default search action
NOMS 2012: Maui, Hawaii, USA
- Filip De Turck, Luciano Paschoal Gaspary, Deep Medhi:
2012 IEEE Network Operations and Management Symposium, NOMS 2012, Maui, HI, USA, April 16-20, 2012. IEEE 2012, ISBN 978-1-4673-0267-8 - Khanh-Toan Tran, Nazim Agoulmine, Youssef Iraqi:
Cost-effective complex service mapping in cloud infrastructures. 1-8 - Balaji Viswanathan, Akshat Verma, Sourav Dutta:
CloudMap: Workload-aware placement in private heterogeneous clouds. 9-16 - Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Feature placement algorithms for high-variability applications in cloud environments. 17-24 - Ioannis Kitsos, Antonis Papaioannou, Nikos Tsikoudis, Kostas Magoutis:
Adapting data-intensive workloads to generic allocation policies in cloud infrastructures. 25-33 - Liang Tang, Tao Li, Florian Pinel, Larisa Shwartz, Genady Grabarnik:
Optimizing system monitoring configurations for non-actionable alerts. 34-42 - Liam Fallon, Declan O'Sullivan:
Using a semantic knowledge base for communication service quality management in Home Area Networks. 43-51 - Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Interactive learning of alert signatures in High Performance Cluster system logs. 52-60 - Yixin Diao, Aliza Heching:
Closed loop performance management for service delivery systems. 61-69 - Wonho Kim, Puneet Sharma:
Hercules: Integrated control framework for datacenter traffic management. 70-78 - Krishnamurthy Viswanathan, Choudur Lakshminarayan, Vanish Talwar, Chengwei Wang, Greg Macdonald, Wade Satterfield:
Ranking anomalies in data centers. 79-87 - Vijay Mann, Anilkumar Vishnoi, Kalapriya Kannan, Shivkumar Kalyanaraman:
CrossRoads: Seamless VM mobility across data centers through software defined networking. 88-96 - Rone Ilídio da Silva, Daniel Fernandes Macedo, José Marcos S. Nogueira:
Fault tolerance in spatial query processing for Wireless Sensor Networks. 97-104 - Huei-Wen Ferng, Dian Rachmarini:
A secure routing protocol for wireless sensor networks with consideration of energy efficiency. 105-112 - Sergio S. Furlaneto, Aldri L. dos Santos, Carmem S. Hara:
An efficient data acquisition model for urban sensor networks. 113-120 - Vasilis Sourlas, Paris Flegkas, Lazaros Gkatzikis, Leandros Tassiulas:
Autonomic cache management in Information-Centric Networks. 121-129 - Jeroen Famaey, Steven Latré, Tim Wauters, Filip De Turck:
FedRR - A Federated Resource Reservation algorithm for multimedia services. 130-137 - Ricardo Bennesby, Paulo Fonseca, Edjard de Souza Mota, Alexandre Passito:
An inter-AS routing component for software-defined networks. 138-145 - Misbah Uddin, Rolf Stadler, Alexander Clemm:
Management by network search. 146-154 - Rafael Antonello, Stenio F. L. Fernandes, Djamel Sadok, Judith Kelner, Géza Szabó:
Deterministic Finite Automaton for scalable traffic identification: The power of compressing by range. 155-162 - Weibo Chu, Xiaohong Guan, Lixin Gao, Zhongmin Cai:
Model-based real-time volume control for interactive network traffic replay. 163-170 - Claris Castillo, Asser N. Tantawi, Diana Arroyo, Malgorzata Steinder:
Cost-aware replication for dataflows. 171-178 - Andrzej Kochut, Alexei A. Karve:
Leveraging local image redundancy for efficient virtual machine provisioning. 179-187 - Chung Pan Tang, Tsz-Yeung Wong, Patrick P. C. Lee:
CloudVS: Enabling version control for virtual machines in an open-source cloud under commodity settings. 188-195 - Xiangliang Zhang, Zon-Yin Shae, Shuai Zheng, Hani Jamjoom:
Virtual machine migration in an over-committed cloud. 196-203 - Ahmed Ali-Eldin, Johan Tordsson, Erik Elmroth:
An adaptive hybrid elasticity controller for cloud infrastructures. 204-212 - Marcos Dias de Assunção, Marco Aurélio Stelmar Netto, Brian Peterson, Lakshminarayanan Renganarayana, John J. Rofrano, Chris Ward, Chris Young:
CloudAffinity: A framework for matching servers to cloudmates. 213-220 - Frédéric François, Ning Wang, Klaus Moessner, Stylianos Georgoulas:
Optimization for time-driven link sleeping reconfigurations in ISP backbone networks. 221-228 - Jinho Kim, Yasufumi Morioka, Junichiro Hagiwara:
An optimized seamless IP flow mobility management architecture for traffic offloading. 229-236 - Giuseppe Di Battista, Massimo Rimondini, Giorgio Sadolfo:
Monitoring the status of MPLS VPN and VPLS based on BGP signaling information. 237-244 - Andrei Vancea, Laurent d'Orazio, Burkhard Stiller:
Optimization of flow record handling by applying a decentralized cooperative semantic caching approach. 245-252 - Sun-il Kim, Nnamdi Nwanze, William Edmonds, Blake Johnson, Paloma Field:
On network intrusion detection for deployment in the wild. 253-260 - Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Dynamic exposure control in P2PSIP networks. 261-268 - Ramin Sadre, Anna Sperotto, Aiko Pras:
The effects of DDoS attacks on flow monitoring applications. 269-277 - Elisa Mannes, Michele Nogueira, Aldri Luiz dos Santos:
A bio-inspired scheme on quorum systems for reliable services data management in MANETs. 278-285 - Tânia L. Monteiro, Guy Pujolle, Marcelo Eduardo Pellenz, Manoel Camillo Penna, Richard Demo Souza:
An optimal channel assignment strategy for WLANs using distributed optimization. 286-292 - Rafael De Tommaso do Valle, Débora Christina Muchaluat-Saade:
MeshAdmin: An integrated platform for wireless mesh network management. 293-301 - Koen De Schepper, Bart De Vleeschauwer, Chris Hawinkel, Werner Van Leekwijck, Jeroen Famaey, Wim Van de Meerssche, Filip De Turck:
Shared Content Addressing Protocol (SCAP): Optimizing multimedia content distribution at the transport layer. 302-310 - Lothar Braun, Alexander Klein, Georg Carle, Helmut Reiser, Jochen Eisl:
Analyzing caching benefits for YouTube traffic in edge networks - A measurement-based evaluation. 311-318 - Brian Meskill, Alan Davy, Brendan Jennings:
Revenue-maximizing server selection and admission control for IPTV content servers using available bandwidth estimates. 319-326 - Adler Hoff Schmidt, Rodolfo Stoffel Antunes, Marinho P. Barcellos, Luciano Paschoal Gaspary:
Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks. 327-334 - Martín Barrère, Remi Badonnel, Olivier Festor:
Towards the assessment of distributed vulnerabilities in autonomic networks and systems. 335-342 - Giovane Cesar Moreira Moura, Ramin Sadre, Anna Sperotto, Aiko Pras:
Internet bad neighborhoods aggregation. 343-350 - Tung Tran, Issam Aib, Ehab Al-Shaer, Raouf Boutaba:
An evasive attack on SNORT flowbits. 351-358 - Bin Zhang, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao:
PCA-subspace method - Is it good enough for network-wide anomaly detection. 359-367 - Sebastian Hagen, Michael Seibold, Alfons Kemper:
Efficient verification of IT change operations or: How we could have prevented Amazon's cloud outage. 368-376 - Claudio Bartolini, Cesare Stefanelli, Mauro Tortonesi:
Modeling IT support organizations using multiple-priority queues. 377-384 - José Jair Cardoso de Santanna, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville:
A BPM-based solution for inter-domain circuit management. 385-392 - Ananya Das:
Maximizing profit using SLA-aware provisioning. 393-400 - Alberto E. Schaeffer Filho, Paul Smith, Andreas Mauthe, David Hutchison, Yue Yu, Michael Fry:
A framework for the design and evaluation of network resilience management. 401-408 - Gong Su, Arun Iyengar:
A highly available transaction processing system with non-disruptive failure handling. 409-416 - Daphné Tuncer, Marinos Charalambides, George Pavlou, N. Wang:
DACoRM: A coordinated, decentralized and adaptive network resource management scheme. 417-425 - Adel El-Atawy, Taghrid Samak:
End-to-end verification of QoS policies. 426-434 - Kevin Mets, Matthias Strobbe, Tom Verschueren, Thomas Roelens, Filip De Turck, Chris Develder:
Distributed multi-agent algorithm for residential energy management in smart grids. 435-443 - Ramona Trestian, Arghir-Nicolae Moldovan, Olga Ormond, Gabriel-Miro Muntean:
Energy consumption analysis of video streaming to Android mobile devices. 444-452 - Markus Tauber, Saleem N. Bhatti, Yi Yu:
Towards energy-awareness in managing wireless LAN applications. 453-461 - Mohsen Rajabpour, Farbod Razzazi, Hamidreza Bakhshi:
Adaptive multiuser detection in DS/CDMA systems using generalized regression neural network. 462-465 - Bassam Khorchani, Sylvain Hallé, Roger Villemaire:
Firewall anomaly detection with a model checker for visibility logic. 466-469 - Vladimir Marbukh:
Towards modeling effect of packet-level TCP dynamics on Internet operations and management. 470-473 - Sanghwan Lee, Sambit Sahu, Rajeev Puri:
Designing standard service offerings for reducing IT service management cost. 474-477 - Wen-Hwa Liao, Hung-Chun Yang:
An energy-efficient data storage scheme in wireless sensor networks. 478-481 - Kwang-Koog Lee, Jeong-dong Ryoo, Sun Me Kim, Jong Hyun Lee:
Effective load balancing in Ethernet rings. 482-485 - Ryan Farley, Xinyuan Wang:
VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits. 486-489 - Antonis Hadjiantonis, Georgios Ellinas:
Converged network and device management for data offloading. 490-493 - Benjamin Ujcich, Kuang-Ching Wang, Brian Parker, Daniel Schmiedt:
Thoughts on the Internet architecture from a modern enterprise network outage. 494-497 - Stefan Hommes, Radu State, Thomas Engel:
A distance-based method to detect anomalous attributes in log files. 498-501 - Yexi Jiang, Chang-Shing Perng, Tao Li, Rong N. Chang:
Intelligent cloud capacity management. 502-505 - Yun Li, Lili Zhao, Chonggang Wang, Ali Daneshmand, Qing Hu:
Aggregation-based spectrum allocation algorithm in cognitive radio networks. 506-509 - Jérôme François, Cynthia Wagner, Radu State, Thomas Engel:
SAFEM: Scalable analysis of flows with entropic measures and SVM. 510-513 - Hung X. Nguyen, Matthew Roughan:
Multi-observer privacy-preserving Hidden Markov Models. 514-517 - Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras:
A first look into SCADA network traffic. 518-521 - Manoj Soni, Venkateswara Reddy Madduri, Manish Gupta, Pradipta De:
Tracking configuration changes proactively in large IT environments. 522-525 - Wen-Hwa Liao, Kuo-Chiang Chang, Sital Prasad Kedia:
An object tracking scheme for wireless sensor networks using data mining mechanism. 526-529 - Kapil Singh:
xAccess: A unified user-centric access control framework for web applications. 530-533 - Lei Gao, Jiahai Yang, Hui Zhang, Donghong Qin, Bin Zhang:
What's going on in Chinese IPv6 world. 534-537 - Jae-Hoon Kim, Ju-Yeoul Park:
Estimated zone configuration for Fixed Mobile Substitution by RF fingerprint. 538-541 - Kriangkrai Limthong, Thidarat Tawsook:
Network traffic anomaly detection using machine learning approaches. 542-545 - Stephan M. Günther, Johann Schlamp, Georg Carle:
Spring-based geolocation. 546-549 - Yuqian Song, John Keeney, Owen Conlan:
A framework to leverage domain expertise to support novice users in the visual exploration of Home Area Networks. 550-553 - Wen-Hwa Liao, Chong-Hao Huang:
An efficient data storage scheme for top-k query in wireless sensor networks. 554-557 - Chang-Shing Perng, Rong N. Chang, Tao Tao, Edward So, Mihwa Choi, Hidayatullah Shaikh:
Universal economic analysis methodology for IT transformations. 558-561 - Pradipta De, Manish Gupta, Manoj Soni, Aditya Thatte:
Caching techniques for rapid provisioning of virtual servers in cloud environment. 562-565 - Tim De Pauw, Bruno Volckaert, Veerle Ongenae, Filip De Turck:
SeCoA: Autonomous semantic service composition algorithm in symbiotic networks. 566-569 - Jacques M. Bahi, Abdallah Makhoul, Maguy Medlej:
Frequency filtering approach for data aggregation in periodic sensor networks. 570-573 - Udaya Kiran Tupakula, Vijay Varadharajan:
Distributed service control technique for detecting security attacks. 574-577 - Masataka Sonoda, Yukihiro Watanabe, Yasuhide Matsumoto:
Prediction of failure occurrence time based on system log message pattern learning. 578-581 - Emanuele Maccherani, Mauro Femminella, Jae Woo Lee, Roberto Francescangeli, Jan Janak, Gianluca Reali, Henning Schulzrinne:
Extending the NetServ autonomic management capabilities using OpenFlow. 582-585 - Praveen Sharma, Jason Biddle, Aaron Daubman, Evan Fiore, Timothy Gallagher, Maximilian Merfeld, Santiago Paredes, Daniel Souza, Heather Zwahlen, Jeffrey Gottschalk, D. Marquis:
Content and host-centric information dissemination in delay-tolerant smartphone MANETs: An architecture and demonstration. 586-589 - Nan Deng, Christopher Stewart, Daniel Gmach, Martin F. Arlitt:
Policy and mechanism for carbon-aware cloud applications. 590-594 - Hamada Alshaer, Thierry Ernst, Arnaud de La Fortelle:
A QoS architecture for provisioning high quality in intelligent transportation services. 595-598 - Kimihiro Mizutani, Osamu Akashi, Atsushi Terauchi, Takeshi Kugimoto, Mitsuru Maruyama:
A dynamic flow control mechanism based on a hierarchical feedback model for data center networks. 599-602 - Alexandre Gava Menezes, Carlos Becker Westphall, Carla Merkle Westphall, Eliel Marlon de Lima Pinto:
Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network. 603-606 - Carlos N. A. Corrêa, Sidney C. de Lucena, Daniel de A. Leao Marques, Christian Esteve Rothenberg, Marcos Rogério Salvador:
An experimental evaluation of lightweight virtualization for software-defined routing platform. 607-610 - Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Thomas Staub, Torsten Braun:
TARWIS - A testbed management architecture for wireless sensor network testbeds. 611-614 - HyunYong Lee, Masahiro Yoshida, Akihiro Nakao:
On feasibility of P2P traffic control through network performance manipulation. 615-618 - Leila Bennacer, Laurent Ciavaglia, Abdelghani Chibani, Yacine Amirat, Abdelhamid Mellouk:
Optimization of fault diagnosis based on the combination of Bayesian Networks and Case-Based Reasoning. 619-622 - Puneet Sharma, Sujata Banerjee, Deniz Demir, Srikanth Natarajan, Swamy Mandavilli:
NEEM: Network energy efficiency manager. 623-626 - Russel W. Havens, Barry M. Lunt, Chia-Chi Teng:
Naïve Bayesian filters for log file analysis: Despam your logs. 627-630 - Thomas Setzer, Andreas Wolke:
Virtual machine re-assignment considering migration overhead. 631-634 - Xiao-fei Bao, Yang Yang, Xuesong Qiu:
Multi-task overlapping coalition formation mechanism in wireless sensor network. 635-638 - Martin Becke, Thomas Dreibholz, Hakim Adhari, Erwin P. Rathgeb:
A Future Internet architecture supporting multipath communication networks. 639-642 - Rafael Bosse Brinhosa, Carla Merkle Westphall, Carlos Becker Westphall:
Proposal and development of the Web services input validation model. 643-646 - Daniel Gmach, Jerry Rolia, Ludmila Cherkasova:
Comparing efficiency and costs of cloud computing models. 647-650 - David Palma, Marília Curado:
Impact analysis of hierarchical transitions in multi-hop clustered networks. 651-654 - Tingshan Huang, Nagarajan Kandasamy, Harish Sethu:
Evaluating compressive sampling strategies for performance monitoring of data centers. 655-658 - Glauco Estácio Gonçalves, Marcelo Anderson Santos, Gustavo Charamba, Patricia Takako Endo, Djamel Sadok, Judith Kelner, Bob Melander, Jan-Erik Mångs:
D-CRAS: Distributed cloud resource allocation system. 659-662 - Walee Al Mamun, Hanan Lutfiyya, David Kidston, Li Li:
Fault detection in MANETs. 663-666 - Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti:
SAAM: A self-adaptive aggregation mechanism for autonomous management systems. 667-670 - Arun Kumar, Himanshu Chauhan, D. Janaki Ram:
RegSOP: A registry for service oriented programming with behavior based discovery. 671-674 - Guang Cheng:
Estimating the number of active flows from sampled packets. 675-678 - Qishi Wu, Poonam Dharam:
Advance bandwidth scheduling with minimal impact on immediate reservations in high-performance networks. 679-682 - Vladimir Marbukh:
Systemic risks/benefits of selfish network operations & management in dynamic environment. 683-686 - Yasuhiro Sato, Hirona Shimokawa, Shingo Ata, Ikuo Oka:
Cross-community approach for efficient information retrieval in social networking. 687-690 - Hai Huang, Salman Baset, Chunqiang Tang, Ashu Gupta, K. N. Madhu Sudhan, Fazal Feroze, Rajesh Garg, Sumithra Ravichandran:
Patch management automation for enterprise cloud. 691-705 - Changhee Cho, Jin-Hong Jeon, Jong-Yul Kim, Soonman Kwon, Sungshin Kim:
Network-based synchronizing control of a practical microgrid. 706-720 - Chun-Hao Liao, Chi-Sheng Wu, Hey-Chyi Young, Kuo-Hua Chang, Hsien-Hui Huang, Chia-Ching Hsu, Kuan-Hsiung Liang:
A novel mechanism for rapid provisioning virtual machines of cloud services. 721-735 - Kumar Bhaskaran, Milton Hernandez, Jim Laredo, Laura Luan, Yaoping Ruan, Maja Vukovic, Paul Driscoll, Daniel Miller, Alan Skinner, Girish Verma, Prema Vivekanandan, Leanne Chen, Gregory Gaskill:
Privileged identity management in enterprise service-hosting environments. 736-749 - Mattias Marder, Kumar Bhaskaran, Milton Hernandez, Jim Laredo, Daniela Rosu, Yaoping Ruan, Paul Driscoll, Alan Skinner:
Integrated user activity monitoring for regulatory services. 750-763