Journal: IEEE Transactions on Network and Service Management

Volume 9, Issue 4

373 -- 392Qiang Duan, Yuhong Yan, Athanasios V. Vasilakos. A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing
393 -- 406Jun Li, Sharad Singhal, Ram Swaminathan, Alan H. Karp. Managing Data Retention Policies at Scale
407 -- 420Felix Musau, Guojun Wang, Shui Yu, Muhammad Bashir Abdullahi. Securing Recommendations in Grouped P2P E-Commerce Trust Model
421 -- 432Alberto S. Lima, Jacques Philippe Sauvé, José Neuman de Souza. Capturing the Quality and Business Value of IT Services Using a Business-Driven Model
433 -- 445Tristan Groleat, Hélia Pouyllau. Distributed Learning Algorithms for Inter-NSP SLA Negotiation Management
446 -- 458Elliott Karpilovsky, Matthew Caesar, Jennifer Rexford, Aman Shaikh, Jacobus E. van der Merwe. Practical Network-Wide Compression of IP Routing Tables
459 -- 472Taghrid Samak, Ehab Al-Shaer. Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks
473 -- 486Yihua Zhu, Han-cheng Lu, Victor C. M. Leung. Access Point Buffer Management for Power Saving in IEEE 802.11 WLANs
487 -- 500Richard Combes, Zwi Altman, Eitan Altman. Self-Organizing Relays: Dimensioning, Self-Optimization, and Learning
501 -- 513Bechir Hamdaoui, MohammadJavad NoroozOliaee, Kagan Tumer, Ammar Rayes. Coordinating Secondary-User Behaviors for Inelastic Traffic Reward Maximization in Large-Scale \osa Networks

Volume 9, Issue 3

226 -- 239Yinan Li, Ing-Ray Chen. Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding
240 -- 253Iyad Katib, Deep Medhi. IP/MPLS-over-OTN-over-DWDM Multilayer Networks: An Integrated Three-Layer Capacity Optimization Model, a Heuristic, and a Study
254 -- 267Antonio Cianfrani, Vincenzo Eramo, Marco Listanti, Marco Polverini, Athanasios V. Vasilakos. An OSPF-Integrated Routing Strategy for QoS-Aware Energy Saving in IP Backbone Networks
268 -- 278Chengchen Hu, Kai Chen 0005, Yan Chen 0005, Bin Liu, Athanasios V. Vasilakos. A Measurement Study on Potential Inter-Domain Routing Diversity
279 -- 292Hamza Dahmouni, André Girard, Mohamed Ouzineb, Brunilde Sansò. The Impact of Jitter on Traffic Flow Optimization in Communication Networks
293 -- 305Glenn Robertson, Srihari Nelakuditi. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
306 -- 319Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee, Xingang Shi, Dah-Ming Chiu, Yuan Yang. A Unified Approach to Routing Protection in IP Networks
320 -- 332Carol J. Fung, Jie Zhang, Raouf Boutaba. Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks
333 -- 345Yaping Zhu, Benjamin Helsley, Jennifer Rexford, Aspi Siganporia, Sridhar Srinivasan. LatLong: Diagnosing Wide-Area Latency Changes for CDNs
346 -- 358B. K. Pradeepa, Joy Kuri. An Estimated Delay Based Association Policy for Web Browsing in a Multirate WLAN
359 -- 372Ioannis Papapanagiotou, Matthias Falkner, Michael Devetsikiotis. Optimal Functionality Placement for Multiplay Service Provider Architectures

Volume 9, Issue 2

114 -- 127Abdelkader Lahmadi, Olivier Festor. A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services
128 -- 141Anna Sperotto, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras. Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study
142 -- 155José Luis García-Dorado, Alessandro Finamore, Marco Mellia, Michela Meo, Maurizio M. Munafò. Characterization of ISP Traffic: Trends, User Habits, and Access Technology Impact
156 -- 168Michele Nogueira, Helber W. da Silva, Aldri Luiz dos Santos, Guy Pujolle. A Security Management Architecture for Supporting Routing Services on WANETs
169 -- 183Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
184 -- 197Péter Szilágyi, Szabolcs Nováczki. An Automatic Detection and Diagnosis Framework for Mobile Communication Systems
198 -- 212Ningfang Mi, Giuliano Casale, Evgenia Smirni. ASIdE: Using Autocorrelation-Based Size Estimation for Scheduling Bursty Workloads
213 -- 225Fetahi Wuhib, Rolf Stadler, Mike Spreitzer. A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments

Volume 9, Issue 1

1 -- 11JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu. Systematic Structural Testing of Firewall Policies
12 -- 21Khaled Salah, Khalid Elbadawi, Raouf Boutaba. Performance Modeling and Analysis of Network Firewalls
22 -- 33Ulrik Franke. Optimal IT Service Availability: Shorter Outages, or Fewer?
34 -- 47Yongning Tang, Ehab Al-Shaer, Kaustubh R. Joshi. Reasoning under Uncertainty for Overlay Fault Diagnosis
48 -- 59Guanyao Huang, Chia-Wei Chang, Chen-Nee Chuah, Bill Lin. Measurement-Aware Monitor Placement and Routing: A Joint Optimization Approach for Network-Wide Measurements
60 -- 72Hamada Alshaer, Jaafar M. H. Elmirghani. Multilayer Dynamic Traffic Grooming with Constrained Differentiated Resilience in IP/MPLS-over-WDM Networks
73 -- 86Sourav Kumar Dandapat, Bivas Mitra, Romit Roy Choudhury, Niloy Ganguly. Smart Association Control in Wireless Mobile Environment Using Max-Flow
87 -- 99Tadeusz A. Wysocki, Abbas Jamalipour. An Economic Welfare Preserving Framework for Spot Pricing and Hedging of Spectrum Rights for Cognitive Radio
100 -- 113Mohamed F. Younis, Osama Farrag, Bryan Althouse. TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks