Abstract is missing.
- Secure User-Controlled Lightpath Provisioning with User-Controlled Identity ManagementBob Hulsebosch, Robert de Groote, Martin Snijders. 1-14 [doi]
- A Statistical Analysis of Network Parameters for the Self-management of Lambda-ConnectionsTiago Fioreze, Lisandro Zambenedetti Granville, Ramin Sadre, Aiko Pras. 15-27 [doi]
- Dynamics of Resource Closure OperatorsAlva L. Couch, Marc Chiarini. 28-41 [doi]
- Churn Tolerance Improvement Techniques in an Algorithm-Neutral DHTKazuyuki Shudo. 42-55 [doi]
- PeerVote: A Decentralized Voting Mechanism for P2P Collaboration SystemsThomas Bocek, Dalibor Peric, Fabio Victora Hecht, David Hausheer, Burkhard Stiller. 56-69 [doi]
- Evaluation of Sybil Attacks Protection Schemes in KADThibault Cholez, Isabelle Chrisment, Olivier Festor. 70-82 [doi]
- NETCONF Interoperability TestingHa Manh Tran, Iyad Tumar, Jürgen Schönwälder. 83-94 [doi]
- Knowledge Management and PromisesMark Burgess. 95-107 [doi]
- A Policy-Driven Network Management System for the Dynamic Configuration of Military NetworksWei Koong Chai, Kin-Hon Ho, Marinos Charalambides, George Pavlou. 108-121 [doi]
- A Strategy for Multi-Agent Based Wireless Sensor Network OptimizationAhmad Sardouk, Rana Rahim-Amoud, Leïla Merghem-Boulahia, Dominique Gaïti. 122-133 [doi]
- Flow Monitoring in Wireless MESH NetworksCristian Popi, Olivier Festor. 134-146 [doi]
- Visualization of Node Interaction Dynamics in Network TracesPetar Dobrev, Sorin Stancu-Mara, Jürgen Schönwälder. 147-160 [doi]
- Towards Energy Efficient Change Management in a Cloud Computing EnvironmentHady S. AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, David Kaminsky. 161-166 [doi]
- A Market-Based Pricing Scheme for Grid NetworksPeng Gao, Xingyao Wu, Tao Liu, David Hausheer. 167-172 [doi]
- Consistency of Network Traffic Repositories: An OverviewElmer Lastdrager, Aiko Pras. 173-178 [doi]
- A P2P-Based Approach to Cross-Domain Network and Service ManagementAdriano Fiorese, Paulo Simões, Fernando Boavida. 179-182 [doi]
- PeerCollaborationThomas Bocek, Burkhard Stiller. 183-186 [doi]
- Fast Learning Neural Network Intrusion Detection SystemRobert Koch, Gabi Dreo. 187-190 [doi]
- Design of an Autonomous Framework for Efficient Large Scale Management of Next Generation Web Service MashupsAnna Hristoskova, Filip De Turck. 191-194 [doi]
- Scalable Detection and Isolation of PhishingGiovane C. M. Moura, Aiko Pras. 195-198 [doi]
- Multi-agent Reinforcement Learning in Network ManagementRicardo Bagnasco, Joan Serrat. 199-202 [doi]
- Answering Queries Using Cooperative Semantic CachingAndrei Vancea, Burkhard Stiller. 203-206 [doi]
- Towards Cost-Aware Multipath RoutingJoão Taveira Araújo, Miguel Rio, George Pavlou. 207-210 [doi]