


default search action
NOMS 2010: Osaka, Japan
- Yoshiaki Kiriha, Lisandro Zambenedetti Granville, Deep Medhi, Toshio Tonouchi, Myung-Sup Kim:
IEEE/IFIP Network Operations and Management Symposium, NOMS 2010, 19-23 April 2010, Osaka, Japan. IEEE 2010, ISBN 978-1-4244-5367-2
Wireless Networking
- Pongsakorn Teeraparpwong, Per Johansson, Harsha V. Madhyastha, Amin Vahdat:
Operator and radio resource sharing in multi-carrier environments. 1-8 - Cristian Popi, Olivier Festor:
WiMFlow: a distributed, self-adaptive architecture for flow monitoring in Wireless Mesh Networks. 9-16 - Yun Li, Yanqiu Huang, Chonggang Wang, Xiaohu You
, Ali Daneshmand:
A cross-layer cooperative method for IEEE 802.16 mesh networks. 17-23
Network Optimization
- Péter Rácz, Daniel Donni, Burkhard Stiller:
An architecture and implementation for IP Network and Service Quality Measurements. 24-31 - Fumio Machida, Masahiro Kawato, Yoshiharu Maeno:
Redundant virtual machine placement for fault-tolerant consolidated server clusters. 32-39 - Tobias Bandh, Georg Carle, Henning Sanneck, Lars-Christoph Schmelz, Raphael Romeikat, Bernhard Bauer:
Optimized network configuration parameter assignment based on graph coloring. 40-47
Service Management
- Nikos Anerousis, Yixin Diao, Aliza Heching:
Elements of system design optimization in service quality management. 48-55 - Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Automated runtime risk management for voice over IP networks and services. 57-64 - Markus Klems, Stefan Tai, Larisa Shwartz, Genady Grabarnik:
Automating the delivery of IT Service Continuity Management through cloud service orchestration. 65-72
Visualization and P2P
- Paulo Teles Barbosa, Lisandro Zambenedetti Granville
:
Interactive SNMP traffic analysis through information visualization. 73-79 - Chongnan Gao, Hongliang Yu, Guangyu Shi, Jian Chen, Weimin Zheng:
SMON: Self-Managed Overlay Networks for managing distributed applications. 80-87 - Yunzhao Li, Don Gruenbacher:
Analysis of P2P file sharing network's credit system for fairness management. 88-95
Cloud Management
- Chengwei Wang, Vanish Talwar, Karsten Schwan, Parthasarathy Ranganathan:
Online detection of utility cloud anomalies using metric distributions. 96-103 - Michael R. Head, Andrzej Kochut, Charles O. Schulz, Hidayatullah Shaikh:
Virtual Hypervisor: Enabling fair and economical resource partitioning in cloud environments. 104-111 - Jiaqi Tan, Xinghao Pan, Eugene Marinelli, Soila Kavulya, Rajeev Gandhi, Priya Narasimhan:
Kahuna: Problem diagnosis for Mapreduce-based cloud computing environments. 112-119 - Li Li, Ruixiong Tian, Bo Yang, Haiping Huang, Hao Liu, Kai Shuang:
TANSO: A componentized distributed service foundation in cloud environment. 120-127
Information Modeling
- Huimin Lu, Boqin Feng, Xi Chen:
Extended topic map: Knowledge collaborative building for distributed knowledge resource. 128-135 - Gang Xiao, Feng Han, Jian-Xin Wang:
A model of information systems operation and maintenance process complexity. 136-143 - K. Ravindran:
Information-theoretic treatment of sensor measurements in network systems. 144-151 - Mario Lischka:
Dynamic obligation specification and negotiation. 155-162
Performance and Fault Management
- B. Loew, Hao Hu, Hans-Jörg Kolbe, Michael Stier, Thomas Dietz, Marcus Brunner:
In-home and remote QoS control for home networks. 163-170 - Katarzyna Wac
, Markus Fiedler, Richard Bults, Hermie J. Hermens:
Estimations of additional delays for mobile application data from Comparative Output-Input throughput Analysis. 171-178 - Yang Hong, Changcheng Huang, James Yan:
Analysis of SIP retransmission probability using a Markov-Modulated Poisson Process model. 179-186 - Thomas Reidemeister, Mohammad Ahmad Munawar, Paul A. S. Ward:
Identifying symptoms of recurrent faults in log files of distributed information systems. 187-194
Resource Allocation & Control
- Hai Lin, Houda Labiod:
Hybrid architecture for resource reservation in IP based mobile networks. 195-200 - Kun Wang, Li Li, David Hausheer, Zhiyong Liu, Wei Li, Denian Shi, Guili He, Burkhard Stiller:
A trust-incentive-based combinatorial double auction algorithm. 209-215
IMS / SIP
- Abdelkader Lahmadi, Olivier Festor
:
VeTo: An exploit prevention language from known vulnerabilities in SIP services. 216-223 - Plarent Tirana, Deep Medhi:
Distributed approaches to S-CSCF selection in an IMS network. 224-231 - Jie Xiao, Changcheng Huang, James Yan:
IMS network deployment cost optimization based on flow-based traffic model. 232-239
IT Management-I
- Javier Rubio-Loyola, Marinos Charalambides
, Issam Aib, Joan Serrat, George Pavlou, Raouf Boutaba:
Business-driven management of differentiated services. 240-247 - Roben Castagna Lunardi
, Fabrício Girardi Andreis, Weverton Luis da Costa Cordeiro, Juliano Araujo Wickboldt
, Bruno Lopes Dalmazo
, Ricardo Luis dos Santos, Luís Armando Bianchin, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville
, Claudio Bartolini:
On strategies for planning the assignment of human resources to IT change activities. 248-255 - Claudio Bartolini, Cesare Stefanelli, Mauro Tortonesi
:
Modeling IT support organizations from transactional logs. 256-263
Traffic Flows, Sampling, and Classification
- Lothar Braun, Gerhard Münz, Georg Carle:
Packet sampling for worm and botnet detection in TCP connections. 264-271 - Kenji Yokota, Takuya Asaka, Tatsuro Takahashi:
QoS control mechanism based on flow rate to improve quality of short flows and low-rate flows. 272-277 - Cristian Morariu, Péter Rácz, Burkhard Stiller:
SCRIPT: A framework for Scalable Real-time IP Flow Record Analysis. 278-285 - Jae Yoon Chung, Byungchul Park, Young J. Won, John Strassner, James W. Hong:
An effective similarity metric for application traffic classification. 286-292
Routing
- Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista
:
Doing don'ts: Modifying BGP attributes within an autonomous system. 293-300 - Kunwadee Sripanidkulchai, Shu Tao, Zon-Yin Shae:
DA VINCI: A tool to improve VoIP call routing configurations. 301-308 - David Hock, Matthias Hartmann, Michael Menth, Christian Schwartz
:
Optimizing unique shortest paths for resilient routing and fast reroute in IP-based networks. 309-316 - Chaojiong Wang, Ning Wang, Michael P. Howarth, George Pavlou:
A dynamic Peer-to-Peer traffic limiting policy for ISP networks. 317-324
Cloud Management
- Mario Macías, Jordi Guitart
:
Using resource-level information into nonadditive negotiation models for cloud Market environments. 325-332 - Haiyang Qian, Chandra Sekhar Surapaneni, Marsh Ray, Steve Dispensa, Deep Medhi:
DReaM-Cache: Distributed Real-Time Transaction Memory Cache to support two-factor authentication services and its reliability. 333-340 - Artur Andrzejak, Derrick Kondo, David P. Anderson:
Exploiting non-dedicated resources for cloud computing. 341-348
Intrusion Detection and Fault Management
- Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
Bayesian decision aggregation in collaborative intrusion detection networks. 349-356 - Tapan Kumar Nayak, Ramani Routray, Aameek Singh, Sandeep Uttamchandani, Akshat Verma:
End-to-end disaster recovery planning: From art to science. 357-364 - Eisuke Hirota, Kazuhiko Kinoshita, Hideki Tode, Koso Murakami, Shinji Kikuchi, Satoshi Tsuchiya, Atsuji Sekiguchi, Tsuneo Katsuyama:
Multilayer failure detection method for network services based on distributed components. 365-372
Resource Management
- Jorda Polo
, David Carrera
, Yolanda Becerra
, Malgorzata Steinder, Ian Whalley:
Performance-driven task co-scheduling for MapReduce environments. 373-380 - Canturk Isci, James E. Hanson, Ian Whalley, Malgorzata Steinder, Jeffrey O. Kephart:
Runtime Demand Estimation for effective dynamic resource management. 381-388 - Kaliappa Ravindran, Mohammad Rabby, Shereef Elmetwaly:
Management intelligence for optimal resource allocations in network server systems. 389-396
IT Management-II
- Juliano Araujo Wickboldt
, Luís Armando Bianchin, Roben Castagna Lunardi
, Fabrício Girardi Andreis, Ricardo Luis dos Santos, Bruno Lopes Dalmazo
, Weverton Luis da Costa Cordeiro, Abraham Lincoln Rabelo de Sousa, Lisandro Zambenedetti Granville
, Luciano Paschoal Gaspary, Claudio Bartolini:
Computer-generated comprehensive risk assessment for IT project management. 400-407 - Maher Rahmouni, Claudio Bartolini:
Learning from past experiences to enhance decision support in IT change management. 408-415 - J. Augusto Oliveira, Jacques Philippe Sauvé, Antão Moura, Magno Queiroz, Claudio Bartolini, Marianne Hickey:
Value-driven IT service portfolio selection under uncertainty. 416-423
WLAN and Ad Hoc Networks
- Mangalathu Jibukumar, Raja Datta
, Prabir K. Biswas:
New packet aggregation schemes for multimedia applications in WLAN. 424-431 - Constantin Serban, Alexander Poylisher, Cho-Yu Jason Chiang:
Virtual ad hoc network testbeds for network-aware applications. 432-439 - Yang Yang, Xuesong Qiu, Luoming Meng, Lanlan Rui:
A self-adaptive method of task allocation in clustering-based MANETs. 440-447 - Shahnaza Tursunova, Khamidulla Inoyatov, Young-Tak Kim:
Cognitive passive estimation of available bandwidth (cPEAB) in overlapped IEEE 802.11 WiFi WLANs. 448-454
Virtualization
- Iñigo Goiri, Ferran Julià, Jordi Guitart
, Jordi Torres
:
Checkpoint-based fault-tolerant infrastructure for virtualized service providers. 455-462 - Clarissa Cassales Marquezan, Lisandro Zambenedetti Granville
, Giorgio Nunzi, Marcus Brunner:
Distributed autonomic resource management for network virtualization. 463-470 - Fida-E. Zaheer, Jin Xiao, Raouf Boutaba:
Multi-provider service negotiation and contracting in network virtualization. 471-478 - Rahul Urgaonkar, Ulas C. Kozat, Ken Igarashi, Michael J. Neely:
Dynamic resource allocation and power management in virtualized data centers. 479-486
Frameworks and Implementation
- Rafael Santos Bezerra, Carlos Raniery Paula dos Santos, Leandro Marcio Bertholdo
, Lisandro Zambenedetti Granville
, Liane Margarida Rockenbach Tarouco
:
On the feasibility of Web 2.0 technologies for network management: A mashup-based approach. 487-494 - David J. Lutz, Burkhard Stiller:
Combining identity federation with Payment: The SAML-based Payment Protocol. 495-502 - Stéphane Frénot, Noha Ibrahim, Frédéric Le Mouël, Amira Ben Hamida, Julien Ponge, Mathieu Chantrel, Denis Beras:
ROCS: a remotely provisioned OSGi framework for ambient systems. 503-510
Policy-Based Management and Future Internet
- Raphael M. Bahati, Michael A. Bauer:
Towards adaptive policy-based management. 511-518 - Jéferson Campos Nobre, Lisandro Zambenedetti Granville
:
Consistency maintenance of policy states in decentralized autonomic network management. 519-526 - Lefteris Mamatas
, Stuart Clayman, Marinos Charalambides
, Alex Galis, George Pavlou:
Towards an Information Management Overlay for emerging networks. 527-534
Radio and Hardware Management
- Hiroto Sugahara, Yuma Matsuda, Kosei Kobayashi, Yoshinori Watanabe, Yasuhiko Matsunaga, Kin Ming Chan, Kenneth Ko:
Individually targeted radio network optimization. 535-542 - James E. Hanson, Ian Whalley, Malgorzata Steinder, Jeffrey O. Kephart:
Multi-aspect hardware management in enterprise server consolidation. 543-550 - Keith A. Bare, Soila Kavulya, Priya Narasimhan:
Hardware performance counter-based problem diagnosis for e-commerce systems. 551-558
Distributed Systems
- Flavio Roberto Santos, Weverton Luis da Costa Cordeiro, Luciano Paschoal Gaspary, Marinho P. Barcellos:
Choking polluters in BitTorrent file sharing communities. 559-566 - Songyun Duan, Hui Zhang, Guofei Jiang, Xiaoqiao Meng:
Supporting System-wide Similarity Queries for networked system management. 567-574 - Steven Latré, Sven van der Meer
, Filip De Turck
, John Strassner, James Won-Ki Hong:
Ontological generation of filter rules for context exchange in autonomic multimedia networks. 575-582
Peer-to-Peer and Streaming
- HyunYong Lee, Akihiro Nakao, JongWon Kim:
Traffic control through bilateral cooperation between network operators and peers in P2P networks. 583-590 - Gajaruban Kandavanam, Dmitri Botvich, Sasitharan Balasubramaniam
:
PaCRA: A Path-aware Content Replication Approach to support QoS guaranteed video on demand service in metropolitan IPTV networks. 591-598 - Runzhi Li, Qishi Wu, Yunyue Lin, Xukang Lu, Zongmin Wang:
On topology construction in layered P2P live streaming networks. 599-606 - Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori
, Shigeaki Harada, Haruhisa Hasegawa:
Impact of topology on parallel video streaming. 607-614
Events and Datacenters
- Yuan Chen, Daniel Gmach, Chris Hyser, Zhikui Wang, Cullen E. Bash
, Christopher Hoover, Sharad Singhal:
Integrated management of application performance, power and cooling in data centers. 615-622 - Alexander Clemm, Malte Hartwig:
NETradamus: A forecasting system for system event messages. 623-630 - John Keeney, Clay Stevens
, Declan O'Sullivan
:
Extending a knowledge-based network to support temporal event reasoning. 631-638 - Sandip Agarwala, Luis Angel D. Bathen, Divyesh Jadav, Ramani Routray:
Configuration discovery and monitoring middleware for enterprise datacenters. 639-646
Data Center Operations and Management
- Sandip Agarwala, Ramani Routray:
Cluster aware storage resource provisioning in a data center. 647-660 - Kenichi Muroya, Takeshi Kinoshita, Hiroyuki Tanaka, Minori Youro:
Power reduction effect of higher room temperature operation in data centers. 661-673 - Emmanuel Nataf, Olivier Festor:
End-to-end YANG-based configuration management. 674-684 - Alexander Keller, Tyson Midboe:
Implementing a Service Desk: A practitioner's perspective. 685-696
Management Tools and Techniques
- Metin Feridun, Axel Tanner:
A search engine for systems management. 697-710 - Nicolas Aycirieix, Sue Moon:
CASFI Data Sharing Platform. 711-723 - Geraldine Abbott, Nikos Anerousis, Forrest Gordon, Allen Grussing, Sergey Makogon, Paul Manore, Fiona Humphries, Joan Sherry, Shu Tao:
Risk identification and project health prediction in IT service management. 724-733
Management of Next Generation Networks and Services
- Masanori Miyazawa, Munefumi Tsurusawa:
Fault localization mechanism using integrated resource information model in next generation network. 734-747 - Hélia Pouyllau, Richard Douville, Veronique Piperaud, Remi Theillaud:
Architecture for inter-domain service delivery. 748-762 - Thomas Frisanco:
Benchmark-based assessment of outtasking, outsourcing, and managed services for mobile network operators. 763-776 - Dan Moser, Enriique Cano, Péter Rácz:
Secure large fiille transfer over mulltiiplle network paths. 777-792
Poster Session 1
- Sanghwan Lee, Sambit Sahu:
Network distance based coordinate systems for P2P multimedia streaming. 793-796 - Hongqiang Liu, Yongqiang Xiong, CongXiao Bao, Xing Li, Guobin Shen, Dan Li:
WIND: A scalable and lightweight network topology service for peer-to-peer applications. 797-800 - Hiroshi Matsuura, Naotaka Morita, Kazumasa Takami:
Improved steiner tree algorithm applied to P2MP traffic engineering. 801-804 - Krzysztof Walkowiak
:
Dimensioning of overlay networks for P2P multicasting. 805-808 - Yong-Ju Lee, Jin-Hwan Jeong, Hag-Young Kim, Cheol-Hoon Lee:
Energy-saving set-top box enhancement in BitTorrent networks. 809-812 - Walter Fuertes
, Jorge E. López de Vergara
, Fausto Meneses, Fermín Galán Márquez:
A generic model for the management of virtual network environments. 813-816 - Cinyoung Hur, Yoonhee Kim:
On Evaluating JARS: Job history-based Adaptive grid resource selection. 817-820 - Jeroen Famaey
, Wim Van de Meerssche, Steven Latré, Stijn Melis, Tim Wauters, Filip De Turck
, Koen De Schepper
, Bart De Vleeschauwer, Rafael Huysegems:
Towards intelligent scheduling of multimedia content in future access networks. 821-824 - Aislan Gomide Foina, Javier Ramirez Fernandez, Rosa M. Badia
:
Cell BE and Bluetooth applied to Digital TV. 825-828 - Carlos Alberto Kamienski
, Ramide Dantas, Joseane Farias Fidalgo, Djamel Sadok, Börje Ohlman:
Service creation and execution with the Service Refinement Cycle. 829-832 - Daisuke Yamakawa, Noriaki Yoshiura:
Analysis of spam mail sent to Japanese mail addresses in the long term. 833-836 - Sung-Su Kim, Young J. Won, John Strassner, James Won-Ki Hong:
Manageability of the internet: Management with new functionality. 837-840 - PengCheng Xiong
, Zhikui Wang, Gueyoung Jung, Calton Pu:
Study on performance management and application behavior in virtualized environment. 841-844 - Martin Serrano, Sven van der Meer
, V. Holum, John Murphy, John Strassner:
Federation, a matter of autonomic management in the Future Internet. 845-849
Poster Session 2
- Chih-Yu Lin:
A quadtree-based location management scheme for wireless sensor networks. 850-853 - Wen-Hwa Liao, Chun-Chu Chen:
A multi-dimensional data storage algorithm in wireless sensor networks. 854-857 - Wen-Hwa Liao, Sital Prasad Kedia, Avinash Kumar Dubey:
A centralized scheduling algorithm for WiMAX mesh network. 858-861 - Bu-Sung Lee, Yu Shyang Tan
, Yuji Sekiya, Atsushi Narishige, Susumu Date
:
Availability and effectiveness of root DNS servers: A long term study. 862-865 - Wai-Leong Yeow, Cédric Westphal, Ulas C. Kozat:
A resilient architecture for automated fault tolerance in virtualized data centers. 866-869 - Rone Ilídio da Silva, Virgil Del Duca Almeida, Andre Marques Poersch, José Marcos S. Nogueira
:
Wireless sensor network for disaster management. 870-873 - George Kesidis:
Congestion control alternatives for residential broadband access. 874-877 - Jeong-ho Lee, Hyun-seop Jeong, Sung-sook Yoon, Dong-il Kim, Soon-yong Song, Byung-Deok Chung:
Design of a rule engine for analyzing messages from network elements. 878-881 - Saburo Seto, Naoki Tateishi, Manabu Nishio, Hikaru Seshake:
Detecting and recovering prefix hijacking using multi-agent inter-AS diagnostic system. 882-885 - Bernhard Lichtinger, Oliver Hanka:
Secure setup of inter-provider Ethernet services based on a novel naming schema. 886-889 - David Kidston, Li Li:
Management through cross-layer design in mobile tactical networks. 890-893 - Ping Du, Akihiro Nakao:
DDoS defense as a network service. 894-897 - Bo Yang:
Knowledge-enhanced change audit for configuration management. 898-901
Poster Session 3
- Eiji Oki, Nattapong Kitsuwan, Shunichi Tsunoda, Takashi Miyamura
, Akeo Masuda, Kohei Shiomoto
:
Scalable network emulator architecture to support IP+optical network management. 902-905 - Ramani Routray, Shripad Nadgowda:
VLS: Simulated system management test infrastructure as a service. 906-909 - Martin Nilsson
:
Measuring available path capacity using short probe trains. 910-913 - Aidan Boran, Declan O'Sullivan
, Vincent Wade:
A dependency modeling approach for the management of ontology based integration systems. 914-917 - Shan Zhu, Satoru Ohta:
Fast and accurate flow counting algorithm for the management of IP networks. 918-921 - Atsushi Terauchi, Osamu Akashi, Kensuke Fukuda:
IM-DB: Information retrieval system for interactive network-status analysis. 922-925 - Metin Feridun, Axel Tanner:
Using linked data for systems management. 926-929 - Konrad Campowsky, Thomas Magedanz, Sebastian Wahle:
Resource management in large scale experimental facilities. 930-933 - Junya Terazono, Hideyuki Fukuhara, Isamu Koseda, Ryutaroh Fujita, Toshiaki Miyazaki, Senro Saito, Takafumi Hayashi
:
Service oriented architecture realized by a messaging network. 934-937 - Raimir Holanda Filho
, José Everardo Bessa Maia:
Network traffic prediction using PCA and K-means. 938-941 - Xiang Fan, Yang Xiang
:
Modeling the propagation of Peer-to-Peer worms under quarantine. 942-945 - Henning Sanneck, Yves Bouwen, Eddy Troch:
Context based configuration management of plug & play LTE base stations. 946-949 - Jose Alonso-Rubio:
Self-optimization for handover oscillation control in LTE. 950-953

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.