![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Taghrid Samak
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j6]Nur Zincir-Heywood
, Giuliano Casale
, David Carrera
, Lydia Y. Chen
, Amogh Dhamdhere, Takeru Inoue
, Hanan Lutfiyya, Taghrid Samak:
Guest Editorial: Special Issue on Data Analytics and Machine Learning for Network and Service Management - Part II. IEEE Trans. Netw. Serv. Manag. 18(1): 775-779 (2021) - 2020
- [j5]Nur Zincir-Heywood
, Giuliano Casale
, David Carrera
, Lydia Y. Chen
, Amogh Dhamdhere, Takeru Inoue
, Hanan Lutfiyya, Taghrid Samak:
Guest Editorial: Special Section on Data Analytics and Machine Learning for Network and Service Management-Part I. IEEE Trans. Netw. Serv. Manag. 17(4): 1971-1974 (2020)
2010 – 2019
- 2018
- [e1]Stefano Salsano, Roberto Riggio, Toufik Ahmed, Taghrid Samak, Carlos Raniery Paula dos Santos:
14th International Conference on Network and Service Management, CNSM 2018, Rome, Italy, November 5-9, 2018. IEEE Computer Society 2018, ISBN 978-3-9031-7614-0 [contents] - 2016
- [c24]Taghrid Samak, Mark Miklic:
WAN capacity forecasting for large enterprises. NOMS 2016: 1031-1036 - 2015
- [c23]Simon J. Patton, Taghrid Samak, Craig E. Tull, Cindy Mackenzie:
Spade: Decentralized orchestration of data movement and warehousing for physics experiments. IM 2015: 1014-1019 - 2014
- [j4]Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak:
Firewall Policy Reconnaissance: Techniques and Analysis. IEEE Trans. Inf. Forensics Secur. 9(2): 296-308 (2014) - [c22]Gilberto Zonta Pastorello
, Deborah A. Agarwal
, Dario Papale
, Taghrid Samak, Carlo Trotta
, Alessio Ribeca, Cristina Poindexter, Boris Faybishenko
, Dan Gunter
, Rachel Hollowgrass
, Eleonora Canfora
:
Observational Data Patterns for Time Series Data Quality Assessment. eScience 2014: 271-278 - [c21]Jack Deslippe, Abdelilah Essiari, Simon J. Patton, Taghrid Samak, Craig E. Tull, Alexander Hexemer
, Dinesh Kumar, Dilworth Parkinson, Polite Stewart:
Workflow management for real-time analysis of lightsource experiments. WORKS@SC 2014: 31-40 - 2013
- [j3]Karan Vahi, Ian Harvey, Taghrid Samak, Daniel K. Gunter
, Kieran Evans, David Rogers, Ian J. Taylor
, Monte Goode, Fabio Silva, Eddie Al-Shakarchi, Gaurang Mehta, Ewa Deelman, Andrew Jones:
A Case Study into Using Common Real-Time Workflow Monitoring Infrastructure for Scientific Workflows. J. Grid Comput. 11(3): 381-406 (2013) - [c20]Taghrid Samak, Rob Egan, Brian Bushnell, Daniel K. Gunter
, Alex Copeland, Zhong Wang:
Automatic Outlier Detection for Genome Assembly Quality Assessment. e-Science 2013: 45-52 - [c19]Taghrid Samak, Christine Morin, David H. Bailey:
Energy Consumption Models and Predictions for Large-Scale Systems. IPDPS Workshops 2013: 899-906 - 2012
- [j2]Taghrid Samak, Ehab Al-Shaer:
Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks. IEEE Trans. Netw. Serv. Manag. 9(4): 459-472 (2012) - [c18]Taghrid Samak, Dan Gunter, Monte Goode, Ewa Deelman, Gideon Juve, Fabio Silva, Karan Vahi:
Failure analysis of distributed scientific workflows executing in the cloud. CNSM 2012: 46-54 - [c17]Taghrid Samak, Dan Gunter
, Zhong Wang:
Prediction of protein solubility in E. coli. eScience 2012: 1-8 - [c16]Adel El-Atawy
, Taghrid Samak:
End-to-end verification of QoS policies. NOMS 2012: 426-434 - [c15]Ezra Kissel, Ahmed El-Hassany, Guilherme Fernandes, D. Martin Swany
, Dan Gunter
, Taghrid Samak, Jennifer M. Schopf:
Scalable integrated performance analysis of multi-gigabit networks. NOMS 2012: 1227-1233 - [c14]Taghrid Samak, Dan Gunter
, Valerie C. Hendrix:
Scalable analysis of network measurements with Hadoop and Pig. NOMS 2012: 1254-1259 - [c13]Karan Vahi, Ian Harvey, Taghrid Samak, Daniel K. Gunter
, Kieran Evans, David Rogers, Ian J. Taylor
, Monte Goode, Fabio Silva, Eddie Al-Shakarchi, Gaurang Mehta, Andrew Jones, Ewa Deelman:
A General Approach to Real-Time Workflow Monitoring. SC Companion 2012: 108-118 - 2011
- [c12]Dan Gunter, Ewa Deelman, Taghrid Samak, Christopher X. Brooks, Monte Goode, Gideon Juve, Gaurang Mehta, Priscilla Moraes, Fabio Silva, D. Martin Swany, Karan Vahi:
Online workflow management and performance analysis with Stampede. CNSM 2011: 1-10 - [c11]Taghrid Samak, Dan Gunter
, Monte Goode, Ewa Deelman, Gideon Juve, Gaurang Mehta, Fabio Silva, Karan Vahi:
Online Fault and Anomaly Detection for Large-Scale Scientific Workflows. HPCC 2011: 373-381 - [c10]Taghrid Samak, Adel El-Atawy
, Ehab Al-Shaer:
QoS policy verification for DiffServ networks. IWQoS 2011: 1-3 - [c9]Taghrid Samak, Dan Gunter
, Monte Goode, Ewa Deelman, Gaurang Mehta, Fabio Silva, Karan Vahi:
Failure prediction and localization in large scientific workflows. WORKS@SC 2011: 107-116 - 2010
- [c8]Taghrid Samak, Ehab Al-Shaer:
Synthetic security policy generation via network traffic clustering. AISec 2010: 45-53
2000 – 2009
- 2009
- [j1]Ehab Al-Shaer, Adel El-Atawy
, Taghrid Samak:
Automated pseudo-live testing of firewall configuration enforcement. IEEE J. Sel. Areas Commun. 27(3): 302-314 (2009) - [c7]Alan Jeffrey, Taghrid Samak:
Model Checking Firewall Policy Configurations. POLICY 2009: 60-67 - [c6]Taghrid Samak, Adel El-Atawy
, Ehab Al-Shaer:
Towards network security policy generation for configuration analysis and testing. SafeConfig 2009: 45-52 - 2008
- [c5]Taghrid Samak, Ehab Al-Shaer, Hong Li:
QoS Policy Modeling and Conflict Analysis. POLICY 2008: 19-26 - 2007
- [c4]Taghrid Samak, Adel El-Atawy
, Ehab Al-Shaer, Mohamed A. Ismail:
A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring. E2EMON 2007: 1-7 - [c3]Taghrid Samak, Adel El-Atawy
, Ehab Al-Shaer:
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. ICNP 2007: 294-303 - [c2]Adel El-Atawy
, Taghrid Samak, Ehab Al-Shaer, Hong Li:
Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance. INFOCOM 2007: 866-874 - [c1]Adel El-Atawy
, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li:
An Automated Framework for Validating Firewall Policy Enforcement. POLICY 2007: 151-160
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint