


default search action
INM@SIGCOMM 2007: Kyoto, Japan
- Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management, INM '07, Kyoto, Japan, August 27-31, 2007. ACM 2007, ISBN 978-1-59593-788-9
Operations support
- Andrew Turner, Hyong S. Kim, Tina Wong:
Automatic discovery of relationships across multiple network layers. 230-235 - Randy Bush, James Hiebert, Olaf Maennel
, Matthew Roughan
, Steve Uhlig
:
Testing the reachability of (new) address space. 236-241 - Xu Chen, Z. Morley Mao, Jacobus E. van der Merwe:
Towards automated network management: network operations using dynamic views. 242-247 - Kyriaki Levanti, Hyong S. Kim, Tina Wong:
Intent-based analysis of network-wide routing policy configuration. 248-249
Applications
- Pratap Ramamurthy, Vyas Sekar, Aditya Akella, Balachander Krishnamurthy, Anees Shaikh:
Using mini-flash crowds to infer resource constraints in remote web servers. 250-255 - Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha:
Call routing management in enterprise VoIP networks. 256-261 - K. K. Ramakrishnan
, Prashant J. Shenoy
, Jacobus E. van der Merwe:
Live data center migration across WANs: a robust cooperative context aware approach. 262-267
Routing
- Junling Wang, Srihari Nelakuditi:
IP fast reroute with failure inferencing. 268-273 - Franck Le, Geoffrey G. Xie:
On guidelines for safe route redistributions. 274-279 - Amund Kvalbein, Olav Lysne:
How can multi-topology routing be used for intradomain traffic engineering? 280-284 - Yi Wang, Ioannis C. Avramopoulos, Jennifer Rexford
:
Morpheus: making routing programmable. 285-286
Measurement
- Mehdi Kharrazi, Subhabrata Sen, Oliver Spatscheck:
Towards real-time performance monitoring for encrypted traffic. 287-292 - Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi, Christos Gkantsidis:
Bottleneck discovery and overlay management in network coded peer-to-peer systems. 293-298 - Hongbo Jiang, Andrew W. Moore
, Zihui Ge, Shudong Jin, Jia Wang:
Lightweight application classification for network management. 299-304 - Prashant Garimella, Yu-Wei Eric Sung, Nan Zhang, Sanjay G. Rao:
Characterizing VLAN usage in an operational network. 305-306

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.