Aad van Moorsel
Aad van Moorsel
Professor of Computer Science, Newcastle University, UK
Verified email at ncl.ac.uk - Homepage
Cited by
Cited by
Automated SLA monitoring for web services
A Sahai, V Machiraju, M Sayal, A Van Moorsel, F Casati
International Workshop on Distributed Systems: Operations and Management, 28-41, 2002
A methodology for detection and estimation of software aging
S Garg, A Van Moorsel, K Vaidyanathan, KS Trivedi
Proceedings Ninth International Symposium on Software Reliability …, 1998
Metrics for the internet age: Quality of experience and quality of business
A Van Moorsel
Fifth International Workshop on Performability Modeling of Computer and …, 2001
Blockchain-based smart contracts: A systematic mapping study
M Alharby, A Van Moorsel
arXiv preprint arXiv:1710.06372, 2017
Specifying and monitoring guarantees in commercial grids through SLA
A Sahai, S Graupner, V Machiraju, A van Moorsel
CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and …, 2003
Optimal allocation of test resources for software reliability growth modeling in software development
MR Lyu, S Rangarajan, APA Van Moorsel
IEEE Transactions on reliability 51 (2), 183-192, 2002
Self-star properties in complex information systems: Conceptual and practical foundations
O Babaoglu, M Jelasity, A Montresor, C Fetzer, S Leonardi, A van Moorsel, ...
Springer, 2005
Adaptive uniformization
APA Van Moorsel, WH Sanders
Stochastic Models 10 (3), 619-647, 1994
A holistic framework for trust in online transactions
F Li, D Pieńkowski, A van Moorsel, C Smith
International Journal of Management Reviews 14 (1), 85-103, 2012
Method and apparatus for representing data available in a peer-to-peer network using bloom-filters
A Mohan, V Kalogeraki, A Moorsel
US Patent App. 10/699,359, 2005
Web services management network
V Machiraju, A Sahai, A Van Moorsel
International Symposium on Integrated Network Management, 351-364, 2003
Analysis of restart mechanisms in software systems
APA Van Moorsel, K Wolter
IEEE Transactions on Software Engineering 32 (8), 547-558, 2006
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing
C Dong, Y Wang, A Aldweesh, P McCorry, A van Moorsel
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
An information security ontology incorporating human-behavioural implications
SE Parkin, A van Moorsel, R Coles
Proceedings of the 2nd International Conference on Security of Information …, 2009
Transient solution of Markov models by combining adaptive and standard uniformization
APA Van Moorsel, WH Sanders
IEEE Transactions on Reliability 46 (3), 430-440, 1997
Analysis and algorithms for restart
APA Van Moorsel, K Wolter
First International Conference on the Quantitative Evaluation of Systems …, 2004
A stealth approach to usable security: helping IT security managers to identify workable security solutions
S Parkin, A Van Moorsel, P Inglesant, MA Sasse
Proceedings of the 2010 New Security Paradigms Workshop, 33-50, 2010
Method and apparatus for use in specifying and insuring policies for management of computer networks
MJ Bearden, S Garg, WJ Lee, APA Van Moorsel
US Patent 6,732,168, 2004
Method and apparatus for use in specifying and insuring service-level quality of service in computer networks
MJ Bearden, S Garg, WJ Lee, AP Van Moorsel
US Patent 6,871,233, 2005
Harvesting high value foreign currency transactions from emv contactless credit cards without the pin
M Emms, B Arief, L Freitas, J Hannon, A van Moorsel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20