Aad van Moorsel
Aad van Moorsel
Professor of Computer Science, Newcastle University, UK
Verified email at ncl.ac.uk - Homepage
Cited by
Cited by
Automated SLA monitoring for web services
A Sahai, V Machiraju, M Sayal, A Van Moorsel, F Casati
International Workshop on Distributed Systems: Operations and Management, 28-41, 2002
A methodology for detection and estimation of software aging
S Garg, A Van Moorsel, K Vaidyanathan, KS Trivedi
Proceedings Ninth International Symposium on Software Reliability …, 1998
Metrics for the internet age: Quality of experience and quality of business
A Van Moorsel
Fifth International Workshop on Performability Modeling of Computer and …, 2001
Blockchain-based smart contracts: A systematic mapping study
M Alharby, A Van Moorsel
arXiv preprint arXiv:1710.06372, 2017
Specifying and monitoring guarantees in commercial grids through SLA
A Sahai, S Graupner, V Machiraju, A van Moorsel
CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and …, 2003
Optimal allocation of test resources for software reliability growth modeling in software development
MR Lyu, S Rangarajan, APA Van Moorsel
IEEE Transactions on reliability 51 (2), 183-192, 2002
Self-star properties in complex information systems: Conceptual and practical foundations
O Babaoglu, M Jelasity, A Montresor, C Fetzer, S Leonardi, A van Moorsel, ...
Springer, 2005
Adaptive uniformization
APA Van Moorsel, WH Sanders
Stochastic Models 10 (3), 619-647, 1994
A holistic framework for trust in online transactions
F Li, D Pieńkowski, A van Moorsel, C Smith
International Journal of Management Reviews 14 (1), 85-103, 2012
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing
C Dong, Y Wang, A Aldweesh, P McCorry, A van Moorsel
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Method and apparatus for representing data available in a peer-to-peer network using bloom-filters
A Mohan, V Kalogeraki, A Moorsel
US Patent App. 10/699,359, 2005
Web services management network
V Machiraju, A Sahai, A Van Moorsel
International Symposium on Integrated Network Management, 351-364, 2003
Analysis of restart mechanisms in software systems
APA Van Moorsel, K Wolter
IEEE Transactions on Software Engineering 32 (8), 547-558, 2006
An information security ontology incorporating human-behavioural implications
SE Parkin, A van Moorsel, R Coles
Proceedings of the 2nd International Conference on Security of Information …, 2009
Transient solution of Markov models by combining adaptive and standard uniformization
APA Van Moorsel, WH Sanders
IEEE transactions on reliability 46 (3), 430-440, 1997
A stealth approach to usable security: helping IT security managers to identify workable security solutions
S Parkin, A Van Moorsel, P Inglesant, MA Sasse
Proceedings of the 2010 New Security Paradigms Workshop, 33-50, 2010
Analysis and algorithms for restart
APA Van Moorsel, K Wolter
First International Conference on the Quantitative Evaluation of Systems …, 2004
Resilience assessment and evaluation of computing systems
K Wolter, A Avritzer, M Vieira, A Van Moorsel
Springer, 2012
User-managed access to web resources
MP Machulak, EL Maler, D Catalano, A Van Moorsel
Proceedings of the 6th ACM workshop on Digital identity management, 35-44, 2010
Method and apparatus for use in specifying and insuring policies for management of computer networks
MJ Bearden, S Garg, WJ Lee, APA Van Moorsel
US Patent 6,732,168, 2004
The system can't perform the operation now. Try again later.
Articles 1–20