default search action
IEEE Transactions on Network and Service Management, Volume 5
Volume 5, Number 1, March 2008
- Manoj K. Agarwal, Gautam Kar, Ruchi Mahindru, Anindya Neogi, Anca Sailer:
Performance problem prediction in transaction-based e-business systems. 1-10 - Fabio Ricciato, Eduard Hasenleithner, Peter Romirer-Maierhofer:
Traffic analysis at short time-scales: an empirical case study from a 3G cellular network. 11-21 - Jing Fu, Peter Sjödin, Gunnar Karlsson:
Loop-free updates of forwarding tables. 22-35 - Yongning Tang, Ehab Al-Shaer, Raouf Boutaba:
Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks. 36-49 - Ariffin Datuk Yahaya, Tobias Harks, Tatsuya Suda:
iREX: efficient automation architecture for the deployment of inter-domain QoS policy. 50-64
Volume 5, Number 2, June 2008
- Nancy Samaan, Ahmed Karmouch:
Network anomaly diagnosis via statistical analysis and evidential reasoning. 65-77 - Shivani Deshpande, Marina Thottan, Biplab Sikdar:
An online scheme for the isolation of BGP misconfiguration errors. 78-90 - Eray Gençay, Carsten Sinz, Wolfgang Küchlin, Thorsten Schäfer:
SANchk: SQL-based SAN configuration checking. 91-104 - Mohamed Battisha, Adel Elmaghraby, Hanafy Meleis, Satya Samineni:
Adaptive tracking of network behavioral signals for real time forensic analysis of service quality degradation. 105-117 - Akshat Verma, Upendra Sharma, Rohit Jain, Koustuv Dasgupta:
Compass: optimizing the migration cost vs. application performance tradeoff. 118-131
Volume 5, Number 3, September 2008
- Selvamuthu Dharmaraja, Vaneeta Jindal, Upkar Varshney:
Reliability and Survivability Analysis for UMTS Networks: An Analytical Approach. 132-142 - Antonio Capone, Jocelyne Elias, Fabio Martignon:
Models and Algorithms for the Design of Service Overlay Networks. 143-156 - Xue Liu, Jin Heo, Lui Sha, Xiaoyun Zhu:
Queueing-Model-Based Adaptive Control of Multi-Tiered Web Applications. 157-167 - Tapan Kumar Nayak, Anindya Neogi, Ravi Kothari:
Visualization and Analysis of System Monitoring Data using Multi-resolution Context Information. 168-177 - Jacques Philippe Sauvé, Rodrigo Santos, Rodrigo Rebouças, Antão Moura, Claudio Bartolini:
Change Priority Determination in IT Service Management Based on Risk Exposure. 178-187
Volume 5, Number 4, December 2008
- Vincenzo Eramo, Marco Listanti, Antonio Cianfrani:
Design and evaluation of a new multi-path incremental routing algorithm on software routers. 188-203 - Emanuel P. Freire, Artur Ziviani, Ronaldo M. Salles:
Detecting VoIP calls hidden in web traffic. 204-214 - Grigorios Zachariadis, Javier A. Barria:
Dynamic pricing and resource allocation using revenue management for multiservice networks. 215-226 - Ghassan Misherghi, Lihua Yuan, Zhendong Su, Chen-Nee Chuah, Hao Chen:
A general framework for benchmarking firewall optimization techniques. 227-238 - Péter Rácz, Burkhard Stiller:
IP flow accounting application for diameter. 239-246
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.