callback( { "result":{ "query":":facetid:toc:\"db/journals/tnsm/tnsm9.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"318.53" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"38", "@dc":"38", "@oc":"38", "@id":"43475277", "text":":facetid:toc:db/journals/tnsm/tnsm9.bht" } }, "hits":{ "@total":"38", "@computed":"38", "@sent":"38", "@first":"0", "hit":[{ "@score":"1", "@id":"4359385", "info":{"authors":{"author":[{"@pid":"a/HAlshaer","text":"Hamada Alshaer"},{"@pid":"82/5029","text":"Jaafar M. H. Elmirghani"}]},"title":"Multilayer Dynamic Traffic Grooming with Constrained Differentiated Resilience in IP/MPLS-over-WDM Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"1","pages":"60-72","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/AlshaerE12","doi":"10.1109/TNSM.2011.110911.110115","ee":"https://doi.org/10.1109/TNSM.2011.110911.110115","url":"https://dblp.org/rec/journals/tnsm/AlshaerE12"}, "url":"URL#4359385" }, { "@score":"1", "@id":"4359386", "info":{"authors":{"author":[{"@pid":"23/8968","text":"Fenye Bao"},{"@pid":"c/IngRayChen","text":"Ing-Ray Chen"},{"@pid":"64/3475","text":"Moonjeong Chang"},{"@pid":"71/2230","text":"Jin-Hee Cho"}]},"title":"Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"2","pages":"169-183","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/BaoCCC12","doi":"10.1109/TCOMM.2012.031912.110179","ee":"https://doi.org/10.1109/TCOMM.2012.031912.110179","url":"https://dblp.org/rec/journals/tnsm/BaoCCC12"}, "url":"URL#4359386" }, { "@score":"1", "@id":"4359387", "info":{"authors":{"author":[{"@pid":"26/6925","text":"Antonio Cianfrani"},{"@pid":"40/3809","text":"Vincenzo Eramo"},{"@pid":"88/1887","text":"Marco Listanti"},{"@pid":"31/11512","text":"Marco Polverini"},{"@pid":"40/4747","text":"Athanasios V. Vasilakos"}]},"title":"An OSPF-Integrated Routing Strategy for QoS-Aware Energy Saving in IP Backbone Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"254-267","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/CianfraniELPV12","doi":"10.1109/TNSM.2012.031512.110165","ee":"https://doi.org/10.1109/TNSM.2012.031512.110165","url":"https://dblp.org/rec/journals/tnsm/CianfraniELPV12"}, "url":"URL#4359387" }, { "@score":"1", "@id":"4359388", "info":{"authors":{"author":[{"@pid":"47/8356","text":"Richard Combes"},{"@pid":"45/5021","text":"Zwi Altman"},{"@pid":"a/EitanAltman","text":"Eitan Altman"}]},"title":"Self-Organizing Relays: Dimensioning, Self-Optimization, and Learning.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"487-500","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/CombesAA12","doi":"10.1109/TNSM.2012.082512.120252","ee":"https://doi.org/10.1109/TNSM.2012.082512.120252","url":"https://dblp.org/rec/journals/tnsm/CombesAA12"}, "url":"URL#4359388" }, { "@score":"1", "@id":"4359389", "info":{"authors":{"author":[{"@pid":"41/3185","text":"Hamza Dahmouni"},{"@pid":"66/1755","text":"André Girard"},{"@pid":"85/8056","text":"Mohamed Ouzineb"},{"@pid":"88/1777","text":"Brunilde Sansò"}]},"title":"The Impact of Jitter on Traffic Flow Optimization in Communication Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"279-292","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/DahmouniGOS12","doi":"10.1109/TNSM.2012.051712.110148","ee":"https://doi.org/10.1109/TNSM.2012.051712.110148","url":"https://dblp.org/rec/journals/tnsm/DahmouniGOS12"}, "url":"URL#4359389" }, { "@score":"1", "@id":"4359390", "info":{"authors":{"author":[{"@pid":"97/8395","text":"Sourav Kumar Dandapat"},{"@pid":"49/4803","text":"Bivas Mitra"},{"@pid":"19/6964","text":"Romit Roy Choudhury"},{"@pid":"52/6987","text":"Niloy Ganguly"}]},"title":"Smart Association Control in Wireless Mobile Environment Using Max-Flow.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"1","pages":"73-86","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/DandapatMCG12","doi":"10.1109/TNSM.2011.113011.100098","ee":"https://doi.org/10.1109/TNSM.2011.113011.100098","url":"https://dblp.org/rec/journals/tnsm/DandapatMCG12"}, "url":"URL#4359390" }, { "@score":"1", "@id":"4359391", "info":{"authors":{"author":[{"@pid":"67/6644","text":"Qiang Duan"},{"@pid":"y/YuhongYan","text":"Yuhong Yan"},{"@pid":"40/4747","text":"Athanasios V. Vasilakos"}]},"title":"A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"373-392","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/DuanYV12","doi":"10.1109/TNSM.2012.113012.120310","ee":"https://doi.org/10.1109/TNSM.2012.113012.120310","url":"https://dblp.org/rec/journals/tnsm/DuanYV12"}, "url":"URL#4359391" }, { "@score":"1", "@id":"4359392", "info":{"authors":{"author":{"@pid":"71/3754","text":"Ulrik Franke"}},"title":"Optimal IT Service Availability: Shorter Outages, or Fewer?","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"1","pages":"22-33","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/Franke12","doi":"10.1109/TNSM.2011.110811.110122","ee":"https://doi.org/10.1109/TNSM.2011.110811.110122","url":"https://dblp.org/rec/journals/tnsm/Franke12"}, "url":"URL#4359392" }, { "@score":"1", "@id":"4359393", "info":{"authors":{"author":[{"@pid":"43/6355","text":"Carol J. Fung"},{"@pid":"84/6889-2","text":"Jie Zhang 0002"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"}]},"title":"Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"320-332","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/FungZB12","doi":"10.1109/TNSM.2012.051712.110124","ee":"https://doi.org/10.1109/TNSM.2012.051712.110124","url":"https://dblp.org/rec/journals/tnsm/FungZB12"}, "url":"URL#4359393" }, { "@score":"1", "@id":"4359394", "info":{"authors":{"author":[{"@pid":"31/2952","text":"José Luis García-Dorado"},{"@pid":"09/2252","text":"Alessandro Finamore"},{"@pid":"18/6316","text":"Marco Mellia"},{"@pid":"98/5305","text":"Michela Meo"},{"@pid":"65/4645","text":"Maurizio M. Munafò"}]},"title":"Characterization of ISP Traffic: Trends, User Habits, and Access Technology Impact.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"2","pages":"142-155","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/Garcia-DoradoFMMM12","doi":"10.1109/TNSM.2012.022412.110184","ee":"https://doi.org/10.1109/TNSM.2012.022412.110184","url":"https://dblp.org/rec/journals/tnsm/Garcia-DoradoFMMM12"}, "url":"URL#4359394" }, { "@score":"1", "@id":"4359395", "info":{"authors":{"author":[{"@pid":"40/9980","text":"Tristan Groleat"},{"@pid":"10/1701","text":"Hélia Pouyllau"}]},"title":"Distributed Learning Algorithms for Inter-NSP SLA Negotiation Management.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"433-445","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/GroleatP12","doi":"10.1109/TNSM.2012.072012.110185","ee":"https://doi.org/10.1109/TNSM.2012.072012.110185","url":"https://dblp.org/rec/journals/tnsm/GroleatP12"}, "url":"URL#4359395" }, { "@score":"1", "@id":"4359396", "info":{"authors":{"author":[{"@pid":"89/4899","text":"Bechir Hamdaoui"},{"@pid":"01/10126","text":"MohammadJavad NoroozOliaee"},{"@pid":"22/378","text":"Kagan Tumer"},{"@pid":"34/2264","text":"Ammar Rayes"}]},"title":"Coordinating Secondary-User Behaviors for Inelastic Traffic Reward Maximization in Large-Scale \\osa Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"501-513","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/HamdaouiNTR12","doi":"10.1109/TNSM.2012.080812.110174","ee":"https://doi.org/10.1109/TNSM.2012.080812.110174","url":"https://dblp.org/rec/journals/tnsm/HamdaouiNTR12"}, "url":"URL#4359396" }, { "@score":"1", "@id":"4359397", "info":{"authors":{"author":[{"@pid":"62/921","text":"Chengchen Hu"},{"@pid":"c/KaiChen5","text":"Kai Chen 0005"},{"@pid":"88/2827-4","text":"Yan Chen 0004"},{"@pid":"35/837-1","text":"Bin Liu 0001"},{"@pid":"40/4747","text":"Athanasios V. Vasilakos"}]},"title":"A Measurement Study on Potential Inter-Domain Routing Diversity.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"268-278","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/HuCCLV12","doi":"10.1109/TNSM.2012.070512.110191","ee":"https://doi.org/10.1109/TNSM.2012.070512.110191","url":"https://dblp.org/rec/journals/tnsm/HuCCLV12"}, "url":"URL#4359397" }, { "@score":"1", "@id":"4359398", "info":{"authors":{"author":[{"@pid":"15/8356","text":"Guanyao Huang"},{"@pid":"93/1939","text":"Chia-Wei Chang"},{"@pid":"47/4465","text":"Chen-Nee Chuah"},{"@pid":"l/BillLin","text":"Bill Lin 0001"}]},"title":"Measurement-Aware Monitor Placement and Routing: A Joint Optimization Approach for Network-Wide Measurements.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"1","pages":"48-59","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/HuangCCL12","doi":"10.1109/TNSM.2012.010912.110128","ee":"https://doi.org/10.1109/TNSM.2012.010912.110128","url":"https://dblp.org/rec/journals/tnsm/HuangCCL12"}, "url":"URL#4359398" }, { "@score":"1", "@id":"4359399", "info":{"authors":{"author":[{"@pid":"79/460","text":"JeeHyun Hwang"},{"@pid":"x/TaoXie","text":"Tao Xie 0001"},{"@pid":"81/4345-1","text":"Fei Chen 0001"},{"@pid":"l/AlexXLiu","text":"Alex X. Liu"}]},"title":"Systematic Structural Testing of Firewall Policies.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"1","pages":"1-11","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/HwangXCL12","doi":"10.1109/TNSM.2012.012012.100092","ee":"https://doi.org/10.1109/TNSM.2012.012012.100092","url":"https://dblp.org/rec/journals/tnsm/HwangXCL12"}, "url":"URL#4359399" }, { "@score":"1", "@id":"4359400", "info":{"authors":{"author":[{"@pid":"63/5481","text":"Elliott Karpilovsky"},{"@pid":"09/384","text":"Matthew Caesar 0001"},{"@pid":"r/JenniferRexford","text":"Jennifer Rexford"},{"@pid":"s/AmanShaikh","text":"Aman Shaikh"},{"@pid":"m/JEvanderMerwe","text":"Jacobus E. van der Merwe"}]},"title":"Practical Network-Wide Compression of IP Routing Tables.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"446-458","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/KarpilovskyCRSM12","doi":"10.1109/TNSM.2012.081012.120246","ee":"https://doi.org/10.1109/TNSM.2012.081012.120246","url":"https://dblp.org/rec/journals/tnsm/KarpilovskyCRSM12"}, "url":"URL#4359400" }, { "@score":"1", "@id":"4359401", "info":{"authors":{"author":[{"@pid":"146/6423","text":"Iyad A. Katib"},{"@pid":"m/DeepMedhi","text":"Deep Medhi"}]},"title":"IP/MPLS-over-OTN-over-DWDM Multilayer Networks: An Integrated Three-Layer Capacity Optimization Model, a Heuristic, and a Study.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"240-253","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/KatibM12","doi":"10.1109/TNSM.2012.12.110124","ee":"https://doi.org/10.1109/TNSM.2012.12.110124","url":"https://dblp.org/rec/journals/tnsm/KatibM12"}, "url":"URL#4359401" }, { "@score":"1", "@id":"4359402", "info":{"authors":{"author":[{"@pid":"49/5526","text":"Abdelkader Lahmadi"},{"@pid":"f/OlivierFestor","text":"Olivier Festor"}]},"title":"A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"2","pages":"114-127","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/LahmadiF12","doi":"10.1109/TNSM.2012.011812.110125","ee":"https://doi.org/10.1109/TNSM.2012.011812.110125","url":"https://dblp.org/rec/journals/tnsm/LahmadiF12"}, "url":"URL#4359402" }, { "@score":"1", "@id":"4359403", "info":{"authors":{"author":[{"@pid":"49/612-2","text":"Yinan Li 0002"},{"@pid":"c/IngRayChen","text":"Ing-Ray Chen"}]},"title":"Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"226-239","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/LiC12","doi":"10.1109/TNSM.2012.051712.100101","ee":"https://doi.org/10.1109/TNSM.2012.051712.100101","url":"https://dblp.org/rec/journals/tnsm/LiC12"}, "url":"URL#4359403" }, { "@score":"1", "@id":"4359404", "info":{"authors":{"author":[{"@pid":"l/JunLi8","text":"Jun Li 0008"},{"@pid":"11/3042","text":"Sharad Singhal"},{"@pid":"78/3547","text":"Ram Swaminathan"},{"@pid":"36/4757","text":"Alan H. Karp"}]},"title":"Managing Data Retention Policies at Scale.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"393-406","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/LiSSK12","doi":"10.1109/TNSM.2012.101612.110203","ee":"https://doi.org/10.1109/TNSM.2012.101612.110203","url":"https://dblp.org/rec/journals/tnsm/LiSSK12"}, "url":"URL#4359404" }, { "@score":"1", "@id":"4359405", "info":{"authors":{"author":[{"@pid":"181/2688-2","text":"Qi Li 0002"},{"@pid":"18/6055","text":"Mingwei Xu"},{"@pid":"82/4905","text":"Jianping Wu"},{"@pid":"25/4018","text":"Patrick P. C. Lee"},{"@pid":"93/5648","text":"Xingang Shi"},{"@pid":"24/4603","text":"Dah Ming Chiu"},{"@pid":"25/1439-1","text":"Yuan Yang 0001"}]},"title":"A Unified Approach to Routing Protection in IP Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"306-319","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/LiXWLSCY12","doi":"10.1109/TNSM.2012.070512.110138","ee":"https://doi.org/10.1109/TNSM.2012.070512.110138","url":"https://dblp.org/rec/journals/tnsm/LiXWLSCY12"}, "url":"URL#4359405" }, { "@score":"1", "@id":"4359406", "info":{"authors":{"author":[{"@pid":"142/4632","text":"Alberto Sampaio Lima"},{"@pid":"s/JacquesPhilippeSauve","text":"Jacques Philippe Sauvé"},{"@pid":"02/4334","text":"José Neuman de Souza"}]},"title":"Capturing the Quality and Business Value of IT Services Using a Business-Driven Model.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"421-432","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/LimaSS12","doi":"10.1109/TNSM.2011.081512.120272","ee":"https://doi.org/10.1109/TNSM.2011.081512.120272","url":"https://dblp.org/rec/journals/tnsm/LimaSS12"}, "url":"URL#4359406" }, { "@score":"1", "@id":"4359407", "info":{"authors":{"author":[{"@pid":"03/4718","text":"Ningfang Mi"},{"@pid":"16/2365","text":"Giuliano Casale"},{"@pid":"s/EvgeniaSmirni","text":"Evgenia Smirni"}]},"title":"ASIdE: Using Autocorrelation-Based Size Estimation for Scheduling Bursty Workloads.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"2","pages":"198-212","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/MiCS12","doi":"10.1109/TNSM.2012.041712.100073","ee":"https://doi.org/10.1109/TNSM.2012.041712.100073","url":"https://dblp.org/rec/journals/tnsm/MiCS12"}, "url":"URL#4359407" }, { "@score":"1", "@id":"4359408", "info":{"authors":{"author":[{"@pid":"16/10470","text":"Felix Musau"},{"@pid":"81/3285-1","text":"Guojun Wang 0001"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"116/6047","text":"Muhammad Bashir Abdullahi"}]},"title":"Securing Recommendations in Grouped P2P E-Commerce Trust Model.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"407-420","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/MusauWYA12","doi":"10.1109/TNSM.2012.091712.120269","ee":"https://doi.org/10.1109/TNSM.2012.091712.120269","url":"https://dblp.org/rec/journals/tnsm/MusauWYA12"}, "url":"URL#4359408" }, { "@score":"1", "@id":"4359409", "info":{"authors":{"author":[{"@pid":"22/4022","text":"Michele Nogueira"},{"@pid":"89/2597","text":"Helber Silva"},{"@pid":"85/7266","text":"Aldri Luiz dos Santos"},{"@pid":"33/592","text":"Guy Pujolle"}]},"title":"A Security Management Architecture for Supporting Routing Services on WANETs.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"2","pages":"156-168","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/NogueiraSSP12","doi":"10.1109/TNSM.2012.011812.100071","ee":"https://doi.org/10.1109/TNSM.2012.011812.100071","url":"https://dblp.org/rec/journals/tnsm/NogueiraSSP12"}, "url":"URL#4359409" }, { "@score":"1", "@id":"4359410", "info":{"authors":{"author":[{"@pid":"76/5868","text":"Ioannis Papapanagiotou"},{"@pid":"54/2063","text":"Matthias Falkner"},{"@pid":"61/3564","text":"Michael Devetsikiotis"}]},"title":"Optimal Functionality Placement for Multiplay Service Provider Architectures.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"359-372","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/PapapanagiotouFD12","doi":"10.1109/TNSM.2012.061212.110032","ee":"https://doi.org/10.1109/TNSM.2012.061212.110032","url":"https://dblp.org/rec/journals/tnsm/PapapanagiotouFD12"}, "url":"URL#4359410" }, { "@score":"1", "@id":"4359411", "info":{"authors":{"author":[{"@pid":"42/8316","text":"B. K. Pradeepa"},{"@pid":"91/6427","text":"Joy Kuri"}]},"title":"An Estimated Delay Based Association Policy for Web Browsing in a Multirate WLAN.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"346-358","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/PradeepaK12","doi":"10.1109/TNSM.2012.061212.100090","ee":"https://doi.org/10.1109/TNSM.2012.061212.100090","url":"https://dblp.org/rec/journals/tnsm/PradeepaK12"}, "url":"URL#4359411" }, { "@score":"1", "@id":"4359412", "info":{"authors":{"author":[{"@pid":"48/9995","text":"Glenn Robertson"},{"@pid":"n/SrihariNelakuditi","text":"Srihari Nelakuditi"}]},"title":"Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"293-305","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/RobertsonN12","doi":"10.1109/TNSM.2012.12.110172","ee":"https://doi.org/10.1109/TNSM.2012.12.110172","url":"https://dblp.org/rec/journals/tnsm/RobertsonN12"}, "url":"URL#4359412" }, { "@score":"1", "@id":"4359413", "info":{"authors":{"author":[{"@pid":"s/KhaledSalah","text":"Khaled Salah 0001"},{"@pid":"48/3166","text":"Khalid Elbadawi"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"}]},"title":"Performance Modeling and Analysis of Network Firewalls.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"1","pages":"12-21","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/SalahEB12","doi":"10.1109/TNSM.2011.122011.110151","ee":"https://doi.org/10.1109/TNSM.2011.122011.110151","url":"https://dblp.org/rec/journals/tnsm/SalahEB12"}, "url":"URL#4359413" }, { "@score":"1", "@id":"4359414", "info":{"authors":{"author":[{"@pid":"96/2406","text":"Taghrid Samak"},{"@pid":"a/EhabAlShaer","text":"Ehab Al-Shaer"}]},"title":"Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"459-472","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/SamakA12","doi":"10.1109/TNSM.2012.062512.120308","ee":"https://doi.org/10.1109/TNSM.2012.062512.120308","url":"https://dblp.org/rec/journals/tnsm/SamakA12"}, "url":"URL#4359414" }, { "@score":"1", "@id":"4359415", "info":{"authors":{"author":[{"@pid":"59/2521","text":"Anna Sperotto"},{"@pid":"51/5275","text":"Michel Mandjes"},{"@pid":"90/2103","text":"Ramin Sadre"},{"@pid":"b/PieterTjerkdeBoer","text":"Pieter-Tjerk de Boer"},{"@pid":"p/AikoPras","text":"Aiko Pras"}]},"title":"Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"2","pages":"128-141","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/SperottoMSBP12","doi":"10.1109/TNSM.2012.031512.110146","ee":"https://doi.org/10.1109/TNSM.2012.031512.110146","url":"https://dblp.org/rec/journals/tnsm/SperottoMSBP12"}, "url":"URL#4359415" }, { "@score":"1", "@id":"4359416", "info":{"authors":{"author":[{"@pid":"05/2204","text":"Péter Szilágyi"},{"@pid":"73/7742","text":"Szabolcs Nováczki"}]},"title":"An Automatic Detection and Diagnosis Framework for Mobile Communication Systems.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"2","pages":"184-197","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/SzilagyiN12","doi":"10.1109/TNSM.2012.031912.110155","ee":"https://doi.org/10.1109/TNSM.2012.031912.110155","url":"https://dblp.org/rec/journals/tnsm/SzilagyiN12"}, "url":"URL#4359416" }, { "@score":"1", "@id":"4359417", "info":{"authors":{"author":[{"@pid":"16/5813","text":"Yongning Tang"},{"@pid":"a/EhabAlShaer","text":"Ehab Al-Shaer"},{"@pid":"33/2232","text":"Kaustubh R. Joshi"}]},"title":"Reasoning under Uncertainty for Overlay Fault Diagnosis.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"1","pages":"34-47","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/TangAJ12","doi":"10.1109/TNSM.2011.010312.110126","ee":"https://doi.org/10.1109/TNSM.2011.010312.110126","url":"https://dblp.org/rec/journals/tnsm/TangAJ12"}, "url":"URL#4359417" }, { "@score":"1", "@id":"4359418", "info":{"authors":{"author":[{"@pid":"71/6704","text":"Fetahi Wuhib"},{"@pid":"s/RolfStadler","text":"Rolf Stadler"},{"@pid":"94/538","text":"Mike Spreitzer"}]},"title":"A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"2","pages":"213-225","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/WuhibSS12","doi":"10.1109/TNSM.2012.031512.110176","ee":"https://doi.org/10.1109/TNSM.2012.031512.110176","url":"https://dblp.org/rec/journals/tnsm/WuhibSS12"}, "url":"URL#4359418" }, { "@score":"1", "@id":"4359419", "info":{"authors":{"author":[{"@pid":"82/343","text":"Tadeusz A. Wysocki"},{"@pid":"76/4975","text":"Abbas Jamalipour"}]},"title":"An Economic Welfare Preserving Framework for Spot Pricing and Hedging of Spectrum Rights for Cognitive Radio.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"1","pages":"87-99","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/WysockiJ12","doi":"10.1109/TNSM.2011.110911.110053","ee":"https://doi.org/10.1109/TNSM.2011.110911.110053","url":"https://dblp.org/rec/journals/tnsm/WysockiJ12"}, "url":"URL#4359419" }, { "@score":"1", "@id":"4359420", "info":{"authors":{"author":[{"@pid":"17/5519","text":"Mohamed F. Younis"},{"@pid":"77/7909","text":"Osama Farrag"},{"@pid":"71/11002","text":"Bryan Althouse"}]},"title":"TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"1","pages":"100-113","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/YounisFA12","doi":"10.1109/TNSM.2011.113011.100139","ee":"https://doi.org/10.1109/TNSM.2011.113011.100139","url":"https://dblp.org/rec/journals/tnsm/YounisFA12"}, "url":"URL#4359420" }, { "@score":"1", "@id":"4359421", "info":{"authors":{"author":[{"@pid":"76/4923","text":"Yaping Zhu"},{"@pid":"118/4343","text":"Benjamin Helsley"},{"@pid":"r/JenniferRexford","text":"Jennifer Rexford"},{"@pid":"118/4389","text":"Aspi Siganporia"},{"@pid":"23/2875","text":"Sridhar Srinivasan"}]},"title":"LatLong: Diagnosing Wide-Area Latency Changes for CDNs.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"3","pages":"333-345","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/ZhuHRSS12","doi":"10.1109/TNSM.2012.070412.110180","ee":"https://doi.org/10.1109/TNSM.2012.070412.110180","url":"https://dblp.org/rec/journals/tnsm/ZhuHRSS12"}, "url":"URL#4359421" }, { "@score":"1", "@id":"4359422", "info":{"authors":{"author":[{"@pid":"00/4408-1","text":"Yihua Zhu 0001"},{"@pid":"122/8705","text":"Han-cheng Lu"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Access Point Buffer Management for Power Saving in IEEE 802.11 WLANs.","venue":"IEEE Trans. Netw. Serv. Manag.","volume":"9","number":"4","pages":"473-486","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tnsm/ZhuLL12","doi":"10.1109/TNSM.2012.062512.110188","ee":"https://doi.org/10.1109/TNSM.2012.062512.110188","url":"https://dblp.org/rec/journals/tnsm/ZhuLL12"}, "url":"URL#4359422" } ] } } } )