default search action
CNSM 2010: Niagara Falls, Canada
- Proceedings of the 6th International Conference on Network and Service Management, CNSM 2010, Niagara Falls, Canada, October 25-29, 2010. IEEE 2010, ISBN 978-1-4244-8910-7
- Fetahi Wuhib, Rolf Stadler, Mike Spreitzer:
Gossip-based resource management for cloud environments. 1-8 - Zhenhuan Gong, Xiaohui Gu, John Wilkes:
PRESS: PRedictive Elastic ReSource Scaling for cloud systems. 9-16 - Fumio Machida, Masahiro Kawato, Yoshiharu Maeno:
Renovating legacy distributed systems using virtual appliance with dependency graph. 17-24 - Luís Armando Bianchin, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville, Luciano Paschoal Gaspary, Claudio Bartolini, Maher Rahmouni:
Similarity metric for risk assessment in IT change plans. 25-32 - Sebastian Hagen, Alfons Kemper:
Facing the unpredictable: Automated adaption of IT change plans for unpredictable management domains. 33-40 - Claudio Bartolini, Phil Day:
Where have all the tickets gone? 41-47 - Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Risk management in VoIP infrastructures using support vector machines. 48-55 - Shaonan Wang, Radu State, Mohamed Ourdane, Thomas Engel:
RiskRank: Security risk ranking for IP flow records. 56-63 - Frédéric Beck, Olivier Festor, Isabelle Chrisment, Ralph E. Droms:
Automated and secure IPv6 configuration in enterprise networks. 64-71 - Robert Craven, Jorge Lobo, Emil C. Lupu, Alessandra Russo, Morris Sloman:
Decomposition techniques for policy refinement. 72-79 - Srdjan Marinovic, Kevin P. Twidle, Naranker Dulay, Morris Sloman:
Teleo-Reactive policies for managing human-centric pervasive services. 80-87 - Marwan Cheaito, Romain Laborde, François Barrère, Abdelmalek Benzekri:
A deployment framework for self-contained policies. 88-95 - Daniel Gmach, Jerry Rolia, Cullen E. Bash, Yuan Chen, Tom Christian, Amip Shah, Ratnesh K. Sharma, Zhikui Wang:
Capacity planning and power management to exploit sustainable energy. 96-103 - Daisuke Arai, Kiyohito Yoshihara:
ECO-friendly distributed routing protocol for reducing network energy consumption. 104-111 - Yukun Li, Zhipeng Gao, Yang Yang, Zhili Guan, Xingyu Chen, Xuesong Qiu:
A cluster-based negotiation model for task allocation in Wireless Sensor Network. 112-117 - Ludmila Cherkasova, Alex Zhang, Xiaozhou Li:
DP+IP = design of efficient backup scheduling. 118-125 - Sebastian Herden, André Zwanziger, Philip Robinson:
Declarative application deployment and change management. 126-133 - Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:
Dependency-aware fault diagnosis with metric-correlation models in enterprise software systems. 134-141 - Thomas Reidemeister, Miao Jiang, Paul A. S. Ward:
An extensible framework for repair-driven monitoring. 142-149 - Angelo Sapello, Adarsh S. Sethi, Marian H. Nodine, Ritu Chadha:
Application of time series analysis to fault management in MANETs. 150-157 - Carol J. Fung, Jie Zhang, Raouf Boutaba:
Effective acquaintance management for Collaborative Intrusion Detection Networks. 158-165 - Konstantin Pussep, Sebastian Kaune, Osama Abboud, Christian Huff, Ralf Steinmetz:
On energy-awareness for peer-assisted streaming with set-top boxes. 166-173 - Sven Graupner, Daniel Gmach:
Integration of a Power/Workload Control System into IT management architecture. 174-181 - Tiago Cruz, Paulo Simões, Fernando Bastos, Edmundo Monteiro:
Integration of PXE-based desktop solutions into broadband access networks. 182-189 - Christos Tranoris, Spyros G. Denazis:
Federation Computing: A pragmatic approach for the Future Internet. 190-197 - Amelie Medem Kuatse, Renata Teixeira, Nick Feamster, Mickael Meulle:
Joint analysis of network incidents and intradomain routing changes. 198-205 - Charles Miers, Marcos A. Simplício Jr., Walter Goya, Tereza Cristina M. B. Carvalho, Victor Souza:
An architecture for P2P locality in managed networks using hierarchical trackers. 206-213 - Rodolfo W. L. Coutinho, Vitor L. Coelho, João Crisóstomo Weyl Albuquerque Costa, Glaucio H. S. Carvalho:
Optimal policy for Joint Call Admission Control in next generation wireless networks. 214-217 - Rimao Huang, Xuesong Qiu, Lin-li Ye:
Probability-based fault detection in wireless sensor networks. 218-221 - Andrew J. Mayer, Xi Jiang, Stephen McCarron, Hsin-Ping Chang:
Policy exchange information model in support of cross-domain management. 222-225 - Kevin Feeney, Rob Brennan, Simon N. Foley:
A trust model for capability delegation in federated policy systems. 226-229 - Thorsten Höllrigl, Holger Kühner, Jochen Dinger, Hannes Hartenstein:
User-Controlled Automated Identity Delegation. 230-233 - Amy Fedyk, Michael Atighetchi, Partha P. Pal:
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance. 234-237 - Josep Oriol Fitó, Mario Macías, Jordi Guitart:
Toward business-driven risk management for Cloud computing. 238-241 - Robert Koch, Gabi Dreo Rodosek:
User identification in encrypted network communications. 246-249 - Suleiman Y. Yerima, Gerard P. Parr, Cathryn Peoples, Sally I. McClean, Philip J. Morrow:
A framework for context-driven end-to-end QoS control in Converged Networks. 250-253 - Steven Latré, Wim Van de Meerssche, Stijn Melis, Dimitri Papadimitriou, Filip De Turck, Piet Demeester:
Automated management of network experiments and user behaviour emulation on large scale testbed facilities. 254-257 - Delei Weng, Michael A. Bauer:
Using policies to drive autonomic management of virtual systems. 258-261 - Scott D. Stoller:
Trust management for Web Services. 262-265 - Ya-Shian Wang, Kuan-Hsiung Liang, Hey-Chyi Young, Shou-Yi Cheng, Mei-Chun Chen, Ya-Ping Huang:
Quality-assured provisioning of IPTV services in Ethernet-based broadband networks. 266-269 - Pilar Holgado, Jorge E. López de Vergara, Víctor A. Villagrá, Ivan Sanz, Antonio Amaya:
Sharing information about security alerts using semantic web technologies. 270-273 - Shohei Kamamura, Takashi Miyamura, Kohei Shiomoto:
IP fast reroute control using centralized control plane architecture. 274-277 - Ke Liu, Xuesong Qiu, Zhipeng Gao, Xingyu Chen, Shuying Chang, Yuan Pang:
An Iterative Information-Theoretic approach to estimate traffic matrix. 278-281 - Takashi Miyamura, Shohei Kamamura, Kohei Shiomoto:
Policy-based resource management in virtual network environment. 282-285 - Chyi-Ren Dow, Pa Hsuan, Yu-Hong Lee, Yi-Tung Lee, Ching-Yin Huang:
An efficient data circulation and discovery scheme in VANETs using public transportation systems. 286-289 - Ulrich Herberg, Thomas H. Clausen, Robert G. Cole:
MANET network management and performance monitoring for NHDP and OLSRv2. 290-293 - Xiaoxing Yu, Jing Feng:
Approaches to nodes choosing protocol model for collaborative MIMO cellular networks. 294-297 - Likun Yu, Lu Cheng, Yan Qiao, Yiguo Yuan, Xingyu Chen:
An efficient active probing approach based on the combination of online and offline strategies. 298-301 - Shuying Chang, Xuesong Qiu, Zhipeng Gao, Ke Liu, Feng Qi:
A flow-based anomaly detection method using sketch and combinations of traffic features. 302-305 - Jan Schaefer, Markus Schmid, Andreas Textor, Marcus Thoss, Reinhold Kröger, Andreas Roth:
Performance-aware design and optimization of enterprise applications. 306-309 - Riyad Alshammari, Nur Zincir-Heywood:
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype. 310-313 - Ludi Akue, Emmanuel Lavinal, Michelle Sibilla:
Towards a validation framework for dynamic reconfiguration. 314-317 - Nikolaos Leontiou, Dimitrios Dechouniotis, Spyros G. Denazis:
Adaptive admission control of distributed cloud services. 318-321 - Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa:
CRAC: Confidentiality risk assessment and IT-infrastructure comparison. 322-325 - Kenji Hori, Kiyohito Yoshihara:
Pinpointing patch impact test targets using kernel tracing. 326-329 - Yoshihiko Kanaumi, Shuichi Saito, Eiji Kawai:
Toward large-scale programmable networks: Lessons learned through the operation and management of a wide-area OpenFlow-based network. 330-333 - Zhengping Wu, Yuanyao Liu:
Dynamic policy conflict analysis for collaborative web services. 338-341 - Zhengping Wu, Mu Yuan:
User-preference-based service selection using fuzzy logic. 342-345 - Anders Gunnar, Mikael Johansson:
Cautious weight tuning for link-state routing. 346-349 - Muhammad Shoaib Siddiqui, Choong Seon Hong, Young-Cheol Bang:
Virtual platform support for QoS management in IMS based multiple provider networks. 350-353 - Mario Macías, Josep Oriol Fitó, Jordi Guitart:
Rule-based SLA management for revenue maximisation in Cloud Computing Markets. 354-357 - Kensuke Fukuda:
Difficulties of identifying application type in backbone traffic. 358-361 - Lekometsa Mokhesi, Antoine B. Bagula:
Personalised handoff decision for seamless roaming in next generation of wireless networks. 362-365 - Evangelos Haleplidis, Christos Tranoris, Spyros G. Denazis, Odysseas G. Koufopavlou:
Adopting software engineering practices to network processor devices introducing the Domain Specific Modeling paradigm to the ForCES Framework. 366-369 - Lei Shi, Alan Davy, David Muldowney, Steven Davy, Edzard Höfig, Xiaoming Fu:
Intrinsic monitoring within an IPv6 network: mapping node information to network paths. 370-373 - Cormac Mullaly, Brian Lee, Dawid Czesak:
Real time distributed monitoring of services over IP. 374-377 - Miguel Lopes, António Costa, Bruno Dias:
Towards automatic and independent internet services configuration. 378-381 - Seppo Heikkinen, Santeri Siltala:
Identity-bound accounting. 382-385 - Javier Carmona-Murillo, José Luis González Sánchez, Francisco J. Rodríguez-Pérez:
Performance evaluation of an architecture for localized IP mobility management. 386-387 - Carlos Raniery Paula dos Santos, Rafael Santos Bezerra, João Marcelo Ceron, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco:
Botnet master detection using a mashup-based approach. 390-393 - Luiz F. Bittencourt, Carlos R. Senna, Edmundo R. M. Madeira:
Scheduling service workflows for cost optimization in hybrid clouds. 394-397 - Spyridon V. Gogouvitis, Kleopatra Konstanteli, George Kousiouris, Gregory Katsaros, Dimosthenis Kyriazis, Theodora A. Varvarigou:
A Service Oriented Architecture for achieving QoSaware Workflow Management in Virtualized Environments. 398-401 - David Loewenstern, Melissa J. Buco, Yixin Diao, Heiko Ludwig, Christopher Ward:
Dispatch tooling for global service delivery. 402-405 - Owen Conlan, John Keeney, Cormac Hampson, Fionán Peter Williams:
Towards non-expert users monitoring networks and services through semantically enhanced visualizations. 406-409 - Roberto Baldoni, Roberto Beraldi, Giorgia Lodi, Marco Platania, Leonardo Querzoni:
Moving core services to the edge in NGNs for reducing managed infrastructure size. 410-413 - Samir Ghamri-Doudane, Laurent Ciavaglia:
Domain-wide scheduling of OSPF graceful restarts for maintenance purposes. 414-417 - Heiko Ludwig, Kamal Bhattacharya, Rick Sheftic, Michael Nidd, Michael Moser, Andreas Kind:
Aligning infrastructure and business processes using watermarks. 418-421 - Dineshbalu Balakrishnan, Amiya Nayak:
Adaptive context monitoring in heterogeneous environments. 422-425 - Jacob Leverich, Vanish Talwar, Parthasarathy Ranganathan, Christos Kozyrakis:
Evaluating impact of manageability features on device performance. 426-430 - Abul Bashar, Gerard Parr, Sally I. McClean, Bryan W. Scotney, Detlef D. Nauck:
Machine learning based Call Admission Control approaches: A comparative study. 431-434 - Prasad Calyam, Lakshmi Kumarasamy, Füsun Özgüner:
Semantic scheduling of active measurements for meeting network monitoring objectives. 435-438 - Yun Li, Ruifeng Zhang, Chonggang Wang, Ali Daneshmand, Xiaohu You:
A distributed relay selection algorithm for cognitive radio ad-hoc networks. 439-442 - Denílson Cursino Oliveira, Raimir Holanda Filho:
An automated roll-back plan to IT change management tool. 443-446 - Kazuhiko Kinoshita, Naosuke Yokoe, Yusuke Hirota, Hideki Tode, Koso Murakami:
A network service platform providing stable QoS based on dynamic allocation of distributed components. 447-450 - Risto Vaarandi, Karlis Podins:
Network IDS alert classification with frequent itemset mining and data clustering. 451-456 - Helber Wagner da Silva, Raimir Holanda, Aldri Luiz dos Santos, Michele Nogueira Lima:
A framework for self-configuration on WMNs aware of performance and security issues. 457-462 - Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy:
Game theory driven monitoring of spatial-aggregated IP-Flow records. 463-468 - Daniel Migault, Cedric Girard, Maryline Laurent:
A performance view on DNSSEC migration. 469-474 - Ignacio Silva-Lepe, Isabelle Rouvellou, Rahul P. Akolkar, Arun Iyengar:
Cross-domain service management for enabling domain autonomy in a federated SOA. 475-480 - Adriano Fiorese, Paulo Simões, Fernando Boavida:
An aggregation scheme for the optimisation of service search in Peer-to-Peer overlays. 481-486 - Fernando Matos, Alexandre Matos, Paulo Simões, Edmundo Monteiro:
A service composition approach for inter-domain provisioning. 487-492 - Alfonso Castro, Beatriz Fuentes, José A. Lozano, Begona Costales, Víctor A. Villagrá:
Multi-domain fault management architecture based on a shared ontology-based knowledge plane. 493-498 - Letong Sun, Xia Yin, Zhiliang Wang, Yang Xiang, Jianping Wu:
A neutral layered mapping system with two-stage cache for a scalable Internet. 499-504 - Ning Wang, Binbin Dong:
Fast failure recovery for reliable multicast-based content delivery. 505-510 - Araz Jahaniaval, Dalia Fayek, Ryan Brown:
Distortion optimization in enriched video traces for End-to-End video quality enhancement. 511-516 - Hui Wang, Hyeok-soo Choi, Nazim Agoulmine, M. Jamal Deen, James Won-Ki Hong:
Information-based sensor tasking wireless body area networks in U-health systems. 517-522 - Muthoni Masinde, Antoine B. Bagula, Victor Ndegwa:
MobiGrid: A middleware for integrating mobile phone and grid computing. 523-526 - Jin Xiao, Jae Yoon Chung, Jian Li, Raouf Boutaba, James Won-Ki Hong:
Near optimal demand-side energy management under real-time demand-response pricing. 527-532
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.