Abstract is missing.
- A scalable approach for structuring large-scale hierarchical cloud management systemsHendrik Moens, Filip De Turck. 1-8 [doi]
- Network aware virtual machine and image placement in a cloudDavid Breitgand, Amir Epstein, Alex Glikson, Assaf Israel, Danny Raz. 9-17 [doi]
- Dynamic Controller Provisioning in Software Defined NetworksMd. Faizul Bari, Arup Raton Roy, Shihabur Rahman Chowdhury, Qi Zhang, Mohamed Faten Zhani, Reaz Ahmed, Raouf Boutaba. 18-25 [doi]
- More control over network resources: An ISP caching perspectiveDaphné Tuncer, Marinos Charalambides, Raul Landa, George Pavlou. 26-33 [doi]
- Network performance improvement through evaluation of bicriteria routing methods in transport networksLúcia Martins, Joao Lopes, José M. F. Craveirinha, João C. N. Clímaco, Ricardo Cadime, Catarina Monica. 34-41 [doi]
- Characterizing the impact of network substrate topologies on virtual network embeddingMarcelo Caggiani Luizelli, Leonardo Richter Bays, Luciana Salete Buriol, Marinho P. Barcellos, Luciano Paschoal Gaspary. 42-50 [doi]
- A formal approach for virtual machine migration planningSaeed Al-Haj, Ehab Al-Shaer. 51-58 [doi]
- Classifying server behavior and predicting impact of modernization actionsJasmina Bogojeska, David Lanyi, Ioana Giurgiu, George Stark, Dorothea Wiesmann. 59-66 [doi]
- Real-time adaptive algorithm for resource monitoringMauro Andreolini, Michele Colajanni, Marcello Pietri, Stefania Tosi. 67-74 [doi]
- Pazl: A mobile crowdsensing based indoor WiFi monitoring systemValentin Radu, Lito Kriara, Mahesh K. Marina. 75-83 [doi]
- Leveraging attention scarcity to improve the overall user experience of Cloud servicesMarco Aurélio Stelmar Netto, Marcos D. Assuncao, Silvia Bianchi. 84-91 [doi]
- Update aware replica placementAssaf Rappaport, Danny Raz. 92-99 [doi]
- OnTimeSecure: Secure middleware for federated Network Performance MonitoringPrasad Calyam, Shweta Kulkarni, Alex Berryman, Kunpeng Zhu, Mukundan Sridharan, Rajiv Ramnath, Gordon Springer. 100-104 [doi]
- Automated source code extension for debugging of OpenFlow based networksStefan Hommes, Frank Hermann 0001, Radu State, Thomas Engel. 105-108 [doi]
- Guaranteeing consistency between large replicated writable disk imagesSean Rooney, Luis Garcés-Erice. 109-113 [doi]
- Optimizing crowd based monitoring in large scale mobile networksJan Groenendijk, Yangcheng Huang. 114-117 [doi]
- A design and implementation of dual-stack aware authentication system for enterprise captive portalSurasak Sanguanpong, Kasom Koht-arsa. 118-121 [doi]
- Monitoring latency with OpenFlowKevin Phemius, Mathieu Bouet. 122-125 [doi]
- Impact of rare alarms on event correlationAnne Bouillard, Aurore Junier, Benoit Ronot. 126-129 [doi]
- Measuring TCP connection establishment times of dual-stacked web servicesVaibhav Bajpai, Jürgen Schönwälder. 130-133 [doi]
- Towards a trust computing architecture for RPL in Cyber Physical SystemsSebastian Seeber, Anuj Sehgal, Björn Stelte, Gabi Dreo Rodosek, Jürgen Schönwälder. 134-137 [doi]
- Gravitational networks: Self-organizing network topologies into hierarchically structured domainsMartin Johnsson, Brendan Jennings. 138-142 [doi]
- Identifying missed monitoring alerts based on unstructured incident ticketsLiang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik. 143-146 [doi]
- Volume is not enough: SVC-aware server allocation for peer-assisted streamingJulius Rückert, Osama Abboud, Martin Kluge, David Hausheer. 147-151 [doi]
- Lightweight link dimensioning using sFlow samplingRicardo de Oliveira Schmidt, Ramin Sadre, Anna Sperotto, Aiko Pras. 152-155 [doi]
- Choreographing configuration changesHerry Herry, Paul Anderson, Michael Rovatsos. 156-160 [doi]
- Joint optimization for the delivery of multiple video channels in Telco-CDNFen Zhou, Jiayi Liu, Gwendal Simon, Raouf Boutaba. 161-165 [doi]
- A distributed approach to dynamic VM managementMichael Tighe, Gastón Keller, Michael Bauer, Hanan Lutfiyya. 166-170 [doi]
- Detecting anomalies in cellular networks using an ensemble methodGabriela F. Ciocarlie, Ulf Lindqvist, Szabolcs Nováczki, Henning Sanneck. 171-174 [doi]
- Assessment and event based analysis of dynamic wireless networksDenis Carvin, Guillaume Kremer, Philippe Owezarski, Pascal Berthou. 175-179 [doi]
- A cloud monitoring framework for self-configured monitoring slices based on multiple toolsMarcio Barbosa de Carvalho, Rafael Pereira Esteves, Guilherme da Cunha Rodrigues, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 180-184 [doi]
- SLA impact modeling for service engagementYixin Diao, Linh Lam, Larisa Shwartz, David M. Northcutt. 185-188 [doi]
- Reliability estimation in mobile ad hoc networksRitu Chadha, Alexander Poylisher, Constantin Serban. 189-192 [doi]
- Dynamic multi-stage Energy-Saving Management mechanism based on Base Station cooperationPeng Yu, Wenjing Li, Yulin Su, Xuesong Qiu. 193-197 [doi]
- Efficient probing method for active diagnosis in large scale networkLu Guan, Ying Wang, Wenjing Li, Congxian Yan. 198-202 [doi]
- Adaptive network management for countering selective capture in wireless sensor networksHamid Al-Hamadi, Ing-Ray Chen. 203-210 [doi]
- CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networksCorinna Schmitt, Andre Freitag, Georg Carle. 211-218 [doi]
- Thwarting attacks on ZigBee - Removal of the KillerBee stingerBjörn Stelte, Gabi Dreo Rodosek. 219-226 [doi]
- Towards real-time intrusion detection for NetFlow and IPFIXRick Hofstede, Václav Bartos, Anna Sperotto, Aiko Pras. 227-234 [doi]
- A probabilistic cost-efficient approach for mobile security assessmentMartín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor. 235-242 [doi]
- Refactoring multi-layered access control policies through (De)compositionMatteo Maria Casalino, Romuald Thion. 243-250 [doi]
- Scalable matching and ranking for network searchMisbah Uddin, Rolf Stadler, Alexander Clemm. 251-259 [doi]
- Analysis of YouTube user experience from passive measurementsGiorgos Dimopoulos, Pere Barlet-Ros, Josep Sanjuàs-Cuxart. 260-267 [doi]
- Efficient distributed monitoring in 6LoWPAN networksAbdelkader Lahmadi, Alexandre Boeglin, Olivier Festor. 268-276 [doi]
- SLA learning from past failures, a Multi-Armed Bandit approachLise Rodier, David Auger, Johanne Cohen, Hélia Pouyllau. 277-283 [doi]
- Auction-type framework for selling inter-domain pathsXavier Misseri, Jean-Louis Rougier, Stefano Moretti. 284-291 [doi]
- On the manipulability of voting systems: application to multi-operator networksFrançois Durand, Fabien Mathieu, Ludovic Noirie. 292-297 [doi]
- The trouble with choice: An empirical study to investigate the influence of charging strategies and content selection on QoEAndreas Sackl, Patrick Zwickl, Peter Reichl. 298-303 [doi]
- When free riding is the best choice: The case of network charges for content providersMaurizio Naldi, Giuseppe D'Acquisto. 304-309 [doi]
- Incentivizing efficient load repartition in heterogeneous wireless networks with selfish delay-sensitive usersVladimir Fux, Patrick Maillé. 310-316 [doi]
- OpenSAF and VMware from the perspective of high availabilityAli Nikzad, Ferhat Khendek, Maria Toeroe. 324-331 [doi]
- Integrating VM selection criteria in distributed dynamic VM consolidation using Fuzzy Q-LearningSeyed Saeid Masoumzadeh, Helmut Hlavacs. 332-338 [doi]
- Integrating an online configuration checker with existing management systems: Application to CIM/WBEM environmentsLudi Akue, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla. 339-344 [doi]
- An approach for knowledge-based IT management of air traffic control systemsFabian Meyer, Reinhold Kröger, Ralf Heidger, Morris Milekovic. 345-349 [doi]
- Who decides migration? A migration lock mechanism for virtual machinesXiaolin Wang, Yingwei Luo, Zhenlin Wang. 350-354
- Adapting applications to exploit virtualization management knowledgeVitalian A. Danciu, Alexander Knapp. 355-363 [doi]
- Towards an improved data centre simulation with DCSimMichael Tighe, Gastón Keller, Jamil Shamy, Michael Bauer, Hanan Lutfiyya. 364-372 [doi]
- Multi-source cooperative adaptation for QoE-aware video multicast rate-controlKaliappa Ravindran. 373-381 [doi]
- Determining leaders and clusters in video consumptionDanny De Vleeschauwer, Chris Hawinkel, Yannick Le Louédec. 382-385 [doi]
- Video delivery over next generation cellular networksManos Dramitinos, Nan Zhang, Miroslaw Kantor, José Costa-Requena, Ioanna Papafili. 386-393 [doi]
- Networking solutions in the federation of cloudsRoman Lapacz, Blazej Pietrzak. 394-397 [doi]
- Dynamic traffic management mechanism for active optimization of ISP costsZbigniew Duliñski, Rafal Stankiewicz. 398-401 [doi]
- HORST - Home router sharing based on trustMichael Seufert, Valentin Burger, Tobias Hoßfeld. 402-405 [doi]
- Reciprocity with virtual nodes: Supporting mobile peers in Peer-to-Peer content distributionMatthias Wichtlhuber, Peter Heise, Bjorn Scheurich, David Hausheer. 406-409 [doi]