default search action
NOMS 2012: Maui, Hawaii, USA
- Filip De Turck, Luciano Paschoal Gaspary, Deep Medhi:
2012 IEEE Network Operations and Management Symposium, NOMS 2012, Maui, HI, USA, April 16-20, 2012. IEEE 2012, ISBN 978-1-4673-0267-8 - Khanh-Toan Tran, Nazim Agoulmine, Youssef Iraqi:
Cost-effective complex service mapping in cloud infrastructures. 1-8 - Balaji Viswanathan, Akshat Verma, Sourav Dutta:
CloudMap: Workload-aware placement in private heterogeneous clouds. 9-16 - Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Feature placement algorithms for high-variability applications in cloud environments. 17-24 - Ioannis Kitsos, Antonis Papaioannou, Nikos Tsikoudis, Kostas Magoutis:
Adapting data-intensive workloads to generic allocation policies in cloud infrastructures. 25-33 - Liang Tang, Tao Li, Florian Pinel, Larisa Shwartz, Genady Grabarnik:
Optimizing system monitoring configurations for non-actionable alerts. 34-42 - Liam Fallon, Declan O'Sullivan:
Using a semantic knowledge base for communication service quality management in Home Area Networks. 43-51 - Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Interactive learning of alert signatures in High Performance Cluster system logs. 52-60 - Yixin Diao, Aliza Heching:
Closed loop performance management for service delivery systems. 61-69 - Wonho Kim, Puneet Sharma:
Hercules: Integrated control framework for datacenter traffic management. 70-78 - Krishnamurthy Viswanathan, Choudur Lakshminarayan, Vanish Talwar, Chengwei Wang, Greg Macdonald, Wade Satterfield:
Ranking anomalies in data centers. 79-87 - Vijay Mann, Anilkumar Vishnoi, Kalapriya Kannan, Shivkumar Kalyanaraman:
CrossRoads: Seamless VM mobility across data centers through software defined networking. 88-96 - Rone Ilídio da Silva, Daniel Fernandes Macedo, José Marcos S. Nogueira:
Fault tolerance in spatial query processing for Wireless Sensor Networks. 97-104 - Huei-Wen Ferng, Dian Rachmarini:
A secure routing protocol for wireless sensor networks with consideration of energy efficiency. 105-112 - Sergio S. Furlaneto, Aldri L. dos Santos, Carmem S. Hara:
An efficient data acquisition model for urban sensor networks. 113-120 - Vasilis Sourlas, Paris Flegkas, Lazaros Gkatzikis, Leandros Tassiulas:
Autonomic cache management in Information-Centric Networks. 121-129 - Jeroen Famaey, Steven Latré, Tim Wauters, Filip De Turck:
FedRR - A Federated Resource Reservation algorithm for multimedia services. 130-137 - Ricardo Bennesby, Paulo Fonseca, Edjard de Souza Mota, Alexandre Passito:
An inter-AS routing component for software-defined networks. 138-145 - Misbah Uddin, Rolf Stadler, Alexander Clemm:
Management by network search. 146-154 - Rafael Antonello, Stenio F. L. Fernandes, Djamel Sadok, Judith Kelner, Géza Szabó:
Deterministic Finite Automaton for scalable traffic identification: The power of compressing by range. 155-162 - Weibo Chu, Xiaohong Guan, Lixin Gao, Zhongmin Cai:
Model-based real-time volume control for interactive network traffic replay. 163-170 - Claris Castillo, Asser N. Tantawi, Diana Arroyo, Malgorzata Steinder:
Cost-aware replication for dataflows. 171-178 - Andrzej Kochut, Alexei A. Karve:
Leveraging local image redundancy for efficient virtual machine provisioning. 179-187 - Chung Pan Tang, Tsz-Yeung Wong, Patrick P. C. Lee:
CloudVS: Enabling version control for virtual machines in an open-source cloud under commodity settings. 188-195 - Xiangliang Zhang, Zon-Yin Shae, Shuai Zheng, Hani Jamjoom:
Virtual machine migration in an over-committed cloud. 196-203 - Ahmed Ali-Eldin, Johan Tordsson, Erik Elmroth:
An adaptive hybrid elasticity controller for cloud infrastructures. 204-212 - Marcos Dias de Assunção, Marco Aurélio Stelmar Netto, Brian Peterson, Lakshminarayanan Renganarayana, John J. Rofrano, Chris Ward, Chris Young:
CloudAffinity: A framework for matching servers to cloudmates. 213-220 - Frédéric François, Ning Wang, Klaus Moessner, Stylianos Georgoulas:
Optimization for time-driven link sleeping reconfigurations in ISP backbone networks. 221-228 - Jinho Kim, Yasufumi Morioka, Junichiro Hagiwara:
An optimized seamless IP flow mobility management architecture for traffic offloading. 229-236 - Giuseppe Di Battista, Massimo Rimondini, Giorgio Sadolfo:
Monitoring the status of MPLS VPN and VPLS based on BGP signaling information. 237-244 - Andrei Vancea, Laurent d'Orazio, Burkhard Stiller:
Optimization of flow record handling by applying a decentralized cooperative semantic caching approach. 245-252 - Sun-il Kim, Nnamdi Nwanze, William Edmonds, Blake Johnson, Paloma Field:
On network intrusion detection for deployment in the wild. 253-260 - Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Dynamic exposure control in P2PSIP networks. 261-268 - Ramin Sadre, Anna Sperotto, Aiko Pras:
The effects of DDoS attacks on flow monitoring applications. 269-277 - Elisa Mannes, Michele Nogueira, Aldri Luiz dos Santos:
A bio-inspired scheme on quorum systems for reliable services data management in MANETs. 278-285 - Tânia L. Monteiro, Guy Pujolle, Marcelo Eduardo Pellenz, Manoel Camillo Penna, Richard Demo Souza:
An optimal channel assignment strategy for WLANs using distributed optimization. 286-292 - Rafael De Tommaso do Valle, Débora Christina Muchaluat-Saade:
MeshAdmin: An integrated platform for wireless mesh network management. 293-301 - Koen De Schepper, Bart De Vleeschauwer, Chris Hawinkel, Werner Van Leekwijck, Jeroen Famaey, Wim Van de Meerssche, Filip De Turck:
Shared Content Addressing Protocol (SCAP): Optimizing multimedia content distribution at the transport layer. 302-310 - Lothar Braun, Alexander Klein, Georg Carle, Helmut Reiser, Jochen Eisl:
Analyzing caching benefits for YouTube traffic in edge networks - A measurement-based evaluation. 311-318 - Brian Meskill, Alan Davy, Brendan Jennings:
Revenue-maximizing server selection and admission control for IPTV content servers using available bandwidth estimates. 319-326 - Adler Hoff Schmidt, Rodolfo Stoffel Antunes, Marinho P. Barcellos, Luciano Paschoal Gaspary:
Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks. 327-334 - Martín Barrère, Remi Badonnel, Olivier Festor:
Towards the assessment of distributed vulnerabilities in autonomic networks and systems. 335-342 - Giovane Cesar Moreira Moura, Ramin Sadre, Anna Sperotto, Aiko Pras:
Internet bad neighborhoods aggregation. 343-350 - Tung Tran, Issam Aib, Ehab Al-Shaer, Raouf Boutaba:
An evasive attack on SNORT flowbits. 351-358 - Bin Zhang, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao:
PCA-subspace method - Is it good enough for network-wide anomaly detection. 359-367 - Sebastian Hagen, Michael Seibold, Alfons Kemper:
Efficient verification of IT change operations or: How we could have prevented Amazon's cloud outage. 368-376 - Claudio Bartolini, Cesare Stefanelli, Mauro Tortonesi:
Modeling IT support organizations using multiple-priority queues. 377-384 - José Jair Cardoso de Santanna, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville:
A BPM-based solution for inter-domain circuit management. 385-392 - Ananya Das:
Maximizing profit using SLA-aware provisioning. 393-400 - Alberto E. Schaeffer Filho, Paul Smith, Andreas Mauthe, David Hutchison, Yue Yu, Michael Fry:
A framework for the design and evaluation of network resilience management. 401-408 - Gong Su, Arun Iyengar:
A highly available transaction processing system with non-disruptive failure handling. 409-416 - Daphné Tuncer, Marinos Charalambides, George Pavlou, N. Wang:
DACoRM: A coordinated, decentralized and adaptive network resource management scheme. 417-425 - Adel El-Atawy, Taghrid Samak:
End-to-end verification of QoS policies. 426-434 - Kevin Mets, Matthias Strobbe, Tom Verschueren, Thomas Roelens, Filip De Turck, Chris Develder:
Distributed multi-agent algorithm for residential energy management in smart grids. 435-443 - Ramona Trestian, Arghir-Nicolae Moldovan, Olga Ormond, Gabriel-Miro Muntean:
Energy consumption analysis of video streaming to Android mobile devices. 444-452 - Markus Tauber, Saleem N. Bhatti, Yi Yu:
Towards energy-awareness in managing wireless LAN applications. 453-461 - Mohsen Rajabpour, Farbod Razzazi, Hamidreza Bakhshi:
Adaptive multiuser detection in DS/CDMA systems using generalized regression neural network. 462-465 - Bassam Khorchani, Sylvain Hallé, Roger Villemaire:
Firewall anomaly detection with a model checker for visibility logic. 466-469 - Vladimir Marbukh:
Towards modeling effect of packet-level TCP dynamics on Internet operations and management. 470-473 - Sanghwan Lee, Sambit Sahu, Rajeev Puri:
Designing standard service offerings for reducing IT service management cost. 474-477 - Wen-Hwa Liao, Hung-Chun Yang:
An energy-efficient data storage scheme in wireless sensor networks. 478-481 - Kwang-Koog Lee, Jeong-dong Ryoo, Sun Me Kim, Jong Hyun Lee:
Effective load balancing in Ethernet rings. 482-485 - Ryan Farley, Xinyuan Wang:
VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits. 486-489 - Antonis Hadjiantonis, Georgios Ellinas:
Converged network and device management for data offloading. 490-493 - Benjamin Ujcich, Kuang-Ching Wang, Brian Parker, Daniel Schmiedt:
Thoughts on the Internet architecture from a modern enterprise network outage. 494-497 - Stefan Hommes, Radu State, Thomas Engel:
A distance-based method to detect anomalous attributes in log files. 498-501 - Yexi Jiang, Chang-Shing Perng, Tao Li, Rong N. Chang:
Intelligent cloud capacity management. 502-505 - Yun Li, Lili Zhao, Chonggang Wang, Ali Daneshmand, Qing Hu:
Aggregation-based spectrum allocation algorithm in cognitive radio networks. 506-509 - Jérôme François, Cynthia Wagner, Radu State, Thomas Engel:
SAFEM: Scalable analysis of flows with entropic measures and SVM. 510-513 - Hung X. Nguyen, Matthew Roughan:
Multi-observer privacy-preserving Hidden Markov Models. 514-517 - Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras:
A first look into SCADA network traffic. 518-521 - Manoj Soni, Venkateswara Reddy Madduri, Manish Gupta, Pradipta De:
Tracking configuration changes proactively in large IT environments. 522-525 - Wen-Hwa Liao, Kuo-Chiang Chang, Sital Prasad Kedia:
An object tracking scheme for wireless sensor networks using data mining mechanism. 526-529 - Kapil Singh:
xAccess: A unified user-centric access control framework for web applications. 530-533 - Lei Gao, Jiahai Yang, Hui Zhang, Donghong Qin, Bin Zhang:
What's going on in Chinese IPv6 world. 534-537 - Jae-Hoon Kim, Ju-Yeoul Park:
Estimated zone configuration for Fixed Mobile Substitution by RF fingerprint. 538-541 - Kriangkrai Limthong, Thidarat Tawsook:
Network traffic anomaly detection using machine learning approaches. 542-545 - Stephan M. Günther, Johann Schlamp, Georg Carle:
Spring-based geolocation. 546-549 - Yuqian Song, John Keeney, Owen Conlan:
A framework to leverage domain expertise to support novice users in the visual exploration of Home Area Networks. 550-553 - Wen-Hwa Liao, Chong-Hao Huang:
An efficient data storage scheme for top-k query in wireless sensor networks. 554-557 - Chang-Shing Perng, Rong N. Chang, Tao Tao, Edward So, Mihwa Choi, Hidayatullah Shaikh:
Universal economic analysis methodology for IT transformations. 558-561 - Pradipta De, Manish Gupta, Manoj Soni, Aditya Thatte:
Caching techniques for rapid provisioning of virtual servers in cloud environment. 562-565 - Tim De Pauw, Bruno Volckaert, Veerle Ongenae, Filip De Turck:
SeCoA: Autonomous semantic service composition algorithm in symbiotic networks. 566-569 - Jacques M. Bahi, Abdallah Makhoul, Maguy Medlej:
Frequency filtering approach for data aggregation in periodic sensor networks. 570-573 - Udaya Kiran Tupakula, Vijay Varadharajan:
Distributed service control technique for detecting security attacks. 574-577 - Masataka Sonoda, Yukihiro Watanabe, Yasuhide Matsumoto:
Prediction of failure occurrence time based on system log message pattern learning. 578-581 - Emanuele Maccherani, Mauro Femminella, Jae Woo Lee, Roberto Francescangeli, Jan Janak, Gianluca Reali, Henning Schulzrinne:
Extending the NetServ autonomic management capabilities using OpenFlow. 582-585 - Praveen Sharma, Jason Biddle, Aaron Daubman, Evan Fiore, Timothy Gallagher, Maximilian Merfeld, Santiago Paredes, Daniel Souza, Heather Zwahlen, Jeffrey Gottschalk, D. Marquis:
Content and host-centric information dissemination in delay-tolerant smartphone MANETs: An architecture and demonstration. 586-589 - Nan Deng, Christopher Stewart, Daniel Gmach, Martin F. Arlitt:
Policy and mechanism for carbon-aware cloud applications. 590-594 - Hamada Alshaer, Thierry Ernst, Arnaud de La Fortelle:
A QoS architecture for provisioning high quality in intelligent transportation services. 595-598 - Kimihiro Mizutani, Osamu Akashi, Atsushi Terauchi, Takeshi Kugimoto, Mitsuru Maruyama:
A dynamic flow control mechanism based on a hierarchical feedback model for data center networks. 599-602 - Alexandre Gava Menezes, Carlos Becker Westphall, Carla Merkle Westphall, Eliel Marlon de Lima Pinto:
Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network. 603-606 - Carlos N. A. Corrêa, Sidney C. de Lucena, Daniel de A. Leao Marques, Christian Esteve Rothenberg, Marcos Rogério Salvador:
An experimental evaluation of lightweight virtualization for software-defined routing platform. 607-610 - Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Thomas Staub, Torsten Braun:
TARWIS - A testbed management architecture for wireless sensor network testbeds. 611-614 - HyunYong Lee, Masahiro Yoshida, Akihiro Nakao:
On feasibility of P2P traffic control through network performance manipulation. 615-618 - Leila Bennacer, Laurent Ciavaglia, Abdelghani Chibani, Yacine Amirat, Abdelhamid Mellouk:
Optimization of fault diagnosis based on the combination of Bayesian Networks and Case-Based Reasoning. 619-622 - Puneet Sharma, Sujata Banerjee, Deniz Demir, Srikanth Natarajan, Swamy Mandavilli:
NEEM: Network energy efficiency manager. 623-626 - Russel W. Havens, Barry M. Lunt, Chia-Chi Teng:
Naïve Bayesian filters for log file analysis: Despam your logs. 627-630 - Thomas Setzer, Andreas Wolke:
Virtual machine re-assignment considering migration overhead. 631-634 - Xiao-fei Bao, Yang Yang, Xuesong Qiu:
Multi-task overlapping coalition formation mechanism in wireless sensor network. 635-638 - Martin Becke, Thomas Dreibholz, Hakim Adhari, Erwin P. Rathgeb:
A Future Internet architecture supporting multipath communication networks. 639-642 - Rafael Bosse Brinhosa, Carla Merkle Westphall, Carlos Becker Westphall:
Proposal and development of the Web services input validation model. 643-646 - Daniel Gmach, Jerry Rolia, Ludmila Cherkasova:
Comparing efficiency and costs of cloud computing models. 647-650 - David Palma, Marília Curado:
Impact analysis of hierarchical transitions in multi-hop clustered networks. 651-654 - Tingshan Huang, Nagarajan Kandasamy, Harish Sethu:
Evaluating compressive sampling strategies for performance monitoring of data centers. 655-658 - Glauco Estácio Gonçalves, Marcelo Anderson Santos, Gustavo Charamba, Patricia Takako Endo, Djamel Sadok, Judith Kelner, Bob Melander, Jan-Erik Mångs:
D-CRAS: Distributed cloud resource allocation system. 659-662 - Walee Al Mamun, Hanan Lutfiyya, David Kidston, Li Li:
Fault detection in MANETs. 663-666 - Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti:
SAAM: A self-adaptive aggregation mechanism for autonomous management systems. 667-670 - Arun Kumar, Himanshu Chauhan, D. Janaki Ram:
RegSOP: A registry for service oriented programming with behavior based discovery. 671-674 - Guang Cheng:
Estimating the number of active flows from sampled packets. 675-678 - Qishi Wu, Poonam Dharam:
Advance bandwidth scheduling with minimal impact on immediate reservations in high-performance networks. 679-682 - Vladimir Marbukh:
Systemic risks/benefits of selfish network operations & management in dynamic environment. 683-686 - Yasuhiro Sato, Hirona Shimokawa, Shingo Ata, Ikuo Oka:
Cross-community approach for efficient information retrieval in social networking. 687-690 - Hai Huang, Salman Baset, Chunqiang Tang, Ashu Gupta, K. N. Madhu Sudhan, Fazal Feroze, Rajesh Garg, Sumithra Ravichandran:
Patch management automation for enterprise cloud. 691-705 - Changhee Cho, Jin-Hong Jeon, Jong-Yul Kim, Soonman Kwon, Sungshin Kim:
Network-based synchronizing control of a practical microgrid. 706-720 - Chun-Hao Liao, Chi-Sheng Wu, Hey-Chyi Young, Kuo-Hua Chang, Hsien-Hui Huang, Chia-Ching Hsu, Kuan-Hsiung Liang:
A novel mechanism for rapid provisioning virtual machines of cloud services. 721-735 - Kumar Bhaskaran, Milton Hernandez, Jim Laredo, Laura Luan, Yaoping Ruan, Maja Vukovic, Paul Driscoll, Daniel Miller, Alan Skinner, Girish Verma, Prema Vivekanandan, Leanne Chen, Gregory Gaskill:
Privileged identity management in enterprise service-hosting environments. 736-749 - Mattias Marder, Kumar Bhaskaran, Milton Hernandez, Jim Laredo, Daniela Rosu, Yaoping Ruan, Paul Driscoll, Alan Skinner:
Integrated user activity monitoring for regulatory services. 750-763 - Saul Emanuel Delabrida, Ricardo Augusto Rabelo Oliveira, Álvaro R. Pereira Jr.:
IDEAL-TRAFFIC: A self-adaptive management framework for building monitoring applications with support to network topology changes. 764-779 - Almudena Díaz, Pedro Merino, Francisco Javier Rivas:
Test environment for QoS testing of VoIP over LTE. 780-794 - Sinem Güven, Catalin-Mihai Barbu, Dirk Husemann, Dorothea Wiesmann:
Change Risk Expert: Leveraging advanced classification and risk management techniques for systematic change failure reduction. 795-809 - Masanori Miyazawa:
Hierarchical resource model-driven performance analysis with dynamic data control. 810-822 - Jun-Ping Wang, Qi Liang Zhu, Van Ma:
A service optimization model on convergent network-based service delivery platform. 823-837 - Arne Øslebø:
Share and visualize your data using the perfSONAR NC framework. 838-852 - Lei Xu, Brendan Jennings:
Automating the generation, deployment and application of charging schemes for composed communications services. 853-859 - François Gagnon, Babak Esfandiari:
A hybrid approach to operating system discovery based on diagnosis theory. 860-865 - Federico Maggi, Stefano Zanero:
Integrated detection of anomalous behavior of computer infrastructures. 866-871 - Steven Latré, Filip De Turck:
Autonomic Quality of Experience management of multimedia networks. 872-879 - Stefan Wallin, Christer Åhlund, Johan Nordlander:
Rethinking network management: Models, data-mining and self-learning. 880-886 - Daniel Câmara, Christian Bonnet, Fethi Filali:
Topology management for mission critical networks: Applying supply and demand to manage public safety networks. 887-892 - Haibo Mi, Huaimin Wang, Gang Yin, Hua Cai, Qi Zhou, Tingtao Sun:
Performance problems diagnosis in cloud computing systems by mining request trace logs. 893-899 - Abhishek Verma, Ludmila Cherkasova, Vijay S. Kumar, Roy H. Campbell:
Deadline-based workload management for MapReduce environments: Pieces of the performance puzzle. 900-905 - Thiago A. L. Genez, Luiz F. Bittencourt, Edmundo R. M. Madeira:
Workflow scheduling for SaaS / PaaS cloud providers considering two SLA levels. 906-912 - Christian Markl, Thomas Setzer:
Dynamic prioritization of transactions using threshold-prices. 913-918 - Miguel Lopes, António Costa, Bruno Dias:
Improving network services resilience through automatic service node configuration generation. 919-925 - Edgard Jamhour, Manoel Camillo Penna:
A state-based availability model to shared mesh protection in MPLS-TP networks with preemption support. 926-932 - Paulo Fonseca, Ricardo Bennesby, Edjard de Souza Mota, Alexandre Passito:
A replication component for resilient OpenFlow-based networking. 933-939 - Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
A novel crash-tolerant data gathering in wireless sensor networks. 940-946 - Sven Graupner, Daniel Gmach:
Supervisory control as pattern for integrated IT management. 947-952 - Claudio Bartolini, Cesare Stefanelli, Davide Targa, Mauro Tortonesi:
A cloud-based solution for the performance improvement of IT support organizations. 953-960 - David Loewenstern, Florian Pinel, Larisa Shwartz, Maira Gatti, Ricardo Herrmann, Victor Cavalcante:
A learning feature engineering method for task assignment. 961-967 - Min-Chieh Yu, Jenq-Shiou Leu:
Adaptive weighted scheme for improving mobile sensor node connectivity in IEEE 802.15.4 networks. 968-973 - Vinicius C. M. Borges, Erik Dimitrov, Marília Curado, Edmundo Monteiro:
Performance assessment of cluster load balancing routing methods for triple play services in Wireless Mesh Networks. 974-980 - Akshay Vashist, Rauf Izmailov, Kyriakos Manousakis, Ritu Chadha, C. Jason Chiang, Constantin Serban, Syeed E. Ali:
Towards network invariant fault diagnosis in MANETs via statistical modeling: The global strength of local weak decisions. 981-987 - Samuel Marchal, Jérôme François, Cynthia Wagner, Radu State, Alexandre Dulaunoy, Thomas Engel, Olivier Festor:
DNSSM: A large scale passive DNS security monitoring framework. 988-993 - Mohamed Amezziane, Ehab Al-Shaer, Muhammad Qasim Ali:
On stochastic risk ordering of network services for proactive security management. 994-1000 - Cynthia Wagner, Jérôme François, Radu State, Thomas Engel, Gérard Wagener, Alexandre Dulaunoy:
SDBF: Smart DNS brute-forcer. 1001-1007 - Qi Liao, Aaron Striegel:
Intelligent network management using graph differential anomaly visualization. 1008-1014 - Sami J. Habib, Paulvanna Nayaki Marimuthu:
Management of network design through molecular assembly. 1015-1021 - Mauro Femminella, Roberto Francescangeli, Gianluca Reali, Henning Schulzrinne:
Gossip-based signaling dissemination extension for next steps in signaling. 1022-1028 - Gianni Antichi, Stefano Giordano, David J. Miller, Andrew W. Moore:
Enabling open-source high speed network monitoring on NetFPGA. 1029-1035 - Scott Jordan, Gwen Shaffer:
Should users be entitled to use and control the devices of their choice on networks? 1036-1041 - Hamada Alshaer, Thierry Ernst, Arnaud de La Fortelle:
An integrated architecture for multi-homed vehicle-to-infrastructure communications. 1042-1047 - Dimosthenis Pediaditakis, Anandha Gopalan, Naranker Dulay, Morris Sloman:
A configuration service for home networks. 1048-1053 - Ebrahim Karami, Savo Glisic:
Self-management of mobile clouds in advanced wireless networks. 1054-1060 - Arum Kwon, Jin Xiao, Sin-Seok Seo, James Won-Ki Hong, Raouf Boutaba:
The impact of network performance on perceived video quality in H.264/AVC. 1061-1067 - Vijay Mann, Anilkumar Vishnoi:
iTrack: Correlating user activity with system data. 1068-1074 - Yeongrak Choi, Jae Yoon Chung, Byungchul Park, James Won-Ki Hong:
Automated classifier generation for application-level mobile traffic identification. 1075-1081 - Marcio L. F. Miguel, Manoel Camillo Penna, Júlio C. Nievola, Marcelo Eduardo Pellenz:
New models for long-term Internet traffic forecasting using artificial neural networks and flow based information. 1082-1088 - Haydn Mearns, John Leaney, Artem Parakhine, John K. Debenham, Dominique Verchère:
CARMA: Complete autonomous responsible management agents for telecommunications and inter-cloud services. 1089-1095 - Saber Zrelli, Atsushi Ishida, Nobuo Okabe, Fumio Teraoka:
ENM: A service oriented architecture for ontology-driven network management in heterogeneous network infrastructures. 1096-1103 - Sung-Su Kim, Sin-Seok Seo, Joon-Myung Kang, James Won-Ki Hong:
Autonomic fault management based on cognitive control loops. 1104-1110 - Sylvain Hallé, Eric Lunaud Ngoupe, Gaetan Nijdam, Omar Cherkaoui, Petko Valtchev, Roger Villemaire:
ValidMaker: A tool for managing device configurations using logical constraints. 1111-1118 - Andreas Louca, Andreas Mauthe, Alberto E. Schaeffer Filho:
Efficient message-passing and autonomic management architecture for NGNs. 1119-1126 - Xiongqi Wu, James Griffioen:
Network path advising service for the future Internet. 1127-1134 - Yoshihiko Kanaumi, Shuichi Saito, Eiji Kawai, Shuji Ishii, Kazumasa Kobayashi, Shinji Shimojo:
Deployment and operation of wide-area hybrid OpenFlow networks. 1135-1142 - Fernando N. N. Farias, Joao J. Salvatti, Eduardo Cerqueira, Antônio Jorge Gomes Abelém:
A proposal management of the legacy network environment using OpenFlow control plane. 1143-1150 - Sung-Ho Yoon, Jun-Sang Park, Myung-Sup Kim:
Signature maintenance for Internet application traffic identification using header signatures. 1151-1158 - Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi:
SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation. 1159-1166 - Kwangtae Jeong, Jinwook Kim, Young-Tak Kim:
QoS-aware Network Operating System for software defined networking with Generalized OpenFlows. 1167-1174 - Tae-Ho Lee, Shahnaza Tursunova, Taesang Choi:
Graph clustering based provisioning algorithm for virtual network embedding. 1175-1178 - Muhammad Shoaib Siddiqui, Choong Seon Hong, Mi-Jung Choi:
Autonomies in policy based network management. 1179-1182 - Milton A. Soares, Edmundo R. M. Madeira:
A multi-agent architecture for autonomic management of virtual networks. 1183-1186 - Yatao Yang, Burkhard Stiller:
A non-repudiation scheme for user postings based on BAC in Mesh networks. 1187-1190 - Mohit Chamania, Edip Demirbilek, Admela Jukan, Xavier Masip-Bruin, Marcelo Yannuzzi:
Using BPEL workflow processing for cross-layer orchestrations in IP-over-optical networks: A proof of concept. 1191-1194 - Tim De Pauw, Nelson Matthys, Bruno Volckaert, Veerle Ongenae, Sam Michiels, Filip De Turck:
Design of an autonomous software platform for future symbiotic service management. 1195-1198 - Lucas Guardalben, Tomé Gomes, Paulo Salvador, Susana Sargento:
Self-organizing decentralized wireless management through social-based metrics. 1199-1202 - Matthias Strobbe, Tom Verschueren, Kevin Mets, Stijn Melis, Chris Develder, Filip De Turck, Thierry Pollet, Stijn Van de Veire:
Design and evaluation of an architecture for future smart grid service provisioning. 1203-1206 - Kaliappa Ravindran, Mohammad Rabby:
Protocol-level reconfigurations for infusion of resilience in distributed network services. 1207-1213 - Abul Bashar, Gerard Parr, Sally I. McClean, Bryan W. Scotney, Detlef D. Nauck:
Performance analysis of Bayesian Networks-based distributed Call Admission Control for NGN. 1214-1220 - Sylvain Martin, Laurent Chiarello, Guy Leduc:
DISco: A distributed information store for network challenges and their outcome. 1221-1226 - Ezra Kissel, Ahmed El-Hassany, Guilherme Fernandes, D. Martin Swany, Dan Gunter, Taghrid Samak, Jennifer M. Schopf:
Scalable integrated performance analysis of multi-gigabit networks. 1227-1233 - Brian Walshe, Rob Brennan, Declan O'Sullivan:
Correspondence pattern attribute selection for consumption of federated data sources. 1234-1240 - Jeroen Famaey, Steven Latré, Tim Wauters, Filip De Turck:
An SLA-driven framework for dynamic multimedia content delivery federations. 1241-1247 - Niels Bouten, Steven Latré, Wim Van de Meerssche, Koen De Schepper, Bart De Vleeschauwer, Werner Van Leekwijck, Filip De Turck:
An autonomic delivery framework for HTTP Adaptive Streaming in multicast-enabled multimedia access networks. 1248-1253 - Taghrid Samak, Dan Gunter, Valerie C. Hendrix:
Scalable analysis of network measurements with Hadoop and Pig. 1254-1259 - James Griffioen, Zongming Fei, Hussamuddin Nasir, Xiongqi Wu, Jeremy Reed, Charles Carpenter:
The design of an instrumentation system for federated and virtualized network testbeds. 1260-1267 - Sylvain Hallé, Omar Cherkaoui, Petko Valtchev:
Towards a semantic virtualization of configurations. 1268-1271 - David Stezenbach, Matthias Hartmann, Kurt Tutschku:
Parameters and challenges for Virtual Network embedding in the Future Internet. 1272-1278 - Charles Reiss, John Wilkes, Joseph L. Hellerstein:
Obfuscatory obscanturism: Making workload traces of commercially-sensitive systems safe to release. 1279-1286 - Arijit Khan, Xifeng Yan, Shu Tao, Nikos Anerousis:
Workload characterization and prediction in the cloud: A multiple time series approach. 1287-1294 - Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Developing and managing customizable Software as a Service using feature model conversion. 1295-1302 - Taehyun Kim, Yeongrak Choi, Seunghee Han, Jae Yoon Chung, Jonghwan Hyun, Jian Li, James Won-Ki Hong:
Monitoring and detecting abnormal behavior in mobile cloud infrastructure. 1303-1310 - Helder Pereira Borges, José Neuman de Souza, Bruno Schulze, Antonio Roberto Mury:
Automatic generation of platforms in cloud computing. 1311-1318 - Takahiro Hirofuchi, Hidemoto Nakada, Satoshi Itoh, Satoshi Sekiguchi:
Kagemusha: A guest-transparent Mobile IPv6 mechanism for wide-area live VM migration. 1319-1326 - Masum Z. Hasan, Edgar Magaña, Alexander Clemm, Lew Tucker, Sree Lakshmi D. Gudreddi:
Integrated and autonomic cloud resource scaling. 1327-1334 - Kunwadee Sripanidkulchai, Suleeporn Sujichantararat:
A business-driven framework for evaluating cloud computing. 1335-1342 - Genady Grabarnik, Yefim Haim Michlin, Larisa Shwartz:
Designing pilot for operational innovation in IT service delivery. 1343-1351 - Parijat Dube, Genady Grabarnik, Larisa Shwartz:
SUITS: How to make a global IT service provider sustainable? 1352-1359 - Shuchih Ernest Chang, Yu-Teng Jacky Jang, Chu-Ken Robert Chiu:
E-tourism: Understanding users' intention to adopt Podcasting in tourism. 1360-1363 - Christian Richter, Thomas Schaaf:
An approach to consolidate and optimize monitoring solutions. 1364-1367 - Chunming Gao, Guy C. Hembroff:
Implications of modified waterfall model to the roles and education of health IT professionals. 1368-1369 - Rafael de Paula Herrera, Alan Salvany Felinto:
A distributed, multi-staged, high-throughput middleware for relational databases. 1370-1373 - Haochen Li, Zhiqiang Zhan:
Bussiness-driven automatic IT change management based on machine learning. 1374-1377 - Can Bozdogan, Nur Zincir-Heywood:
Data mining for supporting IT management. 1378-1385 - Quan Guo, Zhiqiang Zhan, Teng Wang, Xiaodong Zhao:
Risk assessment and optimal proactive measure selection for IT service continuity management. 1386-1391 - Claudio Bartolini, Cesare Stefanelli, Mauro Tortonesi:
Potential benefits and challenges of closed-loop optimization processes for IT support organizations. 1392-1398 - Stamatios V. Kartalopoulos:
Seamless integration of wireless access, free space optical, and fiber-based backbone networks. 1399-1402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.