


default search action
Journal of Network and Systems Management, Volume 13
Volume 13, Number 1, March 2005
Thresholds
- Ahmed M. Al-Naamany, Hadj Bourdoucen:

TCP Congestion Control Approach for Improving Network Services. 1-6
- Wayne D. Grover, David Tipper

:
Design and Operation of Survivable Networks. 7-11
- Rajarshi Gupta, Eric C. Chi

, Jean C. Walrand:
Different Algorithms for Normal and Protection Paths. 13-33 - Arie M. C. A. Koster

, Adrian Zymolka, Monika Jäger, Ralf Huelsermann:
Demand-wise Shared Protection for Meshed Optical Networks. 35-55 - Eligijus Kubilinskas, Michal Pióro

, Pål Nilsson:
Design models for Robust Multi-Layer Next Generation Internet Core Networks Carrying Elastic Traffic. 57-76 - Florent Mobiot, Brunilde Sansò, André Girard:

Design of Reliable IP/GMPLS Networks: An Integrated Approach. 77-97 - Sebastian Orlowski, Roland Wessäly:

Comparing Restoration Concepts using Optimal Network Configurations with Integrated Hardware and Routing Decisions. 99-118 - Péter Hegyi, Markosz Maliosz

, Ákos Ladányi, Tibor Cinkler:
Virtual Private/Overlay Network Design with Traffic Concentration and Shared Protection. 119-138
Volume 13, Number 2, June 2005
Thresholds
- Eric Klein:

Moving or Merging IT Departments? J. Netw. Syst. Manag. 13(2) (2005)
- Alexander Keller, Marcus Brunner:

Self-Managing Systems and Networks. 147-149
- Norman Bobroff, Lily B. Mummert:

Design and Implementation of a Resource Manager in a Distributed Database System. 151-174 - Artur Andrzejak, Mehmet Ceyran:

Characterizing and Predicting Resource Demand by Periodicity Mining. 175-196 - Spyros Voulgaris, Daniela Gavidia, Maarten van Steen

:
CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays. 197-217 - Mark Brodie, Sheng Ma, Leonid Rachevsky, Jon Champlin:

Automated Problem Determination using Call-Stack Matching. 219-237
Volume 13, Number 3, September 2005
- Paul Brusil, John Hale

:
The Shifting Sands of Security Management. 241-245 - M. E. Kabay:

Improving Information Assurance Education Key to Improving Secure(ity) Management. 247-251 - Jerald Dawkins, K. Clark, Gavin Manes, Mauricio Papa

:
A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks. 253-267 - Yi Hu, Brajendra Panda:

Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. 269-291 - Ganapathi Padmavathi

, Samukutty Annadurai:
Improved Key Management Technique for Secure Multicasting over IP. 293-308 - Carla Merkle Westphall

, Joni da Silva Fraga:
Mandatory and Discretionary Policies for CORBA Security. 309-328 - Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi:

NetGlean: A Methodology for Distributed Network Security Scanning. 329-344 - Prem Chand:

Building A Standards Driven Security Framework for New Generation Operations Software and Systems (NGOSS) - The TeleManagement Forum (TMF) Approach. 345-350 - Alexander Clemm, Olivier Festor, Aiko Pras:

Managing New Networked Worlds - A Report on IM 2005. 351-354
Volume 13, Number 4, December 2005
- Yogesh Bhole, Adrian Popescu:

Measurement and Analysis of HTTP Traffic. 357-371 - Oussama Laouamri, Chouki Aktouf:

Towards a Complete SNMP-Based Supervision of System-on-Chips. 373-386 - Saravut Charcranoon, Tarek S. El-Bawab, Jong-Dug Shin, Hakki C. Cankaya:

Framework for Operation and Maintenance (OAM) in Optical Burst Switched Networks. 387-408 - Jianguo Ding

, Bernd J. Krämer
, Yingcai Bai, Hansheng Chen:
Backward Inference in Bayesian Networks for Distributed Systems Management. 409-427 - Lars-Olof Burchard:

Networks with Advance Reservations: Applications, Architecture, and Performance. 429-449 - Dimitris Alexopoulos, John Soldatos:

XMLNET: An Architecture for Cost Effective Network Management Based on XML Technologies. 451-477 - Remi Badonnel, Radu State, Olivier Festor, André Schaff:

A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks. 479-497 - Alexander Clemm, Olivier Festor, Aiko Pras:

Managing New Networked Worlds - A Report on IM 2005. 499-502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














