default search action
CNSM 2011: Paris, France
- 7th International Conference on Network and Service Management, CNSM 2011, Paris, France, October 24-28, 2011. IEEE 2011, ISBN 978-1-4577-1588-4
- Giovane Cesar Moreira Moura, Ramin Sadre, Aiko Pras:
Internet Bad Neighborhoods: The spam case. 1-8 - Jianwen Chen, Rhonda Childress, Iain Mcintosh, George Africa, Arthur Sitaramayya:
A service management architecture component model. 1-4 - Jim Zw Li, C. Murray Woodside, John W. Chinneck, Marin Litoiu:
CloudOpt: Multi-goal optimization of application deployments across a cloud. 1-9 - HyunYong Lee, Akihiro Nakao:
Peer-assisted network operator-friendly P2P traffic control technique. 1-9 - Themistoklis Bourdenas, David Wood, Petros Zerfos, Flávio Bergamaschi, Morris Sloman:
Self-adaptive routing in multi-hop sensor networks. 1-9 - Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Thomas Staub, Torsten Braun:
TARWIS - A testbed management architecture for wireless sensor network testbeds. 1-4 - Richard Combes, Zwi Altman, Eitan Altman:
Self-organizing relays in LTE networks: Queuing analysis and algorithms. 1-8 - Jakub Dolezal, Lukas Kencl:
A unifying architecture for easy development, deployment and management of voice-driven mobile applications. 1-5 - Omid Mola, Michael A. Bauer:
Collaborative policy-based autonomic management: In a hierarchical model. 1-5 - Adriano Fiorese, Paulo Simões, Fernando Boavida:
An approach to peer selection in service overlays. 1-4 - Shengzhi Zhang, Haishan Wu, Wenjie Wang, Bo Yang, Peng Liu, Athanasios V. Vasilakos:
Distributed workload and response time management for web applications. 1-9 - Patrick Maillé, Bruno Tuffin:
Adword auction bidding strategies of budget-limited advertisers on competing search engines. 1-7 - Sin-Seok Seo, Young J. Won, James Won-Ki Hong:
Witnessing Distributed Denial-of-Service traffic from an attacker's network. 1-7 - Sujun Cheng, Zhendong Cheng, Zhongzhi Luan, Depei Qian:
NEPnet: A scalable monitoring system for anomaly detection of network service. 1-5 - Lu Cheng, Qi Zhang, Raouf Boutaba:
Mitigating the negative impact of preemption on heterogeneous MapReduce workloads. 1-9 - Bradley Simmons, Hamoun Ghanbari, Marin Litoiu, Gabriel Iszlai:
Managing a SaaS application in the cloud using PaaS policy sets and a strategy-tree. 1-5 - Yuanqiang Huang, Zhongzhi Luan, Rong He, Depei Qian:
Operator placement with QoS constraints for distributed stream processing. 1-7 - Yu-Jen Hsu, Chih-Yih Wang, Zi-Wen Wang:
A remote water sensing system with optical fiber networks. 1-5 - Haesung Hwang, Shingo Ata, Masayuki Murata:
Realization of name lookup table in routers towards content-centric networks. 1-5 - Sebastian Hagen, Alfons Kemper:
A performance and usability comparison of automated planners for IT change planning. 1-9 - Shohei Kamamura, Yuki Koizumi, Takashi Miyamura, Shin'ichi Arakawa, Kohei Shiomoto, Masayuki Murata:
Control and visualization system for managed self-organization network. 1-4 - Bo Yang, Hendrik F. Hamann, Jeffrey O. Kephart, Stephan Barabasi:
Hotspot diagnosis on logical level. 1-5 - Sourav Dutta, Akshat Verma:
Service deactivation aware placement and defragmentation in enterprise clouds. 1-9 - Yuqian Song, John Keeney, Owen Conlan, Philip Perry, Adriana Hava:
An ontology-driven approach to support wireless network monitoring for home area networks. 1-7 - Dimosthenis Pediaditakis, Naranker Dulay:
Verifying home network bandwidth sharing plans. 1-9 - George Athanasiou, Kostas Tsagkaris, Panagiotis Vlacheas, Panagiotis Demestichas:
Introducing energy-awareness in Traffic Engineering for Future Networks. 1-4 - Masanori Miyazawa, Kosuke Nishimura:
Scalable root cause analysis assisted by classified alarm information model based algorithm. 1-4 - Carmen Mas Machuca, Sandro Kraus, Koen Casier:
Fault management and service provisioning process model of next generation access networks. 1-6 - Charbel El Kaed, Yves Denneulin, François-Gaël Ottogalli:
Dynamic service adaptation for plug and play device interoperability. 1-9 - Bart Van Brabant, Wouter Joosen:
Integrated management of network and security devices in IT infrastructures. 1-5 - Michael Kretzschmar, Mario Golling:
Functional components for a Security Manager within future Inter-Cloud environments. 1-5 - Ulrich Herberg, Robert G. Cole, Jiazi Yi:
Performance analysis of SNMP in OLSRv2-routed MANETs. 1-5 - Chang-Shing Perng, Rong N. Chang, Tao Tao, Edward So, Mihwa Choi, Hidayatullah Shaikh:
Universal economic analysis for IT transformation. 1-4 - Stuart Clayman, Richard G. Clegg, Lefteris Mamatas, George Pavlou, Alex Galis:
Monitoring, aggregation and filtering for efficient management of virtual networks. 1-7 - Tiago Cruz, Paulo Simões, João Rodrigues, Edmundo Monteiro, Fernando Bastos:
Outsourced management of home and SOHO Windows desktops. 1-7 - Pejman Salehi, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe:
AMF configurations: Checking for service protection using heuristics. 1-8 - Robert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman:
Policy refinement: Decomposition and operationalization for dynamic domains. 1-9 - Panagiotis Vlacheas, Evangelos D. Thomatos, Kostas Tsagkaris, Panagiotis Demestichas:
Autonomic downlink inter-cell interference coordination in LTE Self-Organizing Networks. 1-5 - Claudio Bartolini, Cesare Stefanelli, Davide Targa, Mauro Tortonesi:
A web-based what-if scenario analysis tool for performance improvement of IT support organizations. 1-5 - Martín Barrère, Remi Badonnel, Olivier Festor:
Supporting vulnerability awareness in autonomic networks and systems with OVAL. 1-8 - Velmurugan Ayyadurai, Klaus Moessner, Rahim Tafazolli:
Multihop cellular network optimization using genetic algorithms. 1-5 - Rerngvit Yanggratoke, Fetahi Wuhib, Rolf Stadler:
Gossip-based resource allocation for green computing in large clouds. 1-9 - Daphné Tuncer, Marinos Charalambides, George Pavlou, Ning Wang:
Towards decentralized and adaptive network resource management. 1-6 - Dan Gunter, Ewa Deelman, Taghrid Samak, Christopher X. Brooks, Monte Goode, Gideon Juve, Gaurang Mehta, Priscilla Moraes, Fabio Silva, D. Martin Swany, Karan Vahi:
Online workflow management and performance analysis with Stampede. 1-10 - Amir S. Kalbasi, Diwakar Krishnamurthy, Jerry Rolia, Michael Richter:
MODE: Mix Driven On-line Resource Demand Estimation. 1-9 - Eduardo M. D. Marques, Jose J. F. Sousa, Paulo Nazareno Maia Sampaio:
Modeling and simulation of DiffServ scenarios with the NSDL framework. 1-4 - Lúcia Martins, Nuno Ferreira, José M. F. Craveirinha:
A bi-criteria algorithm for multipoint-to-multipoint virtual connections in transport networks. 1-5 - José A. Lozano, Alfonso Castro, Beatriz Fuentes, Juan Manuel González, Alvaro Rodríguez:
Adaptive QoE measurement on videostreaming IP services. 1-4 - Haydn Mearns, John Leaney, Artem Parakhine, John K. Debenham, Dominique Verchère:
An autonomic open marketplace for service management and resilience. 1-5 - Anas Youssef, Diwakar Krishnamurthy:
A trace-based service level planning framework for enterprise application clouds. 1-5 - Bin Zhang, Ehab Al-Shaer:
On synthesizing distributed firewall configurations considering risk, usability and cost constraints. 1-8 - Siun-Chuon Mau, Akshay Vashist, Alexander Poylisher, Ritu Chadha, Cho-Yu Jason Chiang:
Criticality avoidance: A new paradigm for congestion control based on science of phase transition. 1-6 - Jan Groenendijk, Yangcheng Huang, Liam Fallon:
Adaptive terminal reporting for scalable service quality monitoring in large networks. 1-5 - Krunoslav Ivesic, Maja Matijasevic, Lea Skorin-Kapov:
Simulation based evaluation of dynamic resource allocation for adaptive multimedia services. 1-4 - Xiaojie Wang, Lanlan Rui, Peng Yu, Xingyu Chen:
Research on Home NodeB Gateway load balancing mechanism. 1-5 - Soumia Kessal, Noëmie Simoni:
QoS based service provisioning in NGN/NGS context. 1-5 - Carlos Alberto Kamienski, Ramide Dantas, Ernani Azevedo, Cyrus Dias, Djamel Sadok, Börje Ohlman:
Unleashing the power of policies for service-oriented computing. 1-5 - Jérôme François, Radu State, Thomas Engel, Olivier Festor:
Enforcing security with behavioral fingerprinting. 1-9 - Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
SMURFEN: A system framework for rule sharing collaborative intrusion detection. 1-6 - Giuseppe Papuzzo, Giandomenico Spezzano:
Autonomic management of workflows on hybrid Grid-Cloud infrastructure. 1-4 - Ya-Shian Wang, Chin-Ping Chuang, Kuan-Hsiung Liang, Been-Hwang Liao, Shou-Yi Cheng:
Automated service provisioning and management for integrated femtocell/Wi-Fi and cellular networks. 1-5 - Maïssa Mbaye, Hicham Khalife, Francine Krief:
Reasoning services for security and energy management in wireless sensor networks. 1-5 - K. Salah, Raed Al-Shaikh, Mohamad Sindi:
Towards green computing using diskless high performance clusters. 1-4 - Yanjie Ren, Yan Qiao, Xuesong Qiu, Shun-an Wu:
Scalable deterministic end-to-end probing and analytical method for overlay network monitoring. 1-5 - Shun-an Wu, Qiao Yan, Xuesong Qiu, Yanjie Ren:
A probe prediction approach to overlay network monitoring. 1-5 - Oriol Sallent, Jordi Pérez-Romero, Juan Sanchez-Gonzalez, Ramón Agustí, Miguel Ángel Díaz-Guerra, David Henche, Daniel Paul:
Automatic detection of sub-optimal performance in UMTS networks based on drive-test measurements. 1-4 - Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti:
Towards self-adaptive management frameworks: The case of aggregated information monitoring. 1-5 - Yoann Maurel, Philippe Lalanda, Ada Diaconescu:
Towards introspectable, adaptable and extensible autonomic managers. 1-5 - Jean Tajer, Ali Makke, Osman Salem, Ahmed Mehaoua:
A comparison between divergence measures for network anomaly detection. 1-5 - Johan Mazel, Pedro Casas, Yann Labit, Philippe Owezarski:
Sub-Space clustering, Inter-Clustering Results Association & anomaly correlation for unsupervised network anomaly detection. 1-8 - Michael Gerhards, Sascha Skorupa, Volker Sander, P. Pfeiffer, Adam Belloum:
Towards a security framework for a WS-HumanTask processor. 1-5 - Weverton Luis da Costa Cordeiro, Flavio Roberto Santos, Gustavo Huff Mauch, Marinho P. Barcellos, Luciano Paschoal Gaspary:
Securing P2P systems from Sybil attacks through adaptive identity management. 1-6 - Thomas Bourgeau:
Monitoring network topology dynamism of large-scale traceroute-based measurements. 1-5 - Hiroshi Otsuka, Hanan Lutfiyya:
Using strategy trees in change management in clouds. 1-9 - David Kidston, Li Li, Walee Al Mamun, Hanan Lutfiyya:
Cross-layer cluster-based data dissemination for failure detection in MANETs. 1-7 - Steven Davy, Joan Serrat, Antonio Astorga, Brendan Jennings, Javier Rubio-Loyola:
Policy-assisted planning and deployment of virtual networks. 1-8 - Urlan Barros, Mathieu Bouet, Aldri Luiz dos Santos, Michele Nogueira:
Assessing RoQ attacks on MANETs over aware and unaware TPC techniques. 1-5 - Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Winnie Cheng, David Loewenstern, Larisa Shwartz, Nikos Anerousis:
Performance management and quantitative modeling of IT service processes using mashup patterns. 1-9 - Suzanne McIntosh, Jeffrey O. Kephart, Jonathan Lenchner, B. Yang, Metin Feridun, Michael Nidd, Axel Tanner, I. Barabasi:
Semi-automated data center hotspot diagnosis. 1-7 - Yixin Diao, Aliza Heching:
Staffing optimization in complex service delivery systems. 1-9 - Rajarshi Das, Srinivas Yarlanki, Hendrik F. Hamann, Jeffrey O. Kephart, Vanessa López:
A unified approach to coordinated energy-management in data centers. 1-5 - Luca Deri, Ellie Chou, Zach Cherian, Kedar Karmarkar, Mike Patterson:
Increasing data center network visibility with cisco NetFlow-Lite. 1-6 - Akeo Masuda, Akinori Isogai, Takashi Miyamura, Kohei Shiomoto, Atsushi Hiramatsu:
Application-defined control of virtual networks over IP-optical networks. 1-6 - Omar El Ferkouss, Ilyas Snaiki, Omar Mounaouar, Hamza Dahmouni, Racha Ben Ali, Yves Lemieux, Omar Cherkaoui:
A 100Gig network processor platform for openflow. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.