink remedies. [Citation Graph (, )][DBLP]

Search in 0.021secs, Finished in 0.023secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002