


default search action
Constantin Adam
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Limin Yang, Zhi Chen, Chenkai Wang, Zhenning Zhang, Sushruth Booma, Phuong Cao, Constantin Adam, Alexander Withers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Gang Wang:
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center. USENIX Security Symposium 2024 - [i3]David Wood, Boris Lublinsky, Alexy Roytman, Shivdeep Singh, Abdulhamid Adebayo, Revital Eres, Mohammad Nassar, Hima Patel, S. Yousaf Shah, Constantin Adam, Petros Zerfos, Nirmit Desai, Daiki Tsuzuku, Takuya Goto, Michele Dolfi, Saptha Surendran, Paramesvaran Selvam, Sungeun An, Yuan Chi Chang, Dhiraj Joshi, Hajar Emami-Gohari, Xuan-Hong Dang, Yan Koyfman, Shahrokh Daijavad:
Data-Prep-Kit: getting your data ready for LLM application development. CoRR abs/2409.18164 (2024) - 2022
- [i2]Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta:
Attack Techniques and Threat Identification for Vulnerabilities. CoRR abs/2206.11171 (2022) - [i1]Constantin Adam, Abdulhamid Adebayo, Hubertus Franke, Edward C. Snible, Tobin Feldman-Fitzthum, James Cadden, Nerla Jean-Louis:
Partially Trusting the Service Mesh Control Plane. CoRR abs/2210.12610 (2022)
2010 – 2019
- 2019
- [c12]Constantin Adam, Muhammed Fatih Bulut, Milton Hernandez, Maja Vukovic:
Cognitive Compliance: Analyze, Monitor and Enforce Compliance in the Cloud. CLOUD 2019: 234-242 - 2018
- [j3]Kristof Kloeckner, Constantin Adam, Nikos Anerousis, Naga Ayachitula, Muhammed Fatih Bulut, Gargi Dasgupta, Yu Deng, Yixin Diao, Nicholas C. Fuller, Sandeep Gopisetty, Milton Hernandez, Jinho Hwang, Pietro Iannucci, Anup K. Kalia, Giovanni Lanfranchi, David Lanyi, Heiko Ludwig, A. Mahamuni, Ruchi Mahindru, Fan Jing Meng, Hamid R. Motahari Nezhad, Karin Murthy, Taiga Nakamura, Amit M. Paradkar, Dennis A. Perpetua, Birgit Pfitzmann, Daniela Rosu, Larisa Shwartz, Zhong Su, Maheswaran Surendra, Shu Tao, Hagen Völzer, Maja Vukovic, Dorothea Wiesmann, S. Wozniak, Gary Wright, Jin Xiao, Sai Zeng:
Building a cognitive platform for the managed IT services lifecycle. IBM J. Res. Dev. 62(1): 8:1-8:11 (2018) - [c11]Robert Filepp, Constantin Adam, Milton Hernandez, Maja Vukovic, Nikos Anerousis, Guan Qun Zhang:
Continuous Compliance: Experiences, Challenges, and Opportunities. SERVICES 2018: 31-32 - 2017
- [c10]Katharina Gschwind, Constantin Adam, Sastry S. Duri, Shripad Nadgowda, Maja Vukovic:
Optimizing Service Delivery with Minimal Runtimes. ICSOC Workshops 2017: 384-387 - [c9]Constantin Adam, Nikos Anerousis, Muhammed Fatih Bulut, Robert Filepp, Anup K. Kalia, Brian Peterson, John J. Rofrano, Maja Vukovic, Jin Xiao:
Design and Evaluation of a Self-Service Delivery Framework. ICSOC 2017: 445-452 - 2014
- [c8]Shihabur Rahman Chowdhury
, Constantin Adam, Frederick Wu, John J. Rofrano, Raouf Boutaba:
Managing the file system from the kernel. NOMS 2014: 1-8 - [c7]Sai Zeng, Constantin Adam, Frederick Wu, Shang Guo, Yaoping Ruan, Cashchakanithara Venugopal, Rajeev Puri:
Managing risk in multi-node automation of endpoint management. NOMS 2014: 1-6 - 2013
- [c6]Sai Zeng, Shang Guo, Frederick Wu, Constantin Adam, Long Wang, Cashchakanithara Venugopal, Rajeev Puri, Ramesh Palakodeti:
Universal Script Wrapper - An innovative solution to manage endpoints in large and heterogeneous environment. IM 2013: 916-919
2000 – 2009
- 2007
- [j2]Constantin Adam, Rolf Stadler:
Service Middleware for Self-Managing Large-Scale Systems. IEEE Trans. Netw. Serv. Manag. 4(3): 50-64 (2007) - [c5]Constantin Adam, Rolf Stadler, Chunqiang Tang, Malgorzata Steinder, Mike Spreitzer:
A Service Middleware that Scales in System Size and Applications. Integrated Network Management 2007: 70-79 - 2006
- [b1]Constantin Adam:
A Middleware for Self-Managing Large-Scale Systems. Royal Institute of Technology, Stockholm, Sweden, 2006 - [j1]Constantin Adam, Rolf Stadler:
A middleware design for large-scale clusters offering multiple services. IEEE Trans. Netw. Serv. Manag. 3(1): 1-12 (2006) - [c4]Björn Johansson, Constantin Adam, Mikael Johansson, Rolf Stadler:
Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters. CDC 2006: 1990-1995 - [c3]Constantin Adam, Rolf Stadler:
Implementation and Evaluation of a Middleware for Self-Organizing Decentralized Web Services. SelfMan 2006: 1-14 - 2005
- [c2]Constantin Adam, Rolf Stadler:
Adaptable server clusters with QoS objectives. Integrated Network Management 2005: 149-162 - 2004
- [c1]Constantin Adam, Rolf Stadler:
Patterns for routing and self-stabilization. NOMS (1) 2004: 61-74
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-14 22:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint