Author of the publication

Discovering and Visualizing Operations Processes with POD-Discovery and POD-Viz.

, , , , and . DSN, page 537-544. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Architectural Approach for Cost Effective Trustworthy Systems., , , , and . WICSA/ECSA, page 325-328. IEEE, (2012)Evaluating the Software Architecture Competence of Organizations., , , and . WICSA, page 249-252. IEEE Computer Society, (2008)Quality Session Report., , and . WICSA, page 191-192. IEEE Computer Society, (2005)Analysis of architecture evaluation data., , , , and . Journal of Systems and Software, 81 (9): 1443-1455 (2008)Using Business Goals to Inform a Software Architecture., and . RE, page 69-78. IEEE Computer Society, (2010)Cloud Application HA Using SDN to Ensure QoS., , and . CLOUD, page 1003-1007. IEEE, (2015)Creating Meaningful Assessments for Professional Development Education in Software Architecture., and . CSEE&T, page 283-290. IEEE Computer Society, (2007)Supporting Undoability in Systems Operations., , , , and . LISA, page 75-88. USENIX Association, (2013)Crying Wolf and Meaning It: Reducing False Alarms in Monitoring of Sporadic Operations through POD-Monitor., , , , , , , and . COUFLESS@ICSE, page 69-75. IEEE Computer Society, (2015)Eliciting operations requirements for applications., , , , and . RELENG@ICSE, page 5-8. IEEE Computer Society, (2013)