![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 85 matches
- 2011
- Bin Zhang, Ehab Al-Shaer:
On synthesizing distributed firewall configurations considering risk, usability and cost constraints. CNSM 2011: 1-8 - George Athanasiou, Kostas Tsagkaris, Panagiotis Vlacheas, Panagiotis Demestichas:
Introducing energy-awareness in Traffic Engineering for Future Networks. CNSM 2011: 1-4 - Velmurugan Ayyadurai, Klaus Moessner, Rahim Tafazolli:
Multihop cellular network optimization using genetic algorithms. CNSM 2011: 1-5 - Martín Barrère, Remi Badonnel, Olivier Festor:
Supporting vulnerability awareness in autonomic networks and systems with OVAL. CNSM 2011: 1-8 - Urlan Barros, Mathieu Bouet, Aldri Luiz dos Santos, Michele Nogueira:
Assessing RoQ attacks on MANETs over aware and unaware TPC techniques. CNSM 2011: 1-5 - Claudio Bartolini, Cesare Stefanelli, Davide Targa, Mauro Tortonesi:
A web-based what-if scenario analysis tool for performance improvement of IT support organizations. CNSM 2011: 1-5 - Themistoklis Bourdenas, David Wood, Petros Zerfos, Flávio Bergamaschi, Morris Sloman:
Self-adaptive routing in multi-hop sensor networks. CNSM 2011: 1-9 - Thomas Bourgeau:
Monitoring network topology dynamism of large-scale traceroute-based measurements. CNSM 2011: 1-5 - Bart Van Brabant, Wouter Joosen:
Integrated management of network and security devices in IT infrastructures. CNSM 2011: 1-5 - Jianwen Chen, Rhonda Childress, Iain Mcintosh, George Africa, Arthur Sitaramayya:
A service management architecture component model. CNSM 2011: 1-4 - Sujun Cheng, Zhendong Cheng, Zhongzhi Luan, Depei Qian:
NEPnet: A scalable monitoring system for anomaly detection of network service. CNSM 2011: 1-5 - Lu Cheng, Qi Zhang, Raouf Boutaba:
Mitigating the negative impact of preemption on heterogeneous MapReduce workloads. CNSM 2011: 1-9 - Stuart Clayman, Richard G. Clegg, Lefteris Mamatas, George Pavlou, Alex Galis:
Monitoring, aggregation and filtering for efficient management of virtual networks. CNSM 2011: 1-7 - Richard Combes, Zwi Altman, Eitan Altman:
Self-organizing relays in LTE networks: Queuing analysis and algorithms. CNSM 2011: 1-8 - Weverton Luis da Costa Cordeiro, Flavio Roberto Santos, Gustavo Huff Mauch, Marinho P. Barcellos, Luciano Paschoal Gaspary:
Securing P2P systems from Sybil attacks through adaptive identity management. CNSM 2011: 1-6 - Robert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman:
Policy refinement: Decomposition and operationalization for dynamic domains. CNSM 2011: 1-9 - Tiago Cruz, Paulo Simões, João Rodrigues, Edmundo Monteiro, Fernando Bastos:
Outsourced management of home and SOHO Windows desktops. CNSM 2011: 1-7 - Rajarshi Das, Srinivas Yarlanki, Hendrik F. Hamann, Jeffrey O. Kephart, Vanessa López:
A unified approach to coordinated energy-management in data centers. CNSM 2011: 1-5 - Steven Davy, Joan Serrat, Antonio Astorga, Brendan Jennings, Javier Rubio-Loyola:
Policy-assisted planning and deployment of virtual networks. CNSM 2011: 1-8 - Luca Deri, Ellie Chou, Zach Cherian, Kedar Karmarkar, Mike Patterson:
Increasing data center network visibility with cisco NetFlow-Lite. CNSM 2011: 1-6 - Yixin Diao, Aliza Heching:
Staffing optimization in complex service delivery systems. CNSM 2011: 1-9 - Jakub Dolezal, Lukas Kencl:
A unifying architecture for easy development, deployment and management of voice-driven mobile applications. CNSM 2011: 1-5 - Sourav Dutta, Akshat Verma:
Service deactivation aware placement and defragmentation in enterprise clouds. CNSM 2011: 1-9 - Omar El Ferkouss, Ilyas Snaiki, Omar Mounaouar, Hamza Dahmouni, Racha Ben Ali, Yves Lemieux, Omar Cherkaoui:
A 100Gig network processor platform for openflow. CNSM 2011: 1-4 - Adriano Fiorese, Paulo Simões, Fernando Boavida:
An approach to peer selection in service overlays. CNSM 2011: 1-4 - Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Enforcing security with behavioral fingerprinting. CNSM 2011: 1-9 - Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
SMURFEN: A system framework for rule sharing collaborative intrusion detection. CNSM 2011: 1-6 - Michael Gerhards, Sascha Skorupa, Volker Sander, P. Pfeiffer, Adam Belloum:
Towards a security framework for a WS-HumanTask processor. CNSM 2011: 1-5 - Jan Groenendijk, Yangcheng Huang, Liam Fallon:
Adaptive terminal reporting for scalable service quality monitoring in large networks. CNSM 2011: 1-5 - Dan Gunter, Ewa Deelman, Taghrid Samak, Christopher X. Brooks, Monte Goode, Gideon Juve, Gaurang Mehta, Priscilla Moraes, Fabio Silva, D. Martin Swany, Karan Vahi:
Online workflow management and performance analysis with Stampede. CNSM 2011: 1-10
skipping 55 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-17 17:19 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint