default search action
Alexander Acker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c25]Thorsten Wittkopp, Dominik Scheinert, Philipp Wiesner, Alexander Acker, Odej Kao:
PULL: Reactive Log Anomaly Detection Based On Iterative PU Learning. HICSS 2023: 1376-1385 - [c24]Thorsten Wittkopp, Alexander Acker, Odej Kao:
Progressing from Anomaly Detection to Automated Log Labeling and Pioneering Root Cause Analysis. ICDM (Workshops) 2023: 1231-1239 - [i16]Thorsten Wittkopp, Dominik Scheinert, Philipp Wiesner, Alexander Acker, Odej Kao:
PULL: Reactive Log Anomaly Detection Based On Iterative PU Learning. CoRR abs/2301.10681 (2023) - [i15]Thorsten Wittkopp, Alexander Acker, Odej Kao:
Progressing from Anomaly Detection to Automated Log Labeling and Pioneering Root Cause Analysis. CoRR abs/2312.14748 (2023) - 2022
- [c23]Thorsten Wittkopp, Alexander Acker, Sasho Nedelkoski, Jasmin Bogatinovski, Dominik Scheinert, Wu Fan, Odej Kao:
A2Log: Attentive Augmented Log Anomaly Detection. HICSS 2022: 1-10 - [c22]Jasmin Bogatinovski, Sasho Nedelkoski, Alexander Acker, Jorge Cardoso, Odej Kao:
QuLog: data-driven approach for log instruction quality assessment. ICPC 2022: 275-286 - [i14]Jasmin Bogatinovski, Sasho Nedelkoski, Alexander Acker, Jorge Cardoso, Odej Kao:
Data-Driven Approach for Log Instruction Quality Assessment. CoRR abs/2204.02618 (2022) - 2021
- [b1]Alexander Acker:
Anomaly symptom recognition in distributed IT systems. Technical University of Berlin, Germany, 2021 - [c21]Dominik Scheinert, Lauritz Thamsen, Houkun Zhu, Jonathan Will, Alexander Acker, Thorsten Wittkopp, Odej Kao:
Bellamy: Reusing Performance Models for Distributed Dataflow Jobs Across Contexts. CLUSTER 2021: 261-270 - [c20]Thorsten Wittkopp, Philipp Wiesner, Dominik Scheinert, Alexander Acker:
LogLAB: Attention-Based Labeling of Log Data Anomalies via Weak Supervision. ICSOC 2021: 700-707 - [c19]Dominik Scheinert, Houkun Zhu, Lauritz Thamsen, Morgan K. Geldenhuys, Jonathan Will, Alexander Acker, Odej Kao:
Enel: Context-Aware Dynamic Scaling of Distributed Dataflow Jobs using Graph Propagation. IPCCC 2021: 1-8 - [i13]Jasmin Bogatinovski, Sasho Nedelkoski, Alexander Acker, Florian Schmidt, Thorsten Wittkopp, Soeren Becker, Jorge Cardoso, Odej Kao:
Artificial Intelligence for IT Operations (AIOPS) Workshop White Paper. CoRR abs/2101.06054 (2021) - [i12]Thorsten Wittkopp, Alexander Acker:
Decentralized Federated Learning Preserves Model and Data Privacy. CoRR abs/2102.00880 (2021) - [i11]Soeren Becker, Florian Schmidt, Anton Gulenko, Alexander Acker, Odej Kao:
Towards AIOps in Edge Computing Environments. CoRR abs/2102.09001 (2021) - [i10]Harold Ott, Jasmin Bogatinovski, Alexander Acker, Sasho Nedelkoski, Odej Kao:
Robust and Transferable Anomaly Detection in Log Data using Pre-Trained Language Models. CoRR abs/2102.11570 (2021) - [i9]Dominik Scheinert, Alexander Acker:
TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services. CoRR abs/2102.12877 (2021) - [i8]Dominik Scheinert, Alexander Acker, Lauritz Thamsen, Morgan K. Geldenhuys, Odej Kao:
Learning Dependencies in Distributed Cloud Applications to Identify and Localize Anomalies. CoRR abs/2103.05245 (2021) - [i7]Dominik Scheinert, Lauritz Thamsen, Houkun Zhu, Jonathan Will, Alexander Acker, Thorsten Wittkopp, Odej Kao:
Bellamy: Reusing Performance Models for Distributed Dataflow Jobs Across Contexts. CoRR abs/2107.13921 (2021) - [i6]Dominik Scheinert, Houkun Zhu, Lauritz Thamsen, Morgan K. Geldenhuys, Jonathan Will, Alexander Acker, Odej Kao:
Enel: Context-Aware Dynamic Scaling of Distributed Dataflow Jobs using Graph Propagation. CoRR abs/2108.12211 (2021) - [i5]Thorsten Wittkopp, Alexander Acker, Sasho Nedelkoski, Jasmin Bogatinovski, Dominik Scheinert, Wu Fan, Odej Kao:
A2Log: Attentive Augmented Log Anomaly Detection. CoRR abs/2109.09537 (2021) - [i4]Thorsten Wittkopp, Philipp Wiesner, Dominik Scheinert, Alexander Acker:
LogLAB: Attention-Based Labeling of Log Data Anomalies via Weak Supervision. CoRR abs/2111.01657 (2021) - 2020
- [c18]Anton Gulenko, Alexander Acker, Florian Schmidt, Sören Becker, Odej Kao:
Bitflow: An In Situ Stream Processing Framework. ACSOS Companion 2020: 182-187 - [c17]Soeren Becker, Florian Schmidt, Anton Gulenko, Alexander Acker, Odej Kao:
Towards AIOps in Edge Computing Environments. IEEE BigData 2020: 3470-3475 - [c16]Alexander Acker, Thorsten Wittkopp, Sasho Nedelkoski, Jasmin Bogatinovski, Odej Kao:
Superiority of Simplicity: A Lightweight Model for Network Device Workload Prediction. FedCSIS 2020: 7-10 - [c15]Anton Gulenko, Alexander Acker, Odej Kao, Feng Liu:
AI-Governance and Levels of Automation for AIOps-supported System Administration. ICCCN 2020: 1-6 - [c14]Sasho Nedelkoski, Jasmin Bogatinovski, Alexander Acker, Jorge Cardoso, Odej Kao:
Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs. ICDM 2020: 1196-1201 - [c13]Thorsten Wittkopp, Alexander Acker:
Decentralized Federated Learning Preserves Model and Data Privacy. ICSOC Workshops 2020: 176-187 - [c12]Dominik Scheinert, Alexander Acker:
TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services. ICSOC Workshops 2020: 214-227 - [c11]Sasho Nedelkoski, Jasmin Bogatinovski, Alexander Acker, Jorge Cardoso, Odej Kao:
Self-supervised Log Parsing. ECML/PKDD (4) 2020: 122-138 - [c10]Li Wu, Johan Tordsson, Alexander Acker, Odej Kao:
MicroRAS: Automatic Recovery in the Absence of Historical Failure Data for Microservice Systems. UCC 2020: 227-236 - [i3]Sasho Nedelkoski, Jasmin Bogatinovski, Alexander Acker, Jorge Cardoso, Odej Kao:
Self-Supervised Log Parsing. CoRR abs/2003.07905 (2020) - [i2]Alexander Acker, Thorsten Wittkopp, Sasho Nedelkoski, Jasmin Bogatinovski, Odej Kao:
Superiority of Simplicity: A Lightweight Model for Network Device Workload Prediction. CoRR abs/2007.03568 (2020) - [i1]Sasho Nedelkoski, Jasmin Bogatinovski, Alexander Acker, Jorge Cardoso, Odej Kao:
Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs. CoRR abs/2008.09340 (2020)
2010 – 2019
- 2019
- [c9]Marcel Wallschläger, Alexander Acker, Odej Kao:
Silent Consensus: Probabilistic Packet Sampling for Lightweight Network Monitoring. ICCSA (1) 2019: 241-256 - [c8]Daniel Thilo Schroeder, Kevin Styp-Rekowski, Florian Schmidt, Alexander Acker, Odej Kao:
Graph-based Feature Selection Filter Utilizing Maximal Cliques. SNAMS 2019: 297-302 - 2018
- [c7]Anton Gulenko, Florian Schmidt, Alexander Acker, Marcel Wallschläger, Odej Kao, Feng Liu:
Detecting Anomalous Behavior of Black-Box Services Modeled with Distance-Based Online Clustering. IEEE CLOUD 2018: 912-915 - [c6]Florian Schmidt, Florian Suri-Payer, Anton Gulenko, Marcel Wallschläger, Alexander Acker, Odej Kao:
Unsupervised Anomaly Event Detection for VNF Service Monitoring Using Multivariate Online Arima. CloudCom 2018: 278-283 - [c5]Alexander Acker, Florian Schmidt, Anton Gulenko, Odej Kao:
Online Density Grid Pattern Analysis to Classify Anomalies in Cloud and NFV Systems. CloudCom 2018: 290-295 - [c4]Marcel Wallschläger, Anton Gulenko, Florian Schmidt, Alexander Acker, Odej Kao:
Anomaly Detection for Black Box Services in Edge Clouds Using Packet Size Distribution. CloudNet 2018: 1-6 - [c3]Florian Schmidt, Anton Gulenko, Marcel Wallschläger, Alexander Acker, Vincent Hennig, Feng Liu, Odej Kao:
IFTM - Unsupervised Anomaly Detection for Virtualized Network Function Services. ICWS 2018: 187-194 - [c2]Florian Schmidt, Florian Suri-Payer, Anton Gulenko, Marcel Wallschläger, Alexander Acker, Odej Kao:
Unsupervised Anomaly Event Detection for Cloud Monitoring Using Online Arima. UCC Companion 2018: 71-76 - 2017
- [c1]Alexander Acker, Florian Schmidt, Anton Gulenko, Reinhard Kietzmann, Odej Kao:
Patient-individual morphological anomaly detection in multi-lead electrocardiography data streams. IEEE BigData 2017: 3841-3846
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint