default search action
IEEE Transactions on Network and Service Management, Volume 9
Volume 9, Number 1, March 2012
- JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu:
Systematic Structural Testing of Firewall Policies. 1-11 - Khaled Salah, Khalid Elbadawi, Raouf Boutaba:
Performance Modeling and Analysis of Network Firewalls. 12-21 - Ulrik Franke:
Optimal IT Service Availability: Shorter Outages, or Fewer? 22-33 - Yongning Tang, Ehab Al-Shaer, Kaustubh R. Joshi:
Reasoning under Uncertainty for Overlay Fault Diagnosis. 34-47 - Guanyao Huang, Chia-Wei Chang, Chen-Nee Chuah, Bill Lin:
Measurement-Aware Monitor Placement and Routing: A Joint Optimization Approach for Network-Wide Measurements. 48-59 - Hamada Alshaer, Jaafar M. H. Elmirghani:
Multilayer Dynamic Traffic Grooming with Constrained Differentiated Resilience in IP/MPLS-over-WDM Networks. 60-72 - Sourav Kumar Dandapat, Bivas Mitra, Romit Roy Choudhury, Niloy Ganguly:
Smart Association Control in Wireless Mobile Environment Using Max-Flow. 73-86 - Tadeusz A. Wysocki, Abbas Jamalipour:
An Economic Welfare Preserving Framework for Spot Pricing and Hedging of Spectrum Rights for Cognitive Radio. 87-99 - Mohamed F. Younis, Osama Farrag, Bryan Althouse:
TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks. 100-113
Volume 9, Number 2, June 2012
- Abdelkader Lahmadi, Olivier Festor:
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services. 114-127 - Anna Sperotto, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras:
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study. 128-141 - José Luis García-Dorado, Alessandro Finamore, Marco Mellia, Michela Meo, Maurizio M. Munafò:
Characterization of ISP Traffic: Trends, User Habits, and Access Technology Impact. 142-155 - Michele Nogueira, Helber Silva, Aldri Luiz dos Santos, Guy Pujolle:
A Security Management Architecture for Supporting Routing Services on WANETs. 156-168 - Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection. 169-183 - Péter Szilágyi, Szabolcs Nováczki:
An Automatic Detection and Diagnosis Framework for Mobile Communication Systems. 184-197 - Ningfang Mi, Giuliano Casale, Evgenia Smirni:
ASIdE: Using Autocorrelation-Based Size Estimation for Scheduling Bursty Workloads. 198-212 - Fetahi Wuhib, Rolf Stadler, Mike Spreitzer:
A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments. 213-225
Volume 9, Number 3, September 2012
- Yinan Li, Ing-Ray Chen:
Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding. 226-239 - Iyad A. Katib, Deep Medhi:
IP/MPLS-over-OTN-over-DWDM Multilayer Networks: An Integrated Three-Layer Capacity Optimization Model, a Heuristic, and a Study. 240-253 - Antonio Cianfrani, Vincenzo Eramo, Marco Listanti, Marco Polverini, Athanasios V. Vasilakos:
An OSPF-Integrated Routing Strategy for QoS-Aware Energy Saving in IP Backbone Networks. 254-267 - Chengchen Hu, Kai Chen, Yan Chen, Bin Liu, Athanasios V. Vasilakos:
A Measurement Study on Potential Inter-Domain Routing Diversity. 268-278 - Hamza Dahmouni, André Girard, Mohamed Ouzineb, Brunilde Sansò:
The Impact of Jitter on Traffic Flow Optimization in Communication Networks. 279-292 - Glenn Robertson, Srihari Nelakuditi:
Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing. 293-305 - Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee, Xingang Shi, Dah Ming Chiu, Yuan Yang:
A Unified Approach to Routing Protection in IP Networks. 306-319 - Carol J. Fung, Jie Zhang, Raouf Boutaba:
Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks. 320-332 - Yaping Zhu, Benjamin Helsley, Jennifer Rexford, Aspi Siganporia, Sridhar Srinivasan:
LatLong: Diagnosing Wide-Area Latency Changes for CDNs. 333-345 - B. K. Pradeepa, Joy Kuri:
An Estimated Delay Based Association Policy for Web Browsing in a Multirate WLAN. 346-358 - Ioannis Papapanagiotou, Matthias Falkner, Michael Devetsikiotis:
Optimal Functionality Placement for Multiplay Service Provider Architectures. 359-372
Volume 9, Number 4, December 2012
- Qiang Duan, Yuhong Yan, Athanasios V. Vasilakos:
A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing. 373-392 - Jun Li, Sharad Singhal, Ram Swaminathan, Alan H. Karp:
Managing Data Retention Policies at Scale. 393-406 - Felix Musau, Guojun Wang, Shui Yu, Muhammad Bashir Abdullahi:
Securing Recommendations in Grouped P2P E-Commerce Trust Model. 407-420 - Alberto Sampaio Lima, Jacques Philippe Sauvé, José Neuman de Souza:
Capturing the Quality and Business Value of IT Services Using a Business-Driven Model. 421-432 - Tristan Groleat, Hélia Pouyllau:
Distributed Learning Algorithms for Inter-NSP SLA Negotiation Management. 433-445 - Elliott Karpilovsky, Matthew Caesar, Jennifer Rexford, Aman Shaikh, Jacobus E. van der Merwe:
Practical Network-Wide Compression of IP Routing Tables. 446-458 - Taghrid Samak, Ehab Al-Shaer:
Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks. 459-472 - Yihua Zhu, Han-cheng Lu, Victor C. M. Leung:
Access Point Buffer Management for Power Saving in IEEE 802.11 WLANs. 473-486 - Richard Combes, Zwi Altman, Eitan Altman:
Self-Organizing Relays: Dimensioning, Self-Optimization, and Learning. 487-500 - Bechir Hamdaoui, MohammadJavad NoroozOliaee, Kagan Tumer, Ammar Rayes:
Coordinating Secondary-User Behaviors for Inelastic Traffic Reward Maximization in Large-Scale \osa Networks. 501-513
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.