Abstract is missing.
- Gossip-based resource management for cloud environmentsFetahi Wuhib, Rolf Stadler, Mike Spreitzer. 1-8 [doi]
- PRESS: PRedictive Elastic ReSource Scaling for cloud systemsZhenhuan Gong, Xiaohui Gu, John Wilkes. 9-16 [doi]
- Renovating legacy distributed systems using virtual appliance with dependency graphFumio Machida, Masahiro Kawato, Yoshiharu Maeno. 17-24 [doi]
- Similarity metric for risk assessment in IT change plansLuís Armando Bianchin, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville, Luciano Paschoal Gaspary, Claudio Bartolini, Maher Rahmouni. 25-32 [doi]
- Facing the unpredictable: Automated adaption of IT change plans for unpredictable management domainsSebastian Hagen, Alfons Kemper. 33-40 [doi]
- Where have all the tickets gone?Claudio Bartolini, Phil Day. 41-47 [doi]
- Risk management in VoIP infrastructures using support vector machinesMohamed Nassar, Oussema Dabbebi, Remi Badonnel, Olivier Festor. 48-55 [doi]
- RiskRank: Security risk ranking for IP flow recordsShaonan Wang, Radu State, Mohamed Ourdane, Thomas Engel. 56-63 [doi]
- Automated and secure IPv6 configuration in enterprise networksFrederic Beck, Olivier Festor, Isabelle Chrisment, Ralph E. Droms. 64-71 [doi]
- Decomposition techniques for policy refinementRobert Craven, Jorge Lobo, Emil C. Lupu, Alessandra Russo, Morris Sloman. 72-79 [doi]
- Teleo-Reactive policies for managing human-centric pervasive servicesSrdjan Marinovic, Kevin P. Twidle, Naranker Dulay, Morris Sloman. 80-87 [doi]
- A deployment framework for self-contained policiesMarwan Cheaito, Romain Laborde, François Barrère, Abdelmalek Benzekri. 88-95 [doi]
- Capacity planning and power management to exploit sustainable energyDaniel Gmach, Jerry Rolia, Cullen Bash, Yuan Chen, Tom Christian, Amip Shah, Ratnesh K. Sharma, Zhikui Wang. 96-103 [doi]
- ECO-friendly distributed routing protocol for reducing network energy consumptionDaisuke Arai, Kiyohito Yoshihara. 104-111 [doi]
- A cluster-based negotiation model for task allocation in Wireless Sensor NetworkYukun Li, Zhipeng Gao, Yang Yang, Zhili Guan, Xingyu Chen, Xuesong Qiu. 112-117 [doi]
- DP+IP = design of efficient backup schedulingLudmila Cherkasova, Alex Zhang, Xiaozhou Li. 118-125 [doi]
- Declarative application deployment and change managementSebastian Herden, André Zwanziger, Philip Robinson. 126-133 [doi]
- Dependency-aware fault diagnosis with metric-correlation models in enterprise software systemsMiao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward. 134-141 [doi]
- An extensible framework for repair-driven monitoringThomas Reidemeister, Miao Jiang, Paul A. S. Ward. 142-149 [doi]
- Application of time series analysis to fault management in MANETsAngelo Sapello, Adarsh Sethi, Marian H. Nodine, Ritu Chadha. 150-157 [doi]
- Effective acquaintance management for Collaborative Intrusion Detection NetworksCarol J. Fung, Jie Zhang, Raouf Boutaba. 158-165 [doi]
- On energy-awareness for peer-assisted streaming with set-top boxesKonstantin Pussep, Sebastian Kaune, Osama Abboud, Christian Huff, Ralf Steinmetz. 166-173 [doi]
- Integration of a Power/Workload Control System into IT management architectureSven Graupner, Daniel Gmach. 174-181 [doi]
- Integration of PXE-based desktop solutions into broadband access networksTiago Cruz, Paulo Simões, Fernando Bastos, Edmundo Monteiro. 182-189 [doi]
- Federation Computing: A pragmatic approach for the Future InternetChristos Tranoris, Spyros G. Denazis. 190-197 [doi]
- Joint analysis of network incidents and intradomain routing changesAmelie Medem Kuatse, Renata Teixeira, Nick Feamster, Mickael Meulle. 198-205 [doi]
- An architecture for P2P locality in managed networks using hierarchical trackersCharles Miers, Marcos A. Simplício Jr., Walter Goya, Tereza Cristina M. B. Carvalho, Victor Souza. 206-213 [doi]
- Optimal policy for Joint Call Admission Control in next generation wireless networksRodolfo W. L. Coutinho, Vitor L. Coelho, João Crisóstomo Weyl Albuquerque Costa, Glaucio H. S. Carvalho. 214-217 [doi]
- Probability-based fault detection in wireless sensor networksRimao Huang, Xuesong Qiu, Lin-li Ye. 218-221 [doi]
- Policy exchange information model in support of cross-domain managementAndrew J. Mayer, Xi Jiang, Stephen McCarron, Hsin-Ping Chang. 222-225 [doi]
- A trust model for capability delegation in federated policy systemsKevin Feeney, Rob Brennan, Simon N. Foley. 226-229 [doi]
- User-Controlled Automated Identity DelegationThorsten Höllrigl, Holger Kühner, Jochen Dinger, Hannes Hartenstein. 230-233 [doi]
- Leveraging ESM platforms for continuous mission-oriented assessment of information assuranceAmy Fedyk, Michael Atighetchi, Partha Pratim Pal. 234-237 [doi]
- Toward business-driven risk management for Cloud computingJosep Oriol Fitó, Mario Macías, Jordi Guitart. 238-241 [doi]
- User identification in encrypted network communicationsRobert Koch, Gabi Dreo Rodosek. 246-249 [doi]
- A framework for context-driven end-to-end QoS control in Converged NetworksSuleiman Y. Yerima, Gerard P. Parr, Cathryn Peoples, Sally I. McClean, Philip J. Morrow. 250-253 [doi]
- Automated management of network experiments and user behaviour emulation on large scale testbed facilitiesSteven Latré, Wim Van de Meerssche, Stijn Melis, Dimitri Papadimitriou, Filip De Turck, Piet Demeester. 254-257 [doi]
- Using policies to drive autonomic management of virtual systemsDelei Weng, Michael A. Bauer. 258-261 [doi]
- Trust management for Web ServicesScott D. Stoller. 262-265 [doi]
- Quality-assured provisioning of IPTV services in Ethernet-based broadband networksYa-Shian Wang, Kuan-Hsiung Liang, Hey-Chyi Young, Shou-Yi Cheng, Mei-Chun Chen, Ya-Ping Huang. 266-269 [doi]
- Sharing information about security alerts using semantic web technologiesPilar Holgado, Jorge E. López de Vergara, Víctor A. Villagrá, Ivan Sanz, Antonio Amaya. 270-273 [doi]
- IP fast reroute control using centralized control plane architectureShohei Kamamura, Takashi Miyamura, Kohei Shiomoto. 274-277 [doi]
- An Iterative Information-Theoretic approach to estimate traffic matrixKe Liu, Xuesong Qiu, Zhipeng Gao, Xingyu Chen, Shuying Chang, Yuan Pang. 278-281 [doi]
- Policy-based resource management in virtual network environmentTakashi Miyamura, Shohei Kamamura, Kohei Shiomoto. 282-285 [doi]
- An efficient data circulation and discovery scheme in VANETs using public transportation systemsChyi-Ren Dow, Pa Hsuan, Yu-Hong Lee, Yi-Tung Lee, Ching-Yin Huang. 286-289 [doi]
- MANET network management and performance monitoring for NHDP and OLSRv2Ulrich Herberg, Thomas Clausen, Robert Cole. 290-293 [doi]
- Approaches to nodes choosing protocol model for collaborative MIMO cellular networksXiaoxing Yu, Jing Feng. 294-297 [doi]
- An efficient active probing approach based on the combination of online and offline strategiesLikun Yu, Lu Cheng, Yan Qiao, Yiguo Yuan, Xingyu Chen. 298-301 [doi]
- A flow-based anomaly detection method using sketch and combinations of traffic featuresShuying Chang, Xuesong Qiu, Zhipeng Gao, Ke Liu, Feng Qi. 302-305 [doi]
- Performance-aware design and optimization of enterprise applicationsJan Schaefer, Markus Schmid, Andreas Textor, Marcus Thoss, Reinhold Kröger, Andreas Roth. 306-309 [doi]
- An investigation on the identification of VoIP traffic: Case study on Gtalk and SkypeRiyad Alshammari, A. Nur Zincir-Heywood. 310-313 [doi]
- Towards a validation framework for dynamic reconfigurationLudi Akue, Emmanuel Lavinal, Michelle Sibilla. 314-317 [doi]
- Adaptive admission control of distributed cloud servicesNikolaos Leontiou, Dimitrios Dechouniotis, Spyros G. Denazis. 318-321 [doi]
- CRAC: Confidentiality risk assessment and IT-infrastructure comparisonAyse Morali, Emmanuele Zambon, Sandro Etalle, Roel Wieringa. 322-325 [doi]
- Pinpointing patch impact test targets using kernel tracingKenji Hori, Kiyohito Yoshihara. 326-329 [doi]
- Toward large-scale programmable networks: Lessons learned through the operation and management of a wide-area OpenFlow-based networkYoshihiko Kanaumi, Shuichi Saito, Eiji Kawai. 330-333 [doi]
- Dynamic policy conflict analysis for collaborative web servicesZhengping Wu, Yuanyao Liu. 338-341 [doi]
- User-preference-based service selection using fuzzy logicZhengping Wu, Mu Yuan. 342-345 [doi]
- Cautious weight tuning for link-state routingAnders Gunnar, Mikael Johansson. 346-349 [doi]
- Virtual platform support for QoS management in IMS based multiple provider networksMuhammad Shoaib Siddiqui, Choong Seon Hong, Young-Cheol Bang. 350-353 [doi]
- Rule-based SLA management for revenue maximisation in Cloud Computing MarketsMario Macías, Josep Oriol Fitó, Jordi Guitart. 354-357 [doi]
- Difficulties of identifying application type in backbone trafficKensuke Fukuda. 358-361 [doi]
- Personalised handoff decision for seamless roaming in next generation of wireless networksLekometsa Mokhesi, Antoine B. Bagula. 362-365 [doi]
- Adopting software engineering practices to network processor devices introducing the Domain Specific Modeling paradigm to the ForCES FrameworkEvangelos Haleplidis, Christos Tranoris, Spyros G. Denazis, Odysseas G. Koufopavlou. 366-369 [doi]
- Intrinsic monitoring within an IPv6 network: mapping node information to network pathsLei Shi, Alan Davy, David Muldowney, Steven Davy, Edzard Höfig, Xiaoming Fu. 370-373 [doi]
- Real time distributed monitoring of services over IPCormac Mullaly, Brian Lee, Dawid Czesak. 374-377 [doi]
- Towards automatic and independent internet services configurationMiguel Lopes, Antonio Costa, Bruno Dias. 378-381 [doi]
- Identity-bound accountingSeppo Heikkinen, Santeri Siltala. 382-385 [doi]
- Performance evaluation of an architecture for localized IP mobility managementJavier Carmona-Murillo, José Luis González Sánchez, Francisco J. Rodríguez-Pérez. 386-387 [doi]
- Botnet master detection using a mashup-based approachCarlos Raniery Paula dos Santos, Rafael Santos Bezerra, Joao Marcelo Ceron, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 390-393 [doi]
- Scheduling service workflows for cost optimization in hybrid cloudsLuiz F. Bittencourt, Carlos R. Senna, Edmundo R. M. Madeira. 394-397 [doi]
- A Service Oriented Architecture for achieving QoSaware Workflow Management in Virtualized EnvironmentsSpyridon V. Gogouvitis, Kleopatra Konstanteli, George Kousiouris, Gregory Katsaros, Dimosthenis Kyriazis, Theodora A. Varvarigou. 398-401 [doi]
- Dispatch tooling for global service deliveryDavid Loewenstern, Melissa J. Buco, Yixin Diao, Heiko Ludwig, Christopher Ward. 402-405 [doi]
- Towards non-expert users monitoring networks and services through semantically enhanced visualizationsOwen Conlan, John Keeney, Cormac Hampson, Fionán Peter Williams. 406-409 [doi]
- Moving core services to the edge in NGNs for reducing managed infrastructure sizeRoberto Baldoni, Roberto Beraldi, Giorgia Lodi, Marco Platania, Leonardo Querzoni. 410-413 [doi]
- Domain-wide scheduling of OSPF graceful restarts for maintenance purposesSamir Ghamri-Doudane, Laurent Ciavaglia. 414-417 [doi]
- Aligning infrastructure and business processes using watermarksHeiko Ludwig, Kamal Bhattacharya, Rick Sheftic, Michael Nidd, Michael Moser, Andreas Kind. 418-421 [doi]
- Adaptive context monitoring in heterogeneous environmentsDineshbalu Balakrishnan, Amiya Nayak. 422-425 [doi]
- Evaluating impact of manageability features on device performanceJacob Leverich, Vanish Talwar, Parthasarathy Ranganathan, Christos Kozyrakis. 426-430 [doi]
- Machine learning based Call Admission Control approaches: A comparative studyAbul Bashar, Gerard Parr, Sally I. McClean, Bryan W. Scotney, Detlef Nauck. 431-434 [doi]
- Semantic scheduling of active measurements for meeting network monitoring objectivesPrasad Calyam, Lakshmi Kumarasamy, Füsun Özgüner. 435-438 [doi]
- A distributed relay selection algorithm for cognitive radio ad-hoc networksYun Li, Ruifeng Zhang, Chonggang Wang, Ali Daneshmand, Xiaohu You. 439-442 [doi]
- An automated roll-back plan to IT change management toolDenílson Cursino Oliveira, Raimir Holanda Filho. 443-446 [doi]
- A network service platform providing stable QoS based on dynamic allocation of distributed componentsKazuhiko Kinoshita, Naosuke Yokoe, Yusuke Hirota, Hideki Tode, Koso Murakami. 447-450 [doi]
- Network IDS alert classification with frequent itemset mining and data clusteringRisto Vaarandi, Karlis Podins. 451-456 [doi]
- A framework for self-configuration on WMNs aware of performance and security issuesHelber W. da Silva, Raimir Holanda, Aldri Luiz dos Santos, Michele Nogueira Lima. 457-462 [doi]
- Game theory driven monitoring of spatial-aggregated IP-Flow recordsCynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy. 463-468 [doi]
- A performance view on DNSSEC migrationDaniel Migault, Cedric Girard, Maryline Laurent. 469-474 [doi]
- Cross-domain service management for enabling domain autonomy in a federated SOAIgnacio Silva-Lepe, Isabelle Rouvellou, Rahul P. Akolkar, Arun Iyengar. 475-480 [doi]
- An aggregation scheme for the optimisation of service search in Peer-to-Peer overlaysAdriano Fiorese, Paulo Simões, Fernando Boavida. 481-486 [doi]
- A service composition approach for inter-domain provisioningFernando Matos, Alexandre Matos, Paulo Simões, Edmundo Monteiro. 487-492 [doi]
- Multi-domain fault management architecture based on a shared ontology-based knowledge planeAlfonso Castro, Beatriz Fuentes, José A. Lozano, Begona Costales, Víctor A. Villagrá. 493-498 [doi]
- A neutral layered mapping system with two-stage cache for a scalable InternetLetong Sun, Xia Yin, Zhiliang Wang, Yang Xiang, Jianping Wu. 499-504 [doi]
- Fast failure recovery for reliable multicast-based content deliveryNing Wang, Binbin Dong. 505-510 [doi]
- Distortion optimization in enriched video traces for End-to-End video quality enhancementAraz Jahaniaval, Dalia Fayek, Ryan Brown. 511-516 [doi]
- Information-based sensor tasking wireless body area networks in U-health systemsHui Wang 0006, Hyeok-soo Choi, Nazim Agoulmine, M. Jamal Deen, James Won-Ki Hong. 517-522 [doi]
- MobiGrid: A middleware for integrating mobile phone and grid computingMuthoni Masinde, Antoine B. Bagula, Victor Ndegwa. 523-526 [doi]
- Near optimal demand-side energy management under real-time demand-response pricingJin Xiao, Jae Yoon Chung, Jian Li, Raouf Boutaba, James Won-Ki Hong. 527-532 [doi]