default search action
Maria Toeroe
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Hassaan Siddiqui, Ferhat Khendek, Maria Toeroe:
Microservices based architectures for IoT systems - State-of-the-art review. Internet Things 23: 100854 (2023) - [j13]Siamak Azadiabad, Ferhat Khendek, Maria Toeroe:
Runtime Adaptation Framework for Fulfilling Availability and Continuity Requirements of Network Services. IEEE Trans. Netw. Serv. Manag. 20(3): 2259-2282 (2023) - [c60]Siamak Azadiabad, Ferhat Khendek, Maria Toeroe:
Runtime Availability and Service Continuity of Containerized VNF Instances. LATINCOM 2023: 1-6 - 2022
- [j12]Siamak Azadiabad, Ferhat Khendek, Maria Toeroe:
Availability and service disruption of network services: From high-level requirements to low-level configuration constraints. Comput. Stand. Interfaces 80: 103565 (2022) - [c59]Nour Gritli, Ferhat Khendek, Maria Toeroe:
Extending the Network Service Descriptor to Capture User Isolation Intents for Network Slices. FNWF 2022: 340-346 - [c58]Oussama Jebbar, Ferhat Khendek, Maria Toeroe:
A Method for Component Evaluation for Live Testing of Cloud Systems. ISSRE Workshops 2022: 87-92 - [c57]Siamak Azadiabad, Ferhat Khendek, Maria Toeroe:
Availability and Failure Rate of VNF Instances: Impacting Parameters and Calculation Methods. NoF 2022: 1-8 - [i5]Azadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe:
Resolving inconsistencies of runtime configuration changes through change propagation and adjustments. CoRR abs/2208.13891 (2022) - 2021
- [j11]Leila Abdollahi Vayghan, Mohamed Aymen Saied, Maria Toeroe, Ferhat Khendek:
A Kubernetes controller for managing the availability of elastic microservice based stateful applications. J. Syst. Softw. 175: 110924 (2021) - [c56]Nour Gritli, Ferhat Khendek, Maria Toeroe:
Taking into Account the Management Constraints in Network Slice Design. 5GWF 2021: 159-164 - [c55]Nour Gritli, Ferhat Khendek, Maria Toeroe:
Decomposition and Propagation of Intents for Network Slice Design. 5GWF 2021: 165-170 - [c54]Nour Gritli, Ferhat Khendek, Maria Toeroe:
Network Slice Provisioning Taking Into Account Tenant Intents and Operator Policies. NFV-SDN 2021: 167-173 - [i4]Mina Nabi, Ferhat Khendek, Maria Toeroe:
An Approach for the Automation of IaaS Cloud Upgrade. CoRR abs/2103.12837 (2021) - 2020
- [j10]Sadaf Mustafiz, Omar Hassane, Guillaume Dupont, Ferhat Khendek, Maria Toeroe:
Model-driven process enactment for NFV systems with MAPLE. Softw. Syst. Model. 19(5): 1263-1282 (2020) - [c53]Navid Nazarzadeoghaz, Ferhat Khendek, Maria Toeroe:
Automated Design of Network Services from Network Service Requirements. ICIN 2020: 63-70 - [c52]Oussama Jebbar, Mohamed Aymen Saied, Ferhat Khendek, Maria Toeroe:
Regression Test Suite Reduction for Cloud Systems. ICST Workshops 2020: 477-486 - [c51]Oussama Jebbar, Ferhat Khendek, Maria Toeroe:
Methods for Live Testing of Cloud Services. ICTSS 2020: 201-216 - [c50]Oussama Jebbar, Ferhat Khendek, Maria Toeroe:
Architecture for the Automation of Live Testing of Cloud Systems. QRS 2020: 142-151 - [c49]Omar Hassane, Sadaf Mustafiz, Ferhat Khendek, Maria Toeroe:
A Model Traceability Framework for Network Service Management. SAM 2020: 64-73 - [i3]Leila Abdollahi Vayghan, Mohamed Aymen Saied, Maria Toeroe, Ferhat Khendek:
A Kubernetes Controller for Managing the Availability of Elastic Microservice Based Stateful Applications. CoRR abs/2012.14086 (2020)
2010 – 2019
- 2019
- [j9]Mahin Abbasipour, Ferhat Khendek, Maria Toeroe:
SLA Compliance Checking and System Runtime Reconfiguration - A Model Based Approach. J. Softw. 14(11): 488-518 (2019) - [c48]Oussama Jebbar, Mohamed Aymen Saied, Ferhat Khendek, Maria Toeroe:
Poster: Re-Testing Configured Instances in the Production Environment - A Method for Reducing the Test Suite. ICST 2019: 367-370 - [c47]Omar Hassane, Sadaf Mustafiz, Ferhat Khendek, Maria Toeroe:
MAPLE-T: A Tool for Process Enactment with Traceability Support. MoDELS (Companion) 2019: 759-763 - [c46]Leila Abdollahi Vayghan, Mohamed Aymen Saied, Maria Toeroe, Ferhat Khendek:
Microservice Based Architecture: Towards High-Availability for Stateful Applications with Kubernetes. QRS 2019: 176-185 - [c45]Omar Hassane, Sadaf Mustafiz, Ferhat Khendek, Maria Toeroe:
Process Enactment with Traceability Support for NFV Systems. SAM 2019: 116-135 - [i2]Leila Abdollahi Vayghan, Mohamed Aymen Saied, Maria Toeroe, Ferhat Khendek:
Kubernetes as an Availability Manager for Microservice Applications. CoRR abs/1901.04946 (2019) - [i1]Sadaf Mustafiz, Omar Hassane, Guillaume Dupont, Ferhat Khendek, Maria Toeroe:
Model-Driven Process Enactment for NFV Systems with MAPLE. CoRR abs/1910.11756 (2019) - 2018
- [j8]Pejman Salehi, Abdelwahab Hamou-Lhadj, Maria Toeroe, Ferhat Khendek:
A model-driven approach for the generation of configurations for highly available software systems. Innov. Syst. Softw. Eng. 14(4): 273-307 (2018) - [c44]Leila Abdollahi Vayghan, Mohamed Aymen Saied, Maria Toeroe, Ferhat Khendek:
Deploying Microservice Based Applications with Kubernetes: Experiments and Lessons Learned. IEEE CLOUD 2018: 970-973 - [c43]Sadaf Mustafiz, Guillaume Dupont, Ferhat Khendek, Maria Toeroe:
MAPLE: An Integrated Environment for Process Modelling and Enactment for NFV Systems. ECMFA 2018: 164-178 - [c42]Mahin Abbasipour, Ferhat Khendek, Maria Toeroe:
A Model-Based Approach for Design Time Elasticity Rules Generation. ICECCS 2018: 93-103 - [c41]Guillaume Dupont, Sadaf Mustafiz, Ferhat Khendek, Maria Toeroe:
Building domain-specific modelling environments with papyrus: an experience report. MiSE@ICSE 2018: 49-56 - [c40]Mahin Abbasipour, Ferhat Khendek, Maria Toeroe:
Trigger correlation for dynamic system reconfiguration. SAC 2018: 427-430 - 2017
- [c39]Pradheba C. Rangarajan, Ferhat Khendek, Maria Toeroe:
Managing the availability of VNFs with the availability management framework. CNSM 2017: 1-4 - [c38]Mehran Khan, Maria Toeroe, Ferhat Khendek:
Comparing Pacemaker with OpenSAF for Availability Management in the Cloud. EDGE 2017: 106-111 - [c37]Oussama Jebbar, Ferhat Khendek, Maria Toeroe:
Upgrade of Highly Available Systems: Formal Methods at the Rescue. IRI 2017: 270-274 - [c36]Sadaf Mustafiz, Navid Nazarzadeoghaz, Guillaume Dupont, Ferhat Khendek, Maria Toeroe:
A Model-Driven Process Enactment Approach for Network Service Design. SDL Forum 2017: 99-118 - [c35]Oussama Jebbar, Ferhat Khendek, Maria Toeroe:
Upgrade campaign simulation and evaluation for highly available systems. SpringSim (TMS) 2017: 11:1-11:12 - 2016
- [j7]Pejman Salehi, Abdelwahab Hamou-Lhadj, Maria Toeroe, Ferhat Khendek:
A UML-based domain specific modeling language for service availability management: Design and experience. Comput. Stand. Interfaces 44: 63-83 (2016) - [j6]Parsa Pourali, Maria Toeroe, Ferhat Khendek:
Pattern based configuration generation for highly available COTS components based systems. Inf. Softw. Technol. 74: 143-159 (2016) - [j5]Azadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe:
Semantic weaving of configuration fragments into a consistent system configuration. Inf. Syst. Frontiers 18(5): 891-908 (2016) - [j4]Mina Nabi, Maria Toeroe, Ferhat Khendek:
Availability in the cloud: State of the art. J. Netw. Comput. Appl. 60: 54-67 (2016) - [c34]Mina Nabi, Maria Toeroe, Ferhat Khendek:
Rolling Upgrade with Dynamic Batch Size for IaaS Cloud. CLOUD 2016: 497-504 - [c33]Azadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe:
Runtime Adjustment of Configuration Models for Consistency Preservation. HASE 2016: 102-109 - [c32]Sadaf Mustafiz, Francis Palma, Maria Toeroe, Ferhat Khendek:
A network service design and deployment process for NFV systems. NCA 2016: 131-139 - [c31]Mehran Khan, Ferhat Khendek, Maria Toeroe:
Monitoring service level workload and adapting highly available applications. SAC 2016: 522-529 - [c30]Oussama Jebbar, Margarete Sackmann, Ferhat Khendek, Maria Toeroe:
Model Driven Upgrade Campaign Generation for Highly Available Systems. SAM 2016: 148-163 - 2015
- [c29]Azadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe:
A Model-Based Approach for the Integration of Configuration Fragments. ECMFA 2015: 125-136 - [c28]Azadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe:
Partial Validation of Configurations at Runtime. ISORC 2015: 288-291 - [c27]Mina Nabi, Ferhat Khendek, Maria Toeroe:
Upgrade of the IaaS cloud: Issues and potential solutions in the context of high-availability. ISSRE Workshops 2015: 21-24 - [c26]Mahin Abbasipour, Ferhat Khendek, Maria Toeroe:
A Model-Based Framework for SLA Management and Dynamic Reconfiguration. SDL Forum 2015: 19-26 - [c25]Parisa Heidari, Mohammadmajid Hormati, Maria Toeroe, Yanal Alahmad, Ferhat Khendek:
Integrating Open SAF High Availability Solution with Open Stack. SERVICES 2015: 229-236 - [p1]Mahin Abbasipour, Margarete Sackmann, Ferhat Khendek, Maria Toeroe:
A Model-Based Approach for User Requirements Decomposition and Component Selection. Formalisms for Reuse and Systems Integration 2015: 173-202 - 2014
- [j3]Ali Kanso, Maria Toeroe, Ferhat Khendek:
Comparing redundancy models for high availability middleware. Computing 96(10): 975-993 (2014) - [c24]Parsa Pourali, Ferhat Khendek, Maria Toeroe:
Enhanced Configuration Generation Approach for Highly Available COTS Based Systems. ARES 2014: 104-113 - [c23]Maria Toeroe, Neha Pawar, Ferhat Khendek:
Managing application level elasticity and availability. CNSM 2014: 348-351 - [c22]Ali Davoudian, Ferhat Khendek, Maria Toeroe:
Ordering Upgrade Changes for Highly Available Component Based Systems. HASE 2014: 259-260 - [c21]Mahin Abbasipour, Margarete Sackmann, Ferhat Khendek, Maria Toeroe:
Ontology-based user requirements decomposition for component selection for highly available systems. IRI 2014: 44-51 - [c20]Mohammadmajid Hormati, Ferhat Khendek, Maria Toeroe:
Towards an Evaluation Framework for Availability Solutions in the Cloud. ISSRE Workshops 2014: 43-46 - [c19]Azadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe:
Providing Hardware Redundancy for Highly Available Services in Virtualized Environments. SERE 2014: 40-47 - 2013
- [j2]Ali Kanso, Ferhat Khendek, Maria Toeroe, Abdelwahab Hamou-Lhadj:
Automatic configuration generation for service high availability with load balancing. Concurr. Comput. Pract. Exp. 25(2): 265-287 (2013) - [c18]Ali Nikzad, Ferhat Khendek, Maria Toeroe:
OpenSAF and VMware from the perspective of high availability. CNSM 2013: 324-331 - [c17]Ekansh Katihar, Ferhat Khendek, Maria Toeroe:
Operating system upgrade in high availability environment. SoftCOM 2013: 1-5 - [c16]Ali Kanso, Maria Toeroe, Ferhat Khendek:
Automating Service Availability Analysis: An Application to a Highly Available Media-Streaming Service. SERE (Companion) 2013: 94-101 - [e1]Ferhat Khendek, Maria Toeroe, Abdelouahed Gherbi, Rick Reed:
SDL 2013: Model-Driven Dependability Engineering - 16th International SDL Forum, Montreal, Canada, June 26-28, 2013. Proceedings. Lecture Notes in Computer Science 7916, Springer 2013, ISBN 978-3-642-38910-8 [contents] - 2012
- [c15]Pietro Colombo, Pejman Salehi, Ferhat Khendek, Maria Toeroe:
Bridging the Gap between User Requirements and Configuration Requirements. ICECCS 2012: 13-22 - [c14]Ali Kanso, Maria Toeroe, Ferhat Khendek:
Configuration-Based Service Availability Analysis for Middleware Managed Applications. SAM 2012: 229-248 - 2011
- [c13]Pejman Salehi, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe:
AMF configurations: Checking for service protection using heuristics. CNSM 2011: 1-8 - [c12]Ali Kanso, Ferhat Khendek, Maria Toeroe:
Workload Balancing for Highly Available Services: The Case of the N+M Redundancy Model. DASC 2011: 97-104 - [c11]Ali Kanso, Ferhat Khendek, Maria Toeroe:
Automatic Annotation of Software Configuration Models with Service Recovery Information. DASC 2011: 121-128 - [c10]Ali Kanso, Ferhat Khendek, Anik Mishra, Maria Toeroe:
Integrating Legacy Applications for High Availability: A Case Study. HASE 2011: 83-90 - 2010
- [c9]Pejman Salehi, Abdelwahab Hamou-Lhadj, Pietro Colombo, Ferhat Khendek, Maria Toeroe:
A UML-Based Domain Specific Modeling Language for the Availability Management Framework. HASE 2010: 35-44 - [c8]Ali Kanso, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe:
Ranking Service Units for Providing and Protecting Highly Available Services with Load Balancing. NOTERE 2010: 33-40
2000 – 2009
- 2009
- [c7]Ali Kanso, Maria Toeroe, Abdelwahab Hamou-Lhadj, Ferhat Khendek:
Generating AMF Configurations from Software Vendor Constraints and User Requirements. ARES 2009: 454-461 - [c6]Abdelouahed Gherbi, Ali Kanso, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe:
A Tool Suite for the Generation and Validation of Configurations for Software Availability. ASE 2009: 671-673 - [c5]Pejman Salehi, Ferhat Khendek, Maria Toeroe, Abdelwahab Hamou-Lhadj, Abdelouahed Gherbi:
Checking Service Instance Protection for AMF Configurations. SSIRI 2009: 269-274 - 2008
- [c4]Ali Kanso, Maria Toeroe, Ferhat Khendek, Abdelwahab Hamou-Lhadj:
Automatic Generation of AMF Compliant Configurations. ISAS 2008: 155-170 - 2006
- [c3]Maria Toeroe:
A Simulation-Based Case Study of Multi-cluster Redundancy Solutions. ISAS 2006: 162-176 - [c2]Maria Toeroe, Hans-Peter Frejek, Francis Tam, Shyam Penubolu, Kannan Kasturi:
The Emerging SAF Software Management Framework. ISAS 2006: 253-270 - 2003
- [j1]Maria Toeroe:
Performance Simulation of Cluster-Based Asynchronous Soft Real-Time Systems. Clust. Comput. 6(4): 315-324 (2003) - 2002
- [c1]Maria Toeroe:
Performance Simulation of the Jambala Platform. Annual Simulation Symposium 2002: 190-197
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint