default search action
Naser Ezzati-Jivan
Person information
- affiliation: Brock University, Computer Science Department, St. Catharines, ON, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Morteza Noferesti, Naser Ezzati-Jivan:
Enhancing empirical software performance engineering research with kernel-level events: A comprehensive system tracing approach. J. Syst. Softw. 216: 112117 (2024) - [j18]Yue Guan, Morteza Noferesti, Naser Ezzati-Jivan:
A two-tiered framework for anomaly classification in IoT networks utilizing CNN-BiLSTM model. Softw. Impacts 20: 100646 (2024) - [c42]Brendan Park, Madeline Janecek, Naser Ezzati-Jivan, Yifeng Li, Ali Emami:
Picturing Ambiguity: A Visual Twist on the Winograd Schema Challenge. ACL (1) 2024: 355-374 - [c41]Kasra Darvishi, Morteza Noferesti, Naser Ezzati-Jivan:
Toward Adaptive Tracing: Efficient System Behavior Analysis using Language Models. NIER@ICSE 2024: 62-66 - [c40]Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed, Naser Ezzati-Jivan, Mohammed A. Shehab:
Decoding Log Parsing Challenges: A Comprehensive Taxonomy for Actionable Solutions. ICSE Companion 2024: 392-393 - [c39]Mahsa Panahandeh, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj, James Miller:
Context-aware Root Cause Localization in Distributed Traces Using Social Network Analysis (Work In Progress paper). ICPE (Companion) 2024: 1-6 - [c38]Amirmahdi Khosravi Tabrizi, Naser Ezzati-Jivan, François Tetreault:
An Adaptive Logging System (ALS): Enhancing Software Logging with Reinforcement Learning Techniques. ICPE 2024: 37-47 - [c37]Mahsa Panahandeh, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj, James Miller:
Efficient Unsupervised Latency Culprit Ranking in Distributed Traces with GNN and Critical Path Analysis. ICPE (Companion) 2024: 62-66 - [c36]Ghazal Khodabandeh, Alireza Ezaz, Naser Ezzati-Jivan:
Network Analysis of Microservices: A Case Study on Alibaba Production Clusters. ICPE (Companion) 2024: 67-71 - [c35]Alireza Ezaz, Ghazal Khodabandeh, Naser Ezzati-Jivan:
Analyzing Performance Variability in Alibaba's Microservice Architecture: A Critical-Path-Based Perspective. ICPE (Companion) 2024: 82-86 - [c34]Marios-Eleftherios Fokaefs, Filipe Oliveira, Naser Ezzati-Jivan:
12th International Workshop on Load Testing and Benchmarking of Software Systems: LTB'24 Chairs' Welcome. ICPE (Companion) 2024: 226 - [i4]Brendan Park, Madeline Janecek, Naser Ezzati-Jivan, Yifeng Li, Ali Emami:
Picturing Ambiguity: A Visual Twist on the Winograd Schema Challenge. CoRR abs/2405.16277 (2024) - 2023
- [c33]Pranjal Chakraborty, Naser Ezzati-Jivan, Sayed Vahid Azhari, François Tetreault:
AltOOM: A Data-driven Out of Memory Root Cause Identification Strategy. IEEE Big Data 2023: 1637-1646 - [c32]Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed, Naser Ezzati-Jivan:
Towards a Classification of Log Parsing Errors. ICPC 2023: 84-88 - [c31]Yue Guan, Morteza Noferesti, Naser Ezzati-Jivan:
CNN-BiLSTM-Based Classification of RPL Attacks in IoT Smart Grid Networks (Industry Track). Middleware Industry 2023: 29-34 - [c30]Mohammed Adib Khan, Morteza Noferesti, Naser Ezzati-Jivan:
PASD: A Performance Analysis Approach Through the Statistical Debugging of Kernel Events. SCAM 2023: 151-161 - [c29]Mohammed Adib Khan, Naser Ezzati-Jivan:
Multi-level Adaptive Execution Tracing for Efficient Performance Analysis. SERA 2023: 104-109 - [c28]Raghav Bhardwaj, Morteza Noferesti, Madeline Janecek, Naser Ezzati-Jivan:
EMD-SCS: A Dynamic Behavioral Approach for Early Malware Detection with Sonification of System Call Sequences. TrustCom 2023: 1728-1737 - [c27]Madeline Janecek, Sneh Patel, Naser Ezzati-Jivan:
Uncovering Steady State Executions in Java Microbenchmarking with Call Graph Analysis. ICPE (Companion) 2023: 71-75 - [c26]Tom Wallace, Beatrice M. Ombuki-Berman, Naser Ezzati-Jivan:
Identification and Classification of JMH Microbenchmark States using Time Series Analysis. ICPE (Companion) 2023: 101-105 - [c25]Amirmahdi Khosravi Tabrizi, Naser Ezzati-Jivan:
Software Mining - Investigating Correlation between Source Code Features and Michrobenchmark's Steady State. ICPE (Companion) 2023: 107-111 - 2022
- [j17]Raphaël Beamonte, Naser Ezzati-Jivan, Michel R. Dagenais:
Execution trace-based model verification to analyze multicore and real-time systems. Concurr. Comput. Pract. Exp. 34(17) (2022) - [j16]Majid Rezazadeh, Naser Ezzati-Jivan, Seyed Vahid Azhari, Michel R. Dagenais:
Performance evaluation of complex multi-thread applications through execution path analysis. Perform. Evaluation 155-156: 102289 (2022) - [c24]Riley VanDonge, Naser Ezzati-Jivan:
Poster Paper: Operating System Support for Applications Performance Analysis. IC2E 2022: 279-280 - [c23]Madeline Janecek, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj:
Performance anomaly detection through sequence alignment of system-level traces. ICPC 2022: 264-274 - [c22]Yue Guan, Naser Ezzati-Jivan:
Deep learning driven anomaly based intrusion detection system for IoT: poster abstract. Middleware Demos/Posters 2022: 19-20 - [c21]Riley VanDonge, Naser Ezzati-Jivan:
N-Lane Bridge Performance Antipattern Analysis Using System-Level Execution Tracing. SCAM 2022: 83-93 - [i3]Sneh Patel, Brendan Park, Naser Ezzati-Jivan, Quentin Fournier:
Automated Cause Analysis of Latency Outliers Using System-Level Dependency Graphs. CoRR abs/2207.06515 (2022) - 2021
- [j15]Raphaël Beamonte, Naser Ezzati-Jivan, Michel R. Dagenais:
Automated Generation of Model-Based Constraints for Common Multi-core and Real-Time Applications Using Execution Tracing. Int. J. Parallel Program. 49(1): 104-134 (2021) - [j14]Hossein Abbasi, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi, Michel R. Dagenais:
The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment. J. Hardw. Syst. Secur. 5(3): 208-222 (2021) - [j13]Yonni Chen Kuang Piao, Naser Ezzati-Jivan, Michel R. Dagenais:
Distributed Architecture for an Integrated Development Environment, Large Trace Analysis, and Visualization. Sensors 21(16): 5560 (2021) - [c20]Seyed Vahid Azhari, Simar Bhamra, Naser Ezzati-Jivan, François Tetreault:
Efficient heap monitoring tool for memory leak detection and root-cause analysis. IEEE BigData 2021: 3020-3030 - [c19]Madeline Janecek, Naser Ezzati-Jivan, Seyed Vahid Azhari:
Container Workload Characterization Through Host System Tracing. IC2E 2021: 9-19 - [c18]Simon Delisle, Naser Ezzati-Jivan, Michel R. Dagenais:
Integrated modeling tool for indexing and analyzing state machine trace. ISNCC 2021: 1-8 - [c17]Sneh Patel, Brendan Park, Naser Ezzati-Jivan, Quentin Fournier:
Automated Cause Analysis of Latency Outliers Using System-Level Dependency Graphs. QRS 2021: 422-433 - [c16]Francis Giraldeau, Naser Ezzati-Jivan, Michel R. Dagenais:
System execution path profiling using hardware performance counters. SysCon 2021: 1-8 - [c15]Yue Guan, Naser Ezzati-Jivan:
Malware System Calls Detection Using Hybrid System. SysCon 2021: 1-8 - [i2]Naser Ezzati-Jivan, Quentin Fournier, Michel R. Dagenais, Abdelwahab Hamou-Lhadj:
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing. CoRR abs/2103.04933 (2021) - [i1]Quentin Fournier, Naser Ezzati-Jivan, Daniel Aloise, Michel R. Dagenais:
Automatic Cause Detection of Performance Problems in Web Applications. CoRR abs/2103.04954 (2021) - 2020
- [j12]Robin Gassais, Naser Ezzati-Jivan, Jose M. Fernandez, Daniel Aloise, Michel R. Dagenais:
Multi-level host-based intrusion detection system for Internet of things. J. Cloud Comput. 9: 62 (2020) - [j11]Ji Wang, Naser Ezzati-Jivan:
Enhanced execution trace abstraction approach using social network analysis methods. Softwaretechnik-Trends 40(3): 58-60 (2020) - [c14]Majid Rezazadeh, Naser Ezzati-Jivan, Evan Galea, Michel R. Dagenais:
Multi-Level Execution Trace Based Lock Contention Analysis. ISSRE Workshops 2020: 177-182 - [c13]Yves J. Bationo, Naser Ezzati-Jivan, Evan Galea, Michel R. Dagenais:
Cloud Platform Performance Evaluation Using Multi-level Execution Tracing. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 294-299 - [c12]Naser Ezzati-Jivan, Quentin Fournier, Michel R. Dagenais, Abdelwahab Hamou-Lhadj:
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing. SCAM 2020: 149-159
2010 – 2019
- 2019
- [j10]Fabien Reumont-Locke, Naser Ezzati-Jivan, Michel R. Dagenais:
Efficient Methods for Trace Analysis Parallelization. Int. J. Parallel Program. 47(5-6): 951-972 (2019) - [j9]Hossein Abbasi, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi, Michel R. Dagenais:
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis. J. Hardw. Syst. Secur. 3(2): 164-176 (2019) - [j8]Didier Nadeau, Naser Ezzati-Jivan, Michel R. Dagenais:
Efficient large-scale heterogeneous debugging using dynamic tracing. J. Syst. Archit. 98: 346-360 (2019) - [c11]Quentin Fournier, Naser Ezzati-Jivan, Daniel Aloise, Michel R. Dagenais:
Automatic Cause Detection of Performance Problems in Web Applications. ISSRE Workshops 2019: 398-405 - 2018
- [c10]Yves J. Bationo, Naser Ezzati-Jivan, Michel R. Dagenais:
Efficient cloud tracing: From very high level to very low level. ICCE 2018: 1-6 - [c9]Naser Ezzati-Jivan, Genevieve Bastien, Michel R. Dagenais:
High latency cause detection using multilevel dynamic analysis. SysCon 2018: 1-8 - 2017
- [j7]Naser Ezzati-Jivan, Michel R. Dagenais:
Multi-scale navigation of large trace data: A survey. Concurr. Comput. Pract. Exp. 29(10) (2017) - [j6]Adrien Vergé, Naser Ezzati-Jivan, Michel R. Dagenais:
Hardware-assisted software event tracing. Concurr. Comput. Pract. Exp. 29(10) (2017) - [j5]Florian Wininger, Naser Ezzati-Jivan, Michel R. Dagenais:
A declarative framework for stateful analysis of execution traces. Softw. Qual. J. 25(1): 201-229 (2017) - [c8]Houssem Daoud, Naser Ezzati-Jivan, Michel R. Dagenais:
Dynamic trace-based sampling algorithm for memory usage tracking of enterprise applications. HPEC 2017: 1-7 - 2016
- [c7]Loic Prieur-Drevon, Raphaël Beamonte, Naser Ezzati-Jivan, Michel R. Dagenais:
Enhanced State History Tree (eSHT): A Stateful Data Structure for Analysis of Highly Parallel System Traces. BigData Congress 2016: 83-90 - [c6]Cédric Biancheri, Naser Ezzati-Jivan, Michel R. Dagenais:
Multilayer Virtualized Systems Analysis with Kernel Tracing. FiCloud Workshops 2016: 1-6 - 2015
- [j4]Naser Ezzati-Jivan, Michel R. Dagenais:
Cube data model for multilevel statistics computation of live execution traces. Concurr. Comput. Pract. Exp. 27(5): 1069-1091 (2015) - [c5]Kadjo Kouame, Naser Ezzati-Jivan, Michel R. Dagenais:
A Flexible Data-Driven Approach for Execution Trace Filtering. BigData Congress 2015: 698-703 - 2014
- [c4]Naser Ezzati-Jivan, Michel R. Dagenais:
Multiscale navigation in large trace data. CCECE 2014: 1-7 - 2013
- [j3]Naser Ezzati-Jivan, Michel R. Dagenais:
A framework to compute statistics of system parameters from very large trace files. ACM SIGOPS Oper. Syst. Rev. 47(1): 43-54 (2013) - [c3]Naser Ezzati-Jivan, Alireza Shameli-Sendi, Michel R. Dagenais:
Multilevel label placement for execution trace events. CCECE 2013: 1-6 - [c2]Alexandre Montplaisir, Naser Ezzati-Jivan, Florian Wininger, Michel R. Dagenais:
Efficient Model to Query and Visualize the System States Extracted from Trace Data. RV 2013: 219-234 - [c1]A. Montplaisir-Goncalves, Naser Ezzati-Jivan, Florian Wininger, Michel R. Dagenais:
State History Tree: An Incremental Disk-Based Data Structure for Very Large Interval Data. SocialCom 2013: 716-724 - 2012
- [j2]Naser Ezzati-Jivan, Michel R. Dagenais:
A Stateful Approach to Generate Synthetic Events from Kernel Traces. Adv. Softw. Eng. 2012: 140368:1-140368:12 (2012) - 2010
- [j1]Masoume Jabbarifar, Alireza Shameli-Sendi, Alireza Sadighian, Naser Ezzati-Jivan, Michel R. Dagenais:
A Reliable and Efficient Time Synchronization Protocol for Heterogeneous Wireless Sensor Network. Wirel. Sens. Netw. 2(12): 910-918 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint