Abstract is missing.
- Configuring resource managers using model fuzzing: A case study of the .NET thread poolJoseph L. Hellerstein. 1-8 [doi]
- Business-impact analysis and simulation of critical incidents in IT service managementClaudio Bartolini, Cesare Stefanelli, Mauro Tortonesi. 9-16 [doi]
- A universal method for composing business transaction models using logsJoel W. Branch, Chatschik Bisdikian, Ho Yin Starsky Wong, Dakshi Agrawal. 17-24 [doi]
- Probabilistic decentralized network managementMarcus Brunner, Dominique Dudkowski, Chiara Mingardi, Giorgio Nunzi. 25-32 [doi]
- Robust and scalable trust management for collaborative intrusion detectionCarol J. Fung, Jie Zhang, Issam Aib, Raouf Boutaba. 33-40 [doi]
- A rule-based distributed system for self-optimization of constrained devicesJavier Baliosian, Jorge Visca, Eduardo Grampín, Leonard Vidal, Martin Giachino. 41-48 [doi]
- Policy control management for Web ServicesArlindo L. Marcon Jr., Altair Olivo Santin, Luiz A. de Paula Lima Jr., Rafael R. Obelheiro, Maicon Stihler. 49-56 [doi]
- Predictive routing of contexts in an overlay networkHahnsang Kim, Kang G. Shin. 57-64 [doi]
- Planning-based configuration and management of distributed systemsKyriaki Levanti, Anand Ranganathan. 65-72 [doi]
- Service management architecture and system capacity design for PhoneFactor:::TM::: - A two-factor authentication serviceHaiyang Qian, Chandra Sekhar Surapaneni, Steve Dispensa, Deep Medhi. 73-80 [doi]
- Autonomic service hosting for large-scale distributed MOVE-servicesBruno Van Den Bossche, Filip De Turck, Bart Dhoedt, Piet Demeester. 81-88 [doi]
- A systematic and practical approach to generating policies from service level objectivesYuan Chen, Subu Iyer, Dejan S. Milojicic, Akhil Sahai. 89-96 [doi]
- CHANGEMINER: A solution for discovering IT change templates from past execution tracesWeverton Luis da Costa Cordeiro, Guilherme Sperb Machado, Fabrício Girardi Andreis, Juliano Araujo Wickboldt, Roben Castagna Lunardi, Alan Diego dos Santos, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, David Trastour, Claudio Bartolini. 97-104 [doi]
- DACS scheme as next generation Policy-based network management schemeKazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii. 105-108 [doi]
- A new approach for multi-sink environments in WSNsRicardo Silva, Jorge Sá Silva, Milan Simek, Fernando Boavida. 109-112 [doi]
- Towards an information model for ITIL and ISO/IEC 20000 processesMichael Brenner, Thomas Schaaf, Alexander Scherer. 113-116 [doi]
- Rapid Service Creation Environment for service delivery platform based on service templatesLing Jin, Ping Pan, Chun Ying, Jin Hua Liu, Qiming Tian. 117-120 [doi]
- Designing stand-by gateway for managing a waste of networked home-device powerJungmee Yun, JinWook Chung, SangHak Lee. 121-124 [doi]
- Rate-based SIP flow management for SLA satisfactionJing Sun, Ruixiong Tian, Jinfeng Hu, Bo Yang. 125-128 [doi]
- A generic end-to-end monitoring architecture for multimedia servicesAntonio Cuadra Sánchez, Francisco Garces-Garcia, Jose Antonio del Sol Rivas, Gloria Nieto-Vizcaino. 129-132 [doi]
- Secure interworking & roaming of WiMAX with 3G and Wi-FiVamsi Krishna Gondi, Nazim Agoulmine. 133-136 [doi]
- Four questions that determine whether traffic management is reasonableScott Jordan. 137-140 [doi]
- Real-time root cause analysis in OSS for a multilayer and multi-domain network using a hierarchical circuit model and scanning algorithmMasanori Miyazawa, Tomohiro Otani. 141-144 [doi]
- Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructureLi Pan, Jorge Lobo, Seraphin B. Calo. 145-148 [doi]
- Probabilistic fault diagnosis for IT services in noisy and dynamic environmentsLu Cheng, Xuesong Qiu, Luoming Meng, Yan Qiao, Zhiqing Li. 149-156 [doi]
- Session resumption for the secure shell protocolJürgen Schönwälder, Georgi Chulkov, Elchin Asgarov, Mihai Cretu. 157-163 [doi]
- PCE-based hierarchical segment restorationMohamed Abouelela, Mohamed El-Darieby. 164-171 [doi]
- SecSip: A stateful firewall for SIP-based networksAbdelkader Lahmadi, Olivier Festor. 172-179 [doi]
- Using argumentation logic for firewall configuration managementArosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo. 180-187 [doi]
- Evaluating WS-security and XACML in web services-based network managementEstêvão M. Z. Rohr, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 188-194 [doi]
- Performance management via adaptive thresholds with separate control of false positive and false negative errorsDavid Breitgand, Maayan Goldstein, Ealan Henis, Onn Shehory. 195-202 [doi]
- Optimizing correlation structure of event services considering time and capacity constraintsBin Zhang, Ehab Al-Shaer. 203-210 [doi]
- Fault detection in IP-based process control networks using data miningByungchul Park, Young J. Won, Hwanjo Yu, James Won-Ki Hong, Hong-Sun Noh, Jang Jin Lee. 211-217 [doi]
- A user-centric network management framework for high-density Wireless LANsYanfeng Zhu, Qian Ma, Chatschik Bisdikian, Chun Ying. 218-225 [doi]
- MeshMan: A management framework for wireless mesh networksVivek Aseeja, Rong Zheng. 226-233 [doi]
- A scalable PBNM framework for MANET managementWang-Cheol Song, Shafqat-ur Rehman, Hanan Lutfiyya. 234-241 [doi]
- Adaptable misbehavior detection and isolation in wireless ad hoc networks using policiesOscar F. Gonzalez Duque, Antonis M. Hadjiantonis, George Pavlou, Michael P. Howarth. 242-250 [doi]
- Monitoring of SLA compliances for Hosted Streaming ServicesHasan, Peter Racz, Burkhard Stiller. 251-258 [doi]
- Gossiping for threshold detectionFetahi Wuhib, Rolf Stadler, Mads Dam. 259-266 [doi]
- Monitoring and counter-profiling for Voice over IP networks and servicesRemi Badonnel, Olivier Festor, Khaled Hamlaoui. 267-274 [doi]
- Event handling in clean-slate Future Internet managementChiara Mingardi, Giorgio Nunzi, Dominique Dudkowski, Marcus Brunner. 275-278 [doi]
- Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructureVamsi Krishna Gondi, Nazim Agoulmine. 279-282 [doi]
- Investigating the role of a transmission initiator in private peering arrangementsRuzana Davoyan, Jörn Altmann. 283-286 [doi]
- Framework to achieve multi-domain service managementAnindo Bagchi, Francesco Caruso, Andrew Mayer, Ronald Roman, Prabha Kumar, Sitaram Kowtha. 287-290 [doi]
- Analysing Joost peer to peer IPTV protocolMehdi Nafaa, Nazim Agoulmine. 291-294 [doi]
- Problem classification method to enhance the ITIL incident and problemYang Song, Anca Sailer, Hidayatullah Shaikh. 295-298 [doi]
- How much management is management enough? Providing monitoring processes with online adaptation and learning capabilityJosiane Ortolan Coelho, Luciano Paschoal Gaspary, Liane Margarida Rockenbach Tarouco. 299-302 [doi]
- Application-specific packet capturing using kernel probesByungjoon Lee, Seong Moon, Youngseok Lee. 303-306 [doi]
- RESERVOIR: Management technologies and requirements for next generation Service Oriented InfrastructuresBenny Rochwerger, Alex Galis, Elieze Levy, Juan A. Cáceres, David Breitgand, Yaron Wolfsthal, Ignacio Martín Llorente, Mark Wusthoff, Rubén S. Montero, Erik Elmroth. 307-310 [doi]
- Collaborative content caching algorithms in mobile ad hoc networks environmentYousef Abdelmalek, Ahmed Abd El Al, Tarek N. Saadawi. 311-314 [doi]
- A policy based security management architecture for sensor networksSergio de Oliveira, Thiago Rodrigues de Oliveira, José Marcos S. Nogueira. 315-318 [doi]
- Managing responsiveness of virtual desktops using passive monitoringRajdeep Bhowmik, Andrzej Kochut, Kirk A. Beaty. 319-326 [doi]
- Shares and utilities based power consolidation in virtualized server environmentsMichael Cardosa, Madhukar R. Korupolu, Aameek Singh. 327-334 [doi]
- iMark: An identity management framework for network virtualization environmentN. M. Mosharaf Kabir Chowdhury, Fida-E. Zaheer, Raouf Boutaba. 335-342 [doi]
- Enabling high-speed and extensible real-time communications monitoringFrancesco Fusco, Felipe Huici, Luca Deri, Saverio Niccolini, Thilo Ewald. 343-350 [doi]
- Monitoring the impact of P2P users on a broadband operator s networkHans-Jörg Kolbe, Oliver Kettig, Enes Golic. 351-358 [doi]
- Controlling performance trade-offs in adaptive network monitoringAlberto Gonzalez Prieto, Rolf Stadler. 359-366 [doi]
- Computing histograms of local variables for real-time monitoring using aggregation treesDan Jurca, Rolf Stadler. 367-374 [doi]
- Heteroscedastic models to track relationships between management metricsMiao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward. 375-381 [doi]
- SIPFIX: A scheme for distributed SIP monitoringSven Anderson, Saverio Niccolini, Dieter Hogrefe. 382-389 [doi]
- Embedded system management using WBEMMichael Hutter, Alexander Szekely, Johannes Wolkerstorfer. 390-397 [doi]
- Control information description model and processing mechanism in the trustworthy and controllable networkPeng Wang, Junzhou Luo, Wei Li, Yansheng Qu. 398-405 [doi]
- Supporting communities in programmable grid networks: gTBNMihai-Lucian Cristea, Rudolf J. Strijkers, Damien Marchal, Leon Gommans, Cees de Laat, Robert J. Meijer. 406-413 [doi]
- A latency-aware algorithm for dynamic service placement in large-scale overlaysJeroen Famaey, Wouter De Cock, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester. 414-421 [doi]
- ITU-T RACF implementation for application-driven QoS control in MPLS networksBarbara Martini, Fabio Baroncelli, Valerio Martini, Karim Torkman, Piero Castoldi. 422-429 [doi]
- Management of SOA based NGN service exposure, service discovery and service compositionNiklas Blum, Thomas Magedanz, Florian Schreiner. 430-437 [doi]
- Using heuristics to improve service portfolio selection in P2P gridsAlvaro Coelho, Francisco V. Brasileiro, Paulo Ditarso Maciel Jr.. 438-444 [doi]
- A solution to support risk analysis on IT Change ManagementJuliano Araujo Wickboldt, Guilherme Sperb Machado, Weverton Luis da Costa Cordeiro, Roben Castagna Lunardi, Alan Diego dos Santos, Fabrício Girardi Andreis, Cristiano Bonato Both, Lisandro Zambenedetti Granville, Luciano Paschoal Gaspary, Claudio Bartolini, David Trastour. 445-452 [doi]
- Defensive configuration with game theorySheila Becker, Radu State, Thomas Engel. 453-459 [doi]
- Algorithms for SLA composition to provide inter-domain servicesNabil Bachir Djarallah, Hélia Pouyllau. 460-467 [doi]
- On Semantic and Compliance of SNMP MIBs in IP/MPLS routersKarim Torkman, Barbara Martini, Fabio Baroncelli, Valerio Martini, Piero Castoldi. 468-473 [doi]
- Monitoring probabilistic SLAs in Web service orchestrationsSidney Rosario, Albert Benveniste, Claude Jard. 474-481 [doi]
- Queuing model based end-to-end performance evaluation for MPLS Virtual Private NetworksYanfeng Zhu, Yibo Zhang, Chun Ying, Wei Lu. 482-488 [doi]
- Enhanced cognitive resource management for QoS-guaranteed service provisioning in home/office networkShahnaza Tursunova, Tran Trong Son, Bong-Kyun Lee, Eun-Young Cho, You-Hyeon Jeong, Young-Tak Kim. 489-496 [doi]
- End to end session based bearer control for IP multimedia subsystemsRichard Good, Neco Ventura. 497-504 [doi]
- Performance of distributed reservation control in wavelength-routed all-optical WDM networks with Adaptive Alternate RoutingIyad Katib, Deep Medhi. 505-512 [doi]
- Techniques for better alias resolution in Internet topology discoverySantiago Garcia-Jimenez, Eduardo Magaña, Daniel Morató, Mikel Izal. 513-520 [doi]
- On the feasibility of static analysis for BGP convergenceLuca Cittadini, Massimo Rimondini, Matteo Corea, Giuseppe Di Battista. 521-528 [doi]
- Architectural principles and elements of in-network managementDominique Dudkowski, Marcus Brunner, Giorgio Nunzi, Chiara Mingardi, Christopher Foley, Miguel Ponce de Leon, Catalin Meirosu, Susanne Engberg. 529-536 [doi]
- An evaluation of network management protocolsPedro Goncalves, José Luís Oliveira, Rui L. Aguiar. 537-544 [doi]
- Adaptive management of connections to meet availability guarantees in SLAsAnders Mykkeltveit, Bjarne E. Helvik. 545-552 [doi]
- A management scheme of SRLG-disjoint protection pathAlisson Barbosa de Souza, Ana Luize de B. de P. Barros, Antônio Sérgio de S. Vieira, Gustavo Augusto L. de Campos, Jéssyca Alencar L. e Silva, Joaquim Celestino Jr., Joel Uchoa, Laure W. N. Mendouga. 553-560 [doi]
- Experiences in using MUWS for scalable distributed monitoringAimilios Chourmouziadis, Oscar F. Gonzalez Duque, George Pavlou. 561-568 [doi]
- Towards an optimized model of incident ticket correlationPatricia Marcu, Genady Grabarnik, Laura Z. Luan, Daniela Rosu, Larisa Shwartz, Christopher Ward. 569-576 [doi]
- Self-management of hybrid networks: Can we trust netflow data?Tiago Fioreze, Lisandro Zambenedetti Granville, Aiko Pras, Anna Sperotto, Ramin Sadre. 577-584 [doi]
- Analyzing end-to-end network reachabilitySruthi Bandhakavi, Sandeep Bhatt, Cat Okita, Prasad Rao. 585-590 [doi]
- Applying quorum role in network managementEdemilson da Silva, Altair Olivo Santin, Edgard Jamhour, Carlos Maziero, Emir Toktar. 591-597 [doi]
- Security management with scalable distributed IP tracebackDjakhongir Siradjev, Laziz Yunusov, Young-Tak Kim. 598-605 [doi]
- Survivable keying for wireless ad hoc networksMichele Nogueira Lima, Guy Pujolle, Eduardo Silva, Aldri L. dos Santos, Luiz Carlos Pessoa Albini. 606-613 [doi]
- EJB-based implementation of L1VPN NMS controlled by each customerHiroshi Matsuura, Naotaka Morita. 614-621 [doi]
- DeskBench: Flexible virtual desktop benchmarking toolkitJunghwan Rhee, Andrzej Kochut, Kirk A. Beaty. 622-629 [doi]
- Memory overbooking and dynamic control of Xen virtual machines in consolidated environmentsJin Heo, Xiaoyun Zhu, Pradeep Padala, Zhikui Wang. 630-637 [doi]
- Refined failure remediation for IT change management systemsGuilherme Sperb Machado, Weverton Luis da Costa Cordeiro, Alan Diego dos Santos, Juliano Araujo Wickboldt, Roben Castagna Lunardi, Fabrício Girardi Andreis, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, David Trastour, Claudio Bartolini. 638-645 [doi]
- Mobile service-oriented content delivery in wireless mesh networksMohamed Elshenawy, Mohamed El-Darieby, Baher Abdulhai. 646-652 [doi]
- An efficient spectrum management mechanism for cognitive radio networksGülfem Isiklar Alptekin, Ayse Basar Bener. 653-660 [doi]
- Building end-to-end management analytics for enterprise data centersHai Huang, Yaoping Ruan, Anees Shaikh, Ramani Routray, Chung-Hao Tan, Sandeep Gopisetty. 661-675 [doi]
- SURFmap: A network monitoring tool based on the Google Maps APIRick Hofstede, Tiago Fioreze. 676-690 [doi]
- Auto-connectivity and security setup for access network elementsHenning Sanneck, Lars-Christoph Schmelz, Eddy Troch, Luc De Bie. 691-705 [doi]
- Introducing process-oriented IT service management at an academic computing center: An interim reportMichael Brenner, Heinz-Gerd Hegering, Helmut Reiser, Christian Richter, Thomas Schaaf. 706-720 [doi]
- Multi-tenant solution for IT service management: A quantitative study of benefitsLarisa Shwartz, Yixin Diao, Genady Grabarnik. 721-731 [doi]
- Best practices for deploying a CMDB in large-scale environmentsAlexander Keller, Suraj Subramanian. 732-745 [doi]
- Modeling remote desktop systems in utility environments with application to QoS managementVanish Talwar, Klara Nahrstedt, Dejan S. Milojicic. 746-760 [doi]
- A model based approach to autonomic management of virtual networksSteven Davy, Claire Fahy, Zohra Boudjemil, Leigh Griffin, John Strassner. 761-774 [doi]
- Web-based administration of grid credentials for identity and authority delegationSongjie Wei, Subrata Mazumdar. 775-789 [doi]
- Adaptive real-time monitoring for large-scale networked systemsAlberto Gonzalez Prieto, Rolf Stadler. 790-795 [doi]
- Policy-based self-management of wireless ad hoc networksAntonis M. Hadjiantonis, George Pavlou. 796-802 [doi]
- STACO - An accounting configuration architecture for multi-service mobile networksPeter Racz, Burkhard Stiller. 803-808 [doi]
- Adaptive response system for distributed denial-of-service attacksVrizlynn L. L. Thing, Morris Sloman, Naranker Dulay. 809-814 [doi]
- Performance of network and service monitoring frameworksAbdelkader Lahmadi, Laurent Andrey, Olivier Festor. 815-820 [doi]
- On harnessing information models and ontologies for policy conflict analysisSteven Davy, Brendan Jennings, John Strassner. 821-826 [doi]
- An approach to measurement based Quality of Service control for communications networksAlan Davy, Dmitri Botvich, Brendan Jennings. 827-832 [doi]