


default search action
NOMS 2012: Maui, Hawaii, USA
- Filip De Turck, Luciano Paschoal Gaspary, Deep Medhi:

2012 IEEE Network Operations and Management Symposium, NOMS 2012, Maui, HI, USA, April 16-20, 2012. IEEE 2012, ISBN 978-1-4673-0267-8 - Khanh-Toan Tran, Nazim Agoulmine

, Youssef Iraqi
:
Cost-effective complex service mapping in cloud infrastructures. 1-8 - Balaji Viswanathan, Akshat Verma, Sourav Dutta

:
CloudMap: Workload-aware placement in private heterogeneous clouds. 9-16 - Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:

Feature placement algorithms for high-variability applications in cloud environments. 17-24 - Ioannis Kitsos, Antonis Papaioannou, Nikos Tsikoudis, Kostas Magoutis

:
Adapting data-intensive workloads to generic allocation policies in cloud infrastructures. 25-33 - Liang Tang, Tao Li, Florian Pinel, Larisa Shwartz, Genady Grabarnik:

Optimizing system monitoring configurations for non-actionable alerts. 34-42 - Liam Fallon, Declan O'Sullivan

:
Using a semantic knowledge base for communication service quality management in Home Area Networks. 43-51 - Adetokunbo Makanju, Nur Zincir-Heywood

, Evangelos E. Milios
:
Interactive learning of alert signatures in High Performance Cluster system logs. 52-60 - Yixin Diao, Aliza Heching:

Closed loop performance management for service delivery systems. 61-69 - Wonho Kim, Puneet Sharma:

Hercules: Integrated control framework for datacenter traffic management. 70-78 - Krishnamurthy Viswanathan, Choudur Lakshminarayan, Vanish Talwar, Chengwei Wang, Greg Macdonald, Wade Satterfield:

Ranking anomalies in data centers. 79-87 - Vijay Mann, Anilkumar Vishnoi, Kalapriya Kannan, Shivkumar Kalyanaraman:

CrossRoads: Seamless VM mobility across data centers through software defined networking. 88-96 - Rone Ilídio da Silva, Daniel Fernandes Macedo

, José Marcos S. Nogueira
:
Fault tolerance in spatial query processing for Wireless Sensor Networks. 97-104 - Huei-Wen Ferng, Dian Rachmarini:

A secure routing protocol for wireless sensor networks with consideration of energy efficiency. 105-112 - Sergio S. Furlaneto, Aldri L. dos Santos

, Carmem S. Hara
:
An efficient data acquisition model for urban sensor networks. 113-120 - Vasilis Sourlas

, Paris Flegkas, Lazaros Gkatzikis, Leandros Tassiulas:
Autonomic cache management in Information-Centric Networks. 121-129 - Jeroen Famaey

, Steven Latré, Tim Wauters, Filip De Turck:
FedRR - A Federated Resource Reservation algorithm for multimedia services. 130-137 - Ricardo Bennesby, Paulo Fonseca, Edjard de Souza Mota, Alexandre Passito:

An inter-AS routing component for software-defined networks. 138-145 - Misbah Uddin, Rolf Stadler, Alexander Clemm:

Management by network search. 146-154 - Rafael Antonello, Stenio F. L. Fernandes, Djamel Sadok, Judith Kelner, Géza Szabó:

Deterministic Finite Automaton for scalable traffic identification: The power of compressing by range. 155-162 - Weibo Chu, Xiaohong Guan, Lixin Gao, Zhongmin Cai:

Model-based real-time volume control for interactive network traffic replay. 163-170 - Claris Castillo, Asser N. Tantawi

, Diana Arroyo, Malgorzata Steinder:
Cost-aware replication for dataflows. 171-178 - Andrzej Kochut, Alexei A. Karve:

Leveraging local image redundancy for efficient virtual machine provisioning. 179-187 - Chung Pan Tang, Tsz-Yeung Wong, Patrick P. C. Lee

:
CloudVS: Enabling version control for virtual machines in an open-source cloud under commodity settings. 188-195 - Xiangliang Zhang

, Zon-Yin Shae, Shuai Zheng, Hani Jamjoom:
Virtual machine migration in an over-committed cloud. 196-203 - Ahmed Ali-Eldin, Johan Tordsson, Erik Elmroth:

An adaptive hybrid elasticity controller for cloud infrastructures. 204-212 - Marcos Dias de Assunção

, Marco Aurélio Stelmar Netto, Brian Peterson, Lakshminarayanan Renganarayana, John J. Rofrano, Chris Ward, Chris Young:
CloudAffinity: A framework for matching servers to cloudmates. 213-220 - Frédéric François, Ning Wang, Klaus Moessner

, Stylianos Georgoulas:
Optimization for time-driven link sleeping reconfigurations in ISP backbone networks. 221-228 - Jinho Kim, Yasufumi Morioka, Junichiro Hagiwara:

An optimized seamless IP flow mobility management architecture for traffic offloading. 229-236 - Giuseppe Di Battista

, Massimo Rimondini
, Giorgio Sadolfo:
Monitoring the status of MPLS VPN and VPLS based on BGP signaling information. 237-244 - Andrei Vancea, Laurent d'Orazio, Burkhard Stiller:

Optimization of flow record handling by applying a decentralized cooperative semantic caching approach. 245-252 - Sun-il Kim, Nnamdi Nwanze, William Edmonds, Blake Johnson, Paloma Field:

On network intrusion detection for deployment in the wild. 253-260 - Oussema Dabbebi, Remi Badonnel, Olivier Festor:

Dynamic exposure control in P2PSIP networks. 261-268 - Ramin Sadre, Anna Sperotto

, Aiko Pras:
The effects of DDoS attacks on flow monitoring applications. 269-277 - Elisa Mannes, Michele Nogueira

, Aldri Luiz dos Santos
:
A bio-inspired scheme on quorum systems for reliable services data management in MANETs. 278-285 - Tânia L. Monteiro, Guy Pujolle, Marcelo Eduardo Pellenz

, Manoel Camillo Penna, Richard Demo Souza
:
An optimal channel assignment strategy for WLANs using distributed optimization. 286-292 - Rafael De Tommaso do Valle, Débora Christina Muchaluat-Saade:

MeshAdmin: An integrated platform for wireless mesh network management. 293-301 - Koen De Schepper

, Bart De Vleeschauwer, Chris Hawinkel, Werner Van Leekwijck, Jeroen Famaey
, Wim Van de Meerssche, Filip De Turck:
Shared Content Addressing Protocol (SCAP): Optimizing multimedia content distribution at the transport layer. 302-310 - Lothar Braun, Alexander Klein, Georg Carle, Helmut Reiser

, Jochen Eisl:
Analyzing caching benefits for YouTube traffic in edge networks - A measurement-based evaluation. 311-318 - Brian Meskill, Alan Davy

, Brendan Jennings
:
Revenue-maximizing server selection and admission control for IPTV content servers using available bandwidth estimates. 319-326 - Adler Hoff Schmidt, Rodolfo Stoffel Antunes

, Marinho P. Barcellos, Luciano Paschoal Gaspary:
Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks. 327-334 - Martín Barrère

, Remi Badonnel, Olivier Festor
:
Towards the assessment of distributed vulnerabilities in autonomic networks and systems. 335-342 - Giovane Cesar Moreira Moura, Ramin Sadre, Anna Sperotto

, Aiko Pras:
Internet bad neighborhoods aggregation. 343-350 - Tung Tran, Issam Aib, Ehab Al-Shaer, Raouf Boutaba:

An evasive attack on SNORT flowbits. 351-358 - Bin Zhang, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao:

PCA-subspace method - Is it good enough for network-wide anomaly detection. 359-367 - Sebastian Hagen, Michael Seibold, Alfons Kemper:

Efficient verification of IT change operations or: How we could have prevented Amazon's cloud outage. 368-376 - Claudio Bartolini, Cesare Stefanelli, Mauro Tortonesi

:
Modeling IT support organizations using multiple-priority queues. 377-384 - José Jair Cardoso de Santanna, Juliano Araújo Wickboldt

, Lisandro Zambenedetti Granville
:
A BPM-based solution for inter-domain circuit management. 385-392 - Ananya Das:

Maximizing profit using SLA-aware provisioning. 393-400 - Alberto E. Schaeffer Filho

, Paul Smith
, Andreas Mauthe
, David Hutchison
, Yue Yu, Michael Fry:
A framework for the design and evaluation of network resilience management. 401-408 - Gong Su, Arun Iyengar:

A highly available transaction processing system with non-disruptive failure handling. 409-416 - Daphné Tuncer, Marinos Charalambides

, George Pavlou, N. Wang:
DACoRM: A coordinated, decentralized and adaptive network resource management scheme. 417-425 - Adel El-Atawy

, Taghrid Samak:
End-to-end verification of QoS policies. 426-434 - Kevin Mets, Matthias Strobbe, Tom Verschueren, Thomas Roelens, Filip De Turck, Chris Develder

:
Distributed multi-agent algorithm for residential energy management in smart grids. 435-443 - Ramona Trestian

, Arghir-Nicolae Moldovan, Olga Ormond, Gabriel-Miro Muntean
:
Energy consumption analysis of video streaming to Android mobile devices. 444-452 - Markus Tauber

, Saleem N. Bhatti
, Yi Yu:
Towards energy-awareness in managing wireless LAN applications. 453-461 - Mohsen Rajabpour, Farbod Razzazi

, Hamidreza Bakhshi:
Adaptive multiuser detection in DS/CDMA systems using generalized regression neural network. 462-465 - Bassam Khorchani, Sylvain Hallé

, Roger Villemaire
:
Firewall anomaly detection with a model checker for visibility logic. 466-469 - Vladimir Marbukh:

Towards modeling effect of packet-level TCP dynamics on Internet operations and management. 470-473 - Sanghwan Lee, Sambit Sahu, Rajeev Puri:

Designing standard service offerings for reducing IT service management cost. 474-477 - Wen-Hwa Liao, Hung-Chun Yang:

An energy-efficient data storage scheme in wireless sensor networks. 478-481 - Kwang-Koog Lee, Jeong-dong Ryoo, Sun Me Kim, Jong Hyun Lee:

Effective load balancing in Ethernet rings. 482-485 - Ryan Farley, Xinyuan Wang:

VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits. 486-489 - Antonis Hadjiantonis, Georgios Ellinas

:
Converged network and device management for data offloading. 490-493 - Benjamin E. Ujcich

, Kuang-Ching Wang
, Brian Parker, Daniel Schmiedt:
Thoughts on the Internet architecture from a modern enterprise network outage. 494-497 - Stefan Hommes

, Radu State, Thomas Engel:
A distance-based method to detect anomalous attributes in log files. 498-501 - Yexi Jiang, Chang-Shing Perng, Tao Li, Rong N. Chang

:
Intelligent cloud capacity management. 502-505 - Yun Li, Lili Zhao, Chonggang Wang, Ali Daneshmand, Qing Hu:

Aggregation-based spectrum allocation algorithm in cognitive radio networks. 506-509 - Jérôme François

, Cynthia Wagner, Radu State, Thomas Engel:
SAFEM: Scalable analysis of flows with entropic measures and SVM. 510-513 - Hung X. Nguyen, Matthew Roughan

:
Multi-observer privacy-preserving Hidden Markov Models. 514-517 - Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras:

A first look into SCADA network traffic. 518-521 - Manoj Soni, Venkateswara Reddy Madduri, Manish Gupta, Pradipta De:

Tracking configuration changes proactively in large IT environments. 522-525 - Wen-Hwa Liao, Kuo-Chiang Chang, Sital Prasad Kedia:

An object tracking scheme for wireless sensor networks using data mining mechanism. 526-529 - Kapil Singh:

xAccess: A unified user-centric access control framework for web applications. 530-533 - Lei Gao, Jiahai Yang, Hui Zhang, Donghong Qin, Bin Zhang:

What's going on in Chinese IPv6 world. 534-537 - Jae-Hoon Kim, Ju-Yeoul Park:

Estimated zone configuration for Fixed Mobile Substitution by RF fingerprint. 538-541 - Kriangkrai Limthong, Thidarat Tawsook:

Network traffic anomaly detection using machine learning approaches. 542-545 - Stephan M. Günther, Johann Schlamp, Georg Carle:

Spring-based geolocation. 546-549 - Yuqian Song, John Keeney, Owen Conlan

:
A framework to leverage domain expertise to support novice users in the visual exploration of Home Area Networks. 550-553 - Wen-Hwa Liao, Chong-Hao Huang:

An efficient data storage scheme for top-k query in wireless sensor networks. 554-557 - Chang-Shing Perng, Rong N. Chang

, Tao Tao, Edward So, Mihwa Choi, Hidayatullah Shaikh:
Universal economic analysis methodology for IT transformations. 558-561 - Pradipta De, Manish Gupta, Manoj Soni, Aditya Thatte:

Caching techniques for rapid provisioning of virtual servers in cloud environment. 562-565 - Tim De Pauw, Bruno Volckaert

, Veerle Ongenae, Filip De Turck:
SeCoA: Autonomous semantic service composition algorithm in symbiotic networks. 566-569 - Jacques M. Bahi, Abdallah Makhoul

, Maguy Medlej:
Frequency filtering approach for data aggregation in periodic sensor networks. 570-573 - Udaya Kiran Tupakula, Vijay Varadharajan

:
Distributed service control technique for detecting security attacks. 574-577 - Masataka Sonoda, Yukihiro Watanabe, Yasuhide Matsumoto:

Prediction of failure occurrence time based on system log message pattern learning. 578-581 - Emanuele Maccherani, Mauro Femminella, Jae Woo Lee

, Roberto Francescangeli, Jan Janak, Gianluca Reali, Henning Schulzrinne:
Extending the NetServ autonomic management capabilities using OpenFlow. 582-585 - Praveen Sharma, Jason Biddle, Aaron Daubman, Evan Fiore, Timothy Gallagher, Maximilian Merfeld, Santiago Paredes, Daniel Souza, Heather Zwahlen, Jeffrey Gottschalk, D. Marquis:

Content and host-centric information dissemination in delay-tolerant smartphone MANETs: An architecture and demonstration. 586-589 - Nan Deng, Christopher Stewart

, Daniel Gmach, Martin F. Arlitt:
Policy and mechanism for carbon-aware cloud applications. 590-594 - Hamada Alshaer

, Thierry Ernst, Arnaud de La Fortelle:
A QoS architecture for provisioning high quality in intelligent transportation services. 595-598 - Kimihiro Mizutani

, Osamu Akashi, Atsushi Terauchi, Takeshi Kugimoto, Mitsuru Maruyama:
A dynamic flow control mechanism based on a hierarchical feedback model for data center networks. 599-602 - Alexandre Gava Menezes, Carlos Becker Westphall, Carla Merkle Westphall, Eliel Marlon de Lima Pinto:

Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network. 603-606 - Carlos N. A. Corrêa, Sidney C. de Lucena, Daniel de A. Leao Marques

, Christian Esteve Rothenberg
, Marcos Rogério Salvador:
An experimental evaluation of lightweight virtualization for software-defined routing platform. 607-610 - Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Thomas Staub, Torsten Braun

:
TARWIS - A testbed management architecture for wireless sensor network testbeds. 611-614 - HyunYong Lee, Masahiro Yoshida, Akihiro Nakao:

On feasibility of P2P traffic control through network performance manipulation. 615-618 - Leila Bennacer, Laurent Ciavaglia, Abdelghani Chibani, Yacine Amirat, Abdelhamid Mellouk:

Optimization of fault diagnosis based on the combination of Bayesian Networks and Case-Based Reasoning. 619-622 - Puneet Sharma, Sujata Banerjee

, Deniz Demir, Srikanth Natarajan, Swamy Mandavilli:
NEEM: Network energy efficiency manager. 623-626 - Russel W. Havens, Barry M. Lunt, Chia-Chi Teng:

Naïve Bayesian filters for log file analysis: Despam your logs. 627-630 - Thomas Setzer, Andreas Wolke:

Virtual machine re-assignment considering migration overhead. 631-634 - Xiao-fei Bao, Yang Yang, Xuesong Qiu:

Multi-task overlapping coalition formation mechanism in wireless sensor network. 635-638 - Martin Becke, Thomas Dreibholz

, Hakim Adhari, Erwin P. Rathgeb:
A Future Internet architecture supporting multipath communication networks. 639-642 - Rafael Bosse Brinhosa, Carla Merkle Westphall, Carlos Becker Westphall:

Proposal and development of the Web services input validation model. 643-646 - Daniel Gmach, Jerry Rolia, Ludmila Cherkasova:

Comparing efficiency and costs of cloud computing models. 647-650 - David Palma

, Marília Curado
:
Impact analysis of hierarchical transitions in multi-hop clustered networks. 651-654 - Tingshan Huang, Nagarajan Kandasamy, Harish Sethu:

Evaluating compressive sampling strategies for performance monitoring of data centers. 655-658 - Glauco Estácio Gonçalves

, Marcelo Anderson Santos, Gustavo Charamba, Patricia Takako Endo
, Djamel Sadok, Judith Kelner, Bob Melander, Jan-Erik Mångs:
D-CRAS: Distributed cloud resource allocation system. 659-662 - Walee Al Mamun, Hanan Lutfiyya, David Kidston, Li Li:

Fault detection in MANETs. 663-666 - Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet

, Dominique Gaïti:
SAAM: A self-adaptive aggregation mechanism for autonomous management systems. 667-670 - Arun Kumar, Himanshu Chauhan, D. Janaki Ram:

RegSOP: A registry for service oriented programming with behavior based discovery. 671-674 - Guang Cheng:

Estimating the number of active flows from sampled packets. 675-678 - Qishi Wu, Poonam Dharam:

Advance bandwidth scheduling with minimal impact on immediate reservations in high-performance networks. 679-682 - Vladimir Marbukh:

Systemic risks/benefits of selfish network operations & management in dynamic environment. 683-686 - Yasuhiro Sato, Hirona Shimokawa, Shingo Ata, Ikuo Oka:

Cross-community approach for efficient information retrieval in social networking. 687-690 - Hai Huang, Salman Baset, Chunqiang Tang, Ashu Gupta, K. N. Madhu Sudhan, Fazal Feroze, Rajesh Garg, Sumithra Ravichandran:

Patch management automation for enterprise cloud. 691-705 - Changhee Cho, Jin-Hong Jeon, Jong-Yul Kim, Soonman Kwon, Sungshin Kim:

Network-based synchronizing control of a practical microgrid. 706-720 - Chun-Hao Liao, Chi-Sheng Wu, Hey-Chyi Young, Kuo-Hua Chang, Hsien-Hui Huang, Chia-Ching Hsu, Kuan-Hsiung Liang:

A novel mechanism for rapid provisioning virtual machines of cloud services. 721-735 - Kumar Bhaskaran, Milton Hernandez, Jim Laredo, Laura Luan, Yaoping Ruan, Maja Vukovic, Paul Driscoll, Daniel Miller, Alan Skinner, Girish Verma, Prema Vivekanandan, Leanne Chen, Gregory Gaskill:

Privileged identity management in enterprise service-hosting environments. 736-749 - Mattias Marder, Kumar Bhaskaran, Milton Hernandez, Jim Laredo, Daniela Rosu, Yaoping Ruan, Paul Driscoll, Alan Skinner:

Integrated user activity monitoring for regulatory services. 750-763 - Saul Emanuel Delabrida

, Ricardo Augusto Rabelo Oliveira
, Álvaro R. Pereira Jr.:
IDEAL-TRAFFIC: A self-adaptive management framework for building monitoring applications with support to network topology changes. 764-779 - Almudena Díaz

, Pedro Merino
, Francisco Javier Rivas
:
Test environment for QoS testing of VoIP over LTE. 780-794 - Sinem Güven, Catalin-Mihai Barbu, Dirk Husemann, Dorothea Wiesmann:

Change Risk Expert: Leveraging advanced classification and risk management techniques for systematic change failure reduction. 795-809 - Masanori Miyazawa:

Hierarchical resource model-driven performance analysis with dynamic data control. 810-822 - Jun-Ping Wang, Qi Liang Zhu, Van Ma:

A service optimization model on convergent network-based service delivery platform. 823-837 - Arne Øslebø:

Share and visualize your data using the perfSONAR NC framework. 838-852 - Lei Xu, Brendan Jennings

:
Automating the generation, deployment and application of charging schemes for composed communications services. 853-859 - François Gagnon

, Babak Esfandiari:
A hybrid approach to operating system discovery based on diagnosis theory. 860-865 - Federico Maggi

, Stefano Zanero
:
Integrated detection of anomalous behavior of computer infrastructures. 866-871 - Steven Latré, Filip De Turck:

Autonomic Quality of Experience management of multimedia networks. 872-879 - Stefan Wallin, Christer Åhlund

, Johan Nordlander:
Rethinking network management: Models, data-mining and self-learning. 880-886 - Daniel Câmara

, Christian Bonnet
, Fethi Filali
:
Topology management for mission critical networks: Applying supply and demand to manage public safety networks. 887-892 - Haibo Mi, Huaimin Wang, Gang Yin, Hua Cai, Qi Zhou, Tingtao Sun:

Performance problems diagnosis in cloud computing systems by mining request trace logs. 893-899 - Abhishek Verma, Ludmila Cherkasova, Vijay S. Kumar, Roy H. Campbell:

Deadline-based workload management for MapReduce environments: Pieces of the performance puzzle. 900-905 - Thiago A. L. Genez

, Luiz F. Bittencourt
, Edmundo R. M. Madeira
:
Workflow scheduling for SaaS / PaaS cloud providers considering two SLA levels. 906-912 - Christian Markl, Thomas Setzer:

Dynamic prioritization of transactions using threshold-prices. 913-918 - Miguel Lopes, António Costa

, Bruno Dias
:
Improving network services resilience through automatic service node configuration generation. 919-925 - Edgard Jamhour, Manoel Camillo Penna:

A state-based availability model to shared mesh protection in MPLS-TP networks with preemption support. 926-932 - Paulo Fonseca, Ricardo Bennesby, Edjard de Souza Mota, Alexandre Passito:

A replication component for resilient OpenFlow-based networking. 933-939 - Suchetana Chakraborty

, Sandip Chakraborty
, Sukumar Nandi
, Sushanta Karmakar:
A novel crash-tolerant data gathering in wireless sensor networks. 940-946 - Sven Graupner, Daniel Gmach:

Supervisory control as pattern for integrated IT management. 947-952 - Claudio Bartolini, Cesare Stefanelli, Davide Targa, Mauro Tortonesi

:
A cloud-based solution for the performance improvement of IT support organizations. 953-960 - David Loewenstern, Florian Pinel, Larisa Shwartz, Maira Gatti

, Ricardo Herrmann, Victor Cavalcante:
A learning feature engineering method for task assignment. 961-967 - Min-Chieh Yu, Jenq-Shiou Leu:

Adaptive weighted scheme for improving mobile sensor node connectivity in IEEE 802.15.4 networks. 968-973 - Vinicius C. M. Borges

, Erik Dimitrov, Marília Curado
, Edmundo Monteiro
:
Performance assessment of cluster load balancing routing methods for triple play services in Wireless Mesh Networks. 974-980 - Akshay Vashist, Rauf Izmailov

, Kyriakos Manousakis, Ritu Chadha, C. Jason Chiang, Constantin Serban, Syeed E. Ali:
Towards network invariant fault diagnosis in MANETs via statistical modeling: The global strength of local weak decisions. 981-987 - Samuel Marchal

, Jérôme François
, Cynthia Wagner, Radu State, Alexandre Dulaunoy, Thomas Engel, Olivier Festor
:
DNSSM: A large scale passive DNS security monitoring framework. 988-993 - Mohamed Amezziane

, Ehab Al-Shaer, Muhammad Qasim Ali:
On stochastic risk ordering of network services for proactive security management. 994-1000 - Cynthia Wagner, Jérôme François

, Radu State, Thomas Engel, Gérard Wagener, Alexandre Dulaunoy:
SDBF: Smart DNS brute-forcer. 1001-1007 - Qi Liao, Aaron Striegel

:
Intelligent network management using graph differential anomaly visualization. 1008-1014 - Sami J. Habib, Paulvanna Nayaki Marimuthu:

Management of network design through molecular assembly. 1015-1021 - Mauro Femminella, Roberto Francescangeli, Gianluca Reali, Henning Schulzrinne:

Gossip-based signaling dissemination extension for next steps in signaling. 1022-1028 - Gianni Antichi

, Stefano Giordano
, David J. Miller, Andrew W. Moore
:
Enabling open-source high speed network monitoring on NetFPGA. 1029-1035 - Scott Jordan, Gwen Shaffer:

Should users be entitled to use and control the devices of their choice on networks? 1036-1041 - Hamada Alshaer

, Thierry Ernst, Arnaud de La Fortelle:
An integrated architecture for multi-homed vehicle-to-infrastructure communications. 1042-1047 - Dimosthenis Pediaditakis, Anandha Gopalan, Naranker Dulay, Morris Sloman

:
A configuration service for home networks. 1048-1053 - Ebrahim Karami, Savo Glisic:

Self-management of mobile clouds in advanced wireless networks. 1054-1060 - Arum Kwon, Jin Xiao, Sin-Seok Seo, James Won-Ki Hong, Raouf Boutaba:

The impact of network performance on perceived video quality in H.264/AVC. 1061-1067 - Vijay Mann, Anilkumar Vishnoi:

iTrack: Correlating user activity with system data. 1068-1074 - Yeongrak Choi, Jae Yoon Chung, Byungchul Park, James Won-Ki Hong:

Automated classifier generation for application-level mobile traffic identification. 1075-1081 - Marcio L. F. Miguel, Manoel Camillo Penna, Júlio C. Nievola, Marcelo Eduardo Pellenz

:
New models for long-term Internet traffic forecasting using artificial neural networks and flow based information. 1082-1088 - Haydn Mearns, John Leaney

, Artem Parakhine, John K. Debenham, Dominique Verchère:
CARMA: Complete autonomous responsible management agents for telecommunications and inter-cloud services. 1089-1095 - Saber Zrelli, Atsushi Ishida, Nobuo Okabe, Fumio Teraoka:

ENM: A service oriented architecture for ontology-driven network management in heterogeneous network infrastructures. 1096-1103 - Sung-Su Kim, Sin-Seok Seo, Joon-Myung Kang

, James Won-Ki Hong:
Autonomic fault management based on cognitive control loops. 1104-1110 - Sylvain Hallé

, Eric Lunaud Ngoupe, Gaetan Nijdam, Omar Cherkaoui, Petko Valtchev
, Roger Villemaire
:
ValidMaker: A tool for managing device configurations using logical constraints. 1111-1118 - Andreas Louca, Andreas Mauthe, Alberto E. Schaeffer Filho

:
Efficient message-passing and autonomic management architecture for NGNs. 1119-1126 - Xiongqi Wu, James Griffioen:

Network path advising service for the future Internet. 1127-1134 - Yoshihiko Kanaumi, Shuichi Saito, Eiji Kawai, Shuji Ishii, Kazumasa Kobayashi, Shinji Shimojo

:
Deployment and operation of wide-area hybrid OpenFlow networks. 1135-1142 - Fernando N. N. Farias, Joao J. Salvatti, Eduardo Cerqueira, Antônio Jorge Gomes Abelém:

A proposal management of the legacy network environment using OpenFlow control plane. 1143-1150 - Sung-Ho Yoon, Jun-Sang Park, Myung-Sup Kim:

Signature maintenance for Internet application traffic identification using header signatures. 1151-1158 - Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, Shingo Ata, Dijiang Huang

, Deep Medhi:
SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation. 1159-1166 - Kwangtae Jeong, Jinwook Kim, Young-Tak Kim:

QoS-aware Network Operating System for software defined networking with Generalized OpenFlows. 1167-1174 - Tae-Ho Lee, Shahnaza Tursunova, Taesang Choi:

Graph clustering based provisioning algorithm for virtual network embedding. 1175-1178 - Muhammad Shoaib Siddiqui, Choong Seon Hong

, Mi-Jung Choi:
Autonomies in policy based network management. 1179-1182 - Milton A. Soares, Edmundo R. M. Madeira

:
A multi-agent architecture for autonomic management of virtual networks. 1183-1186 - Yatao Yang, Burkhard Stiller:

A non-repudiation scheme for user postings based on BAC in Mesh networks. 1187-1190 - Mohit Chamania

, Edip Demirbilek, Admela Jukan, Xavier Masip-Bruin
, Marcelo Yannuzzi
:
Using BPEL workflow processing for cross-layer orchestrations in IP-over-optical networks: A proof of concept. 1191-1194 - Tim De Pauw, Nelson Matthys, Bruno Volckaert

, Veerle Ongenae, Sam Michiels
, Filip De Turck:
Design of an autonomous software platform for future symbiotic service management. 1195-1198 - Lucas Guardalben

, Tomé Gomes, Paulo Salvador
, Susana Sargento
:
Self-organizing decentralized wireless management through social-based metrics. 1199-1202 - Matthias Strobbe, Tom Verschueren, Kevin Mets, Stijn Melis, Chris Develder

, Filip De Turck, Thierry Pollet, Stijn Van de Veire:
Design and evaluation of an architecture for future smart grid service provisioning. 1203-1206 - Kaliappa Ravindran, Mohammad Rabby:

Protocol-level reconfigurations for infusion of resilience in distributed network services. 1207-1213 - Abul Bashar

, Gerard Parr
, Sally I. McClean
, Bryan W. Scotney, Detlef D. Nauck:
Performance analysis of Bayesian Networks-based distributed Call Admission Control for NGN. 1214-1220 - Sylvain Martin, Laurent Chiarello, Guy Leduc:

DISco: A distributed information store for network challenges and their outcome. 1221-1226 - Ezra Kissel, Ahmed El-Hassany, Guilherme Fernandes, D. Martin Swany

, Dan Gunter
, Taghrid Samak, Jennifer M. Schopf:
Scalable integrated performance analysis of multi-gigabit networks. 1227-1233 - Brian Walshe, Rob Brennan

, Declan O'Sullivan
:
Correspondence pattern attribute selection for consumption of federated data sources. 1234-1240 - Jeroen Famaey

, Steven Latré, Tim Wauters, Filip De Turck:
An SLA-driven framework for dynamic multimedia content delivery federations. 1241-1247 - Niels Bouten, Steven Latré, Wim Van de Meerssche, Koen De Schepper

, Bart De Vleeschauwer, Werner Van Leekwijck, Filip De Turck:
An autonomic delivery framework for HTTP Adaptive Streaming in multicast-enabled multimedia access networks. 1248-1253 - Taghrid Samak, Dan Gunter

, Valerie C. Hendrix:
Scalable analysis of network measurements with Hadoop and Pig. 1254-1259 - James Griffioen, Zongming Fei, Hussamuddin Nasir, Xiongqi Wu, Jeremy Reed, Charles Carpenter:

The design of an instrumentation system for federated and virtualized network testbeds. 1260-1267 - Sylvain Hallé

, Omar Cherkaoui, Petko Valtchev
:
Towards a semantic virtualization of configurations. 1268-1271 - David Stezenbach, Matthias Hartmann, Kurt Tutschku

:
Parameters and challenges for Virtual Network embedding in the Future Internet. 1272-1278 - Charles Reiss, John Wilkes, Joseph L. Hellerstein:

Obfuscatory obscanturism: Making workload traces of commercially-sensitive systems safe to release. 1279-1286 - Arijit Khan

, Xifeng Yan, Shu Tao, Nikos Anerousis:
Workload characterization and prediction in the cloud: A multiple time series approach. 1287-1294 - Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:

Developing and managing customizable Software as a Service using feature model conversion. 1295-1302 - Taehyun Kim, Yeongrak Choi, Seunghee Han, Jae Yoon Chung, Jonghwan Hyun, Jian Li, James Won-Ki Hong:

Monitoring and detecting abnormal behavior in mobile cloud infrastructure. 1303-1310 - Helder Pereira Borges, José Neuman de Souza

, Bruno Schulze
, Antonio Roberto Mury:
Automatic generation of platforms in cloud computing. 1311-1318 - Takahiro Hirofuchi, Hidemoto Nakada

, Satoshi Itoh, Satoshi Sekiguchi:
Kagemusha: A guest-transparent Mobile IPv6 mechanism for wide-area live VM migration. 1319-1326 - Masum Z. Hasan, Edgar Magaña, Alexander Clemm, Lew Tucker, Sree Lakshmi D. Gudreddi:

Integrated and autonomic cloud resource scaling. 1327-1334 - Kunwadee Sripanidkulchai, Suleeporn Sujichantararat:

A business-driven framework for evaluating cloud computing. 1335-1342 - Genady Grabarnik, Yefim Haim Michlin, Larisa Shwartz:

Designing pilot for operational innovation in IT service delivery. 1343-1351 - Parijat Dube, Genady Grabarnik, Larisa Shwartz:

SUITS: How to make a global IT service provider sustainable? 1352-1359 - Shuchih Ernest Chang, Yu-Teng Jacky Jang, Chu-Ken Robert Chiu:

E-tourism: Understanding users' intention to adopt Podcasting in tourism. 1360-1363 - Christian Richter, Thomas Schaaf:

An approach to consolidate and optimize monitoring solutions. 1364-1367 - Chunming Gao, Guy C. Hembroff

:
Implications of modified waterfall model to the roles and education of health IT professionals. 1368-1369 - Rafael de Paula Herrera, Alan Salvany Felinto:

A distributed, multi-staged, high-throughput middleware for relational databases. 1370-1373 - Haochen Li, Zhiqiang Zhan:

Bussiness-driven automatic IT change management based on machine learning. 1374-1377 - Can Bozdogan, Nur Zincir-Heywood

:
Data mining for supporting IT management. 1378-1385 - Quan Guo, Zhiqiang Zhan, Teng Wang, Xiaodong Zhao:

Risk assessment and optimal proactive measure selection for IT service continuity management. 1386-1391 - Claudio Bartolini, Cesare Stefanelli, Mauro Tortonesi

:
Potential benefits and challenges of closed-loop optimization processes for IT support organizations. 1392-1398 - Stamatios V. Kartalopoulos:

Seamless integration of wireless access, free space optical, and fiber-based backbone networks. 1399-1402

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














