Journal: J. Network Syst. Manage.

Volume 13, Issue 4

357 -- 371Yogesh Bhole, Adrian Popescu. Measurement and Analysis of HTTP Traffic
373 -- 386Oussama Laouamri, Chouki Aktouf. Towards a Complete SNMP-Based Supervision of System-on-Chips
387 -- 408Saravut Charcranoon, Tarek S. El-Bawab, Jong-Dug Shin, Hakki C. Cankaya. Framework for Operation and Maintenance (OAM) in Optical Burst Switched Networks
409 -- 427Jianguo Ding, Bernd J. Krämer, Yingcai Bai, Hansheng Chen. Backward Inference in Bayesian Networks for Distributed Systems Management
429 -- 449Lars-Olof Burchard. Networks with Advance Reservations: Applications, Architecture, and Performance
451 -- 477Dimitris Alexopoulos, John Soldatos. XMLNET: An Architecture for Cost Effective Network Management Based on XML Technologies
479 -- 497Remi Badonnel, Radu State, Olivier Festor, Andre Schaff. A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks
499 -- 502Alexander Clemm, Olivier Festor, Aiko Pras. Managing New Networked Worlds - A Report on IM 2005

Volume 13, Issue 3

241 -- 245Paul Brusil, John Hale. The Shifting Sands of Security Management
247 -- 251M. E. Kabay. Improving Information Assurance Education Key to Improving Secure(ity) Management
253 -- 267Jerald Dawkins, K. Clark, G. Manes, Mauricio Papa. A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks
269 -- 291Yi Hu, Brajendra Panda. Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems
293 -- 308Ganapathi Padmavathi, Samukutty Annadurai. Improved Key Management Technique for Secure Multicasting over IP
309 -- 328Carla Merkle Westphall, Joni da Silva Fraga. Mandatory and Discretionary Policies for CORBA Security
329 -- 344Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi. NetGlean: A Methodology for Distributed Network Security Scanning
345 -- 350Prem Chand. Building A Standards Driven Security Framework for New Generation Operations Software and Systems (NGOSS) - The TeleManagement Forum (TMF) Approach
351 -- 354Alexander Clemm, Olivier Festor, Aiko Pras. Managing New Networked Worlds - A Report on IM 2005

Volume 13, Issue 2

0 -- 0Eric Klein. Moving or Merging IT Departments?
147 -- 149Alexander Keller, Marcus Brunner. Self-Managing Systems and Networks
151 -- 174Norman Bobroff, Lily B. Mummert. Design and Implementation of a Resource Manager in a Distributed Database System
175 -- 196Artur Andrzejak, Mehmet Ceyran. Characterizing and Predicting Resource Demand by Periodicity Mining
197 -- 217Spyros Voulgaris, Daniela Gavidia, Maarten van Steen. CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays
219 -- 237Mark Brodie, Sheng Ma, Leonid Rachevsky, Jon Champlin. Automated Problem Determination using Call-Stack Matching

Volume 13, Issue 1

1 -- 6Ahmed M. Al-Naamany, Hadj Bourdoucen. TCP Congestion Control Approach for Improving Network Services
7 -- 11Wayne D. Grover, David Tipper. Design and Operation of Survivable Networks
13 -- 33Rajarshi Gupta, Eric Chi, Jean C. Walrand. Different Algorithms for Normal and Protection Paths
35 -- 55Arie M. C. A. Koster, Adrian Zymolka, Monika Jager, Ralf Huelsermann. Demand-wise Shared Protection for Meshed Optical Networks
57 -- 76Eligijus Kubilinskas, Michal Pióro, Pål Nilsson. Design models for Robust Multi-Layer Next Generation Internet Core Networks Carrying Elastic Traffic
77 -- 97Florent Mobiot, Brunilde Sansò, André Girard. Design of Reliable IP/GMPLS Networks: An Integrated Approach
99 -- 118Sebastian Orlowski, Roland Wessäly. Comparing Restoration Concepts using Optimal Network Configurations with Integrated Hardware and Routing Decisions
119 -- 138Péter Hegyi, Markosz Maliosz, Ákos Ladányi, Tibor Cinkler. Virtual Private/Overlay Network Design with Traffic Concentration and Shared Protection