Abstract is missing.
- An information plane architecture supporting home network managementJoe Sventek, Alexandros Koliousis, Oliver Sharma, Naranker Dulay, Dimosthenis Pediaditakis, Morris Sloman, Tom Rodden, Tom Lodge, Ben Bedwell, Kevin Glover, Richard Mortier. 1-8 [doi]
- Flow signatures of popular applicationsVladislav Perelman, Nikolay Melnikov, Jürgen Schönwälder. 9-16 [doi]
- On the merits of popularity prediction in multimedia content cachingJeroen Famaey, Tim Wauters, Filip De Turck. 17-24 [doi]
- An auditing system for multi-domain IP carrying Service Level AgreementsFrank Eyermann, Gabi Dreo Rodosek. 25-32 [doi]
- Distributed inter-domain SLA negotiation using Reinforcement LearningTristan Groleat, Hélia Pouyllau. 33-40 [doi]
- Impact analysis of BGP sessions for prioritization of maintenance operationsSihyung Lee, Kyriaki Levanti, Hyong S. Kim. 41-48 [doi]
- A data confidentiality architecture for developing management mashupsCarlos R. P. dos Santos, Rafael Santos Bezerra, Lisandro Zambenedetti Granville, Leandro Marcio Bertholdo, Winnie Cheng, Nikos Anerousis. 49-56 [doi]
- Managing data retention policies at scaleJun Li, Sharad Singhal, Ram Swaminathan, Alan H. Karp. 57-64 [doi]
- Run-time performance optimization and job management in a data protection solutionLudmila Cherkasova, Roger Lau, Harald Burose, Subramaniam Venkata Kalambur, Bernhard Kappler, Kuttiraja Veeranan. 65-72 [doi]
- Towards efficient resource management for data-analytic platformsClaris Castillo, Mike Spreitzer, Malgorzata Steinder. 73-80 [doi]
- A prototype for in-network management in NaaS-enabled networksDominique Dudkowski, Bioniko Tauhid, Giorgio Nunzi, Marcus Brunner. 81-88 [doi]
- Evaluating the impact of planning long-term contracts on the management of a hybrid IT infrastructurePaulo Ditarso Maciel Jr., Francisco Vilar Brasileiro, Raquel Vigolvino Lopes, Marcus Carvalho, Miranda Mowbray. 89-96 [doi]
- What will happen if cloud management operations burst out?Shinji Kikuchi, Yasuhide Matsumoto. 97-104 [doi]
- A hierarchical model to evaluate quality of experience of online services hosted by cloud computingHaiyang Qian, Deep Medhi, Kishor S. Trivedi. 105-112 [doi]
- Policy refinement of network services for MANETsHang Zhao, Jorge Lobo, Arnab Roy, Steven M. Bellovin. 113-120 [doi]
- Self-managed content-based routing for opportunistic networksJavier Baliosian, Jorge Visca, Matias Richart, Guillermo Apollonia, Leonardo Vidal, Martin Giachino, Eduardo Grampín. 121-128 [doi]
- Managing interoperation in multi-organization MANETs by dynamic gateway assignmentStarsky H. Y. Wong, Chi-Kin Chau, Kang-Won Lee. 129-136 [doi]
- Design and evaluation of a hierarchical application placement algorithm in large scale cloudsHendrik Moens, Jeroen Famaey, Steven Latré, Bart Dhoedt, Filip De Turck. 137-144 [doi]
- Cloud services for SMEs: Contract Management s requirements specificationMario A. Bochicchio, Antonella Longo, Caterina Mansueto. 145-152 [doi]
- Locating Virtual Infrastructures: Users and InP perspectivesGuilherme Piegas Koslovski, Sebastien Soudan, Paulo Gonçalves, Pascale Vicat-Blanc Primet. 153-160 [doi]
- SLA-aware placement of multi-virtual machine elastic services in compute cloudsDavid Breitgand, Amir Epstein. 161-168 [doi]
- Licence-aware management of virtual machinesIan Whalley, Malgorzata Steinder. 169-176 [doi]
- On the use of SNMP as a management interface for virtual networksFabio Fabian Daitx, Rafael Pereira Esteves, Lisandro Zambenedetti Granville. 177-184 [doi]
- VMSpreader: Multi-tier application resiliency through virtual machine stripingPradipta De, Sambuddha Roy. 185-192 [doi]
- A coordination framework for self-organisation in LTE networksLars-Christoph Schmelz, Mehdi Amirijoo, Andreas Eisenblaetter, Remco Litjens, Michaela Neuland, John Turk. 193-200 [doi]
- FAST: A fuzzy-based adaptive scheduling technique for IEEE 802.16 networksSin-Seok Seo, Joon-Myung Kang, Nazim Agoulmine, John Strassner, James Won-Ki Hong. 201-208 [doi]
- Magneto approach to QoS monitoringSidath Handurukande, Szymon Fedor, Stefan Wallin, Martin Zach. 209-216 [doi]
- Pattern-based composite application deploymentTamar Eilam, Michael Elder, Alexander V. Konstantinou, Ed C. Snible. 217-224 [doi]
- ReComp: QoS-aware recursive service composition at minimum costVimmi Jaiswal, Amit Sharma, Akshat Verma. 225-232 [doi]
- Static discovery and remediation of code-embedded resource dependenciesNikolai Joukov, Vasily Tarasov, Joel Ossher, Birgit Pfitzmann, Sergej Chicherin, Marco Pistoia, Takaaki Tateishi. 233-240 [doi]
- Support for concurrent adaptation of multiple Web service compositions to maximize business metricsQinghua Lu, Vladimir Tosic. 241-248 [doi]
- Leveraging IT project lifecycle data to predict support costsBruno Lopes Dalmazo, Weverton L. Cordeiro, Abraham Lincoln Rabelo de Sousa, Juliano Araujo Wickboldt, Roben Castagna Lunardi, Ricardo Luis dos Santos, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, Claudio Bartolini, Marianne Hickey. 249-256 [doi]
- QoS adaptation in inter-domain servicesFernando Matos, Alexandre Matos, Paulo Simões, Edmundo Monteiro. 257-264 [doi]
- Towards solid IT Change Management: Automated detection of conflicting IT change plansSebastian Hagen, Alfons Kemper. 265-272 [doi]
- Elimination based Fault Localization in shared resource environmentsKalapriya Kannan, Anuradha Bhamidipaty. 273-280 [doi]
- Probabilistic differentiated availability services in WDM networks protected by shared protection schemesHamada Alshaer, Jaafar M. H. Elmirghani. 281-288 [doi]
- PTF: Passive Temporal FingerprintingJérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor. 289-296 [doi]
- Incorporating virtualization awareness in service monitoring systemsMarcio Barbosa de Carvalho, Lisandro Zambenedetti Granville. 297-304 [doi]
- The impact of power management to spectrum tradingGülfem Isiklar Alptekin, Ayse Basar Bener. 305-312 [doi]
- A P2P-Based self-healing service for network maintenancePedro Arthur Pinheiro Rosa Duarte, Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 313-320 [doi]
- Observing the BitTorrent universe through TelescopesRodrigo B. Mansilha, Leonardo R. Bays, Matheus B. Lehmann, Alan Mezzomo, Giovani Facchini, Luciano Paschoal Gaspary, Marinho P. Barcellos. 321-328 [doi]
- On the inefficacy of Euclidean classifiers for detecting self-similar Session Initiation Protocol (SIP) messagesAnil Mehta, Neda Hantehzadeh, Vijay K. Gurbani, Tin Kam Ho, Jun Koshiko, Ramanarayanan Viswanathan. 329-336 [doi]
- User behavior anticipation in P2P live video streaming systems through a Bayesian networkIhsan Ullah, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti. 337-344 [doi]
- Adaptive and self-configurable honeypotsGérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy. 345-352 [doi]
- An experimental testbed to predict the performance of XACML Policy Decision PointsBernard Butler, Brendan Jennings, Dmitri Botvich. 353-360 [doi]
- Artemisa: An open-source honeypot back-end to support security in VoIP domainsRodrigo do Carmo, Mohamed Nassar, Olivier Festor. 361-368 [doi]
- Performance analysis in Intrusion Detection and Prevention SystemsKhalid Alsubhi, Nizar Bouabdallah, Raouf Boutaba. 369-376 [doi]
- Mining unstructured log files for recurrent fault diagnosisThomas Reidemeister, Miao Jiang, Paul A. S. Ward. 377-384 [doi]
- Statistical techniques for online anomaly detection in data centersChengwei Wang, Krishnamurthy Viswanathan, Choudur Lakshminarayan, Vanish Talwar, Wade Satterfield, Karsten Schwan. 385-392 [doi]
- On the use of weighted syslog time series for anomaly detectionKensuke Fukuda. 393-398 [doi]
- BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodesSebastian Roschke, Feng Cheng 0002, Christoph Meinel. 399-406 [doi]
- A middleware-based approach to supporting trust-based service selectionChern Har Yew, Hanan Lutfiyya. 407-414 [doi]
- Online traffic classification based on sub-flowsVictor Pasknel de Alencar Ribeiro, Raimir Holanda Filho, José Everardo Bessa Maia. 415-421 [doi]
- Coordination and information exchange among resource management agentsSiri Fagernes, Alva L. Couch. 422-429 [doi]
- Semantic overlay network for peer-to-peer hybrid information search and retrievalSung-Su Kim, John Strassner, James Won-Ki Hong. 430-437 [doi]
- SLA-driven applicability analysis for patch managementBo Yang, Sai Zeng, Naga Ayachitula, Rajeev Puri. 438-445 [doi]
- Towards global service level guarantee within autonomic computing systemsNader Mbarek, Mohamed Aymen Chalouf, Francine Krief. 446-453 [doi]
- An efficient parallel TCAM scheme for the forwarding engine of the next-generation routerBin Zhang, Jiahai Yang, Jianping Wu, Qi Li, Donghong Qin. 454-461 [doi]
- Building reliable centralized intra-domain routing in Trustworthy and Controllable NetworkTan Jing, Junzhou Luo, Wei Li 0017, Shan Feng. 462-469 [doi]
- Adaptive post-failure load balancing in fast reroute enabled IP networksNing Wang, Abubaker Fagear, George Pavlou. 470-477 [doi]
- A broad-spectrum strategy for runtime risk management in VoIP enterprise architecturesOussema Dabbebi, Remi Badonnel, Olivier Festor. 478-484 [doi]
- Measuring the quality of experience of HTTP video streamingRicky K. P. Mok, Edmond W. W. Chan, Rocky K. C. Chang. 485-492 [doi]
- Performance management of Java-based SIP application serversMauro Femminella, Emanuele Maccherani, Gianluca Reali. 493-500 [doi]
- VoIP quality monitoring in LTE femtocellsCristian Olariu, Micheal O. Foghlu, Philip Perry, Liam Murphy. 501-508 [doi]
- IEEE802.11k enabled adaptive carrier sense management mechanism (KAPCS2)Christina Thorpe, Seán Murphy, Liam Murphy. 509-515 [doi]
- Resilient approach for energy management on Hot Spots in WSNsFernando Gielow, Michele Nogueira, Aldri Luiz dos Santos. 516-523 [doi]
- Cost-efficient deployment of a wireless sensor network under dynamic spectrum sharingJae-Young Seol, Seong-Lyun Kim. 524-530 [doi]
- A declarative approach for global network security configuration verification and evaluationMohammad Ashiqur Rahman, Ehab Al-Shaer. 531-538 [doi]
- Host-identifier-based scheme for source accountability of the internetDi Ma, Liming Wang, Ye Tian, Wei Mao. 539-546 [doi]
- Leveraging social network for predicting demand and estimating available resources for communication network managementAkshay Vashist, Siun-Chuon Mau, Alexander Poylisher, Ritu Chadha, Abhrajit Ghosh. 547-554 [doi]
- A subscription model for time-scheduled data transfersDominik Klein, Michael Menth, Rastin Pries, Phuoc Tran-Gia, Michael Scharf, Michael Sollner. 555-562 [doi]
- Modelling and evaluation of a policy-based resource management framework for converged next generation networksSuleiman Y. Yerima, Gerard P. Parr, Sally I. McClean, Philip J. Morrow. 563-570 [doi]
- Private recommendation service for IPTV systems: Protecting user profile privacyAhmed M. Elmisery, Dmitri Botvich. 571-577 [doi]
- A framework for migrating production snapshots of composite applications to virtualized environmentsManish Sethi, Narendran Sachindran, Manoj Soni, Manish Gupta 0007, Pratik Gupta. 578-585 [doi]
- A solution for identifying the root cause of problems in IT change managementRicardo Luis dos Santos, Juliano Araujo Wickboldt, Roben Castagna Lunardi, Bruno Lopes Dalmazo, Lisandro Zambenedetti Granville, Luciano Paschoal Gaspary, Claudio Bartolini, Marianne Hickey. 586-593 [doi]
- Effective VM sizing in virtualized data centersMing Chen, Hui Zhang 0002, Ya-Yunn Su, Xiaorui Wang, Guofei Jiang, Kenji Yoshihira. 594-601 [doi]
- Filtering multivariate workload non-conformance in shared IT-infrastructuresThomas Setzer, Alexander Stage. 602-609 [doi]
- A bandwidth scheduler for triple play services based on fuzzy theoryÁdamo L. de Santana, Diego L. Cardoso, Carlos Renato Lisboa Francês. 610-613 [doi]
- Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networksKun Zhang, Rui Wang, Depei Qian, Zhongzhi Luan. 614-617 [doi]
- Measurements on movie distribution behavior in Peer-to-Peer networksXiaofei Wang, Xiaojun Wang, Chengchen Hu, Keqiang He, Junchen Jiang, Bin Liu. 618-621 [doi]
- Chargeback model for resource pools in the cloudDaniel Gmach, Jerry Rolia, Ludmila Cherkasova. 622-625 [doi]
- A next generation entropy based framework for alert detection in system logsAdetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. 626-629 [doi]
- An event management communication system for Wireless Sensor NetworksBjörn Stelte. 630-633 [doi]
- Dynamic shared groups within XMPP: An investigation of the XMPP group modelLeigh Griffin, Eamonn de Leastar, Dmitri Botvich. 634-637 [doi]
- Automatic and independent Domain Name Service Configuration ManagementMiguel Lopes, Antonio Costa, Bruno Dias. 638-641 [doi]
- Performance evaluation of service searching using aggregation in peer-to-peer Service Overlay NetworksAdriano Fiorese, Paulo Simões, Fernando Boavida. 642-645 [doi]
- Federated autonomic management of HAN servicesRob Brennan, Zohar Etzioni, John Keeney, Kevin Feeney, Declan O Sullivan, William M. Fitzgerald, Simon N. Foley. 646-649 [doi]
- Practical IPv6 monitoring-challenges and techniquesMatej Grégr, Petr Matousek, Miroslav Svéda, Tomas Podermanski. 650-653 [doi]
- Intelligent energy efficient network management across the access networks to CPE pathwayV. Jain, Gerard P. Parr, Philip J. Morrow, M. Polaine. 654-657 [doi]
- A semantic monitoring and management framework for end-to-end servicesJohn Keeney, Owen Conlan, Viliam Holub, Miao Wang, Laetitia Chapel, Martin Serrano, Sven van der Meer. 658-661 [doi]
- A new method of network bottleneck diagnosisJuan Li, Yan Qiao, Xuesong Qiu, Guanjue Wang. 662-665 [doi]
- Feedback-based learning for self-managed network elementsPanagis Magdalinos, Apostolos Kousaridas, Panagiotis Spapis, Giorgos Katsikas, Nancy Alonistioti. 666-669 [doi]
- Dynamic bit-rate adjustment based on traffic characteristics for metro and core networksH. Abaci, Gerard P. Parr, Sally I. McClean, Adrian Moore, L. Krug. 670-673 [doi]
- IEEE 802.21 MIH in Linux Kernel space for cognitive and smart handoversKhamidulla Inoyatov, Shahnaza Tursunova, Igor Kim, Young-Tak Kim. 674-677 [doi]
- Sustainable QoS provisioning platform for network services based on flexible combination of distributed componentsMasanori Yamazaki, Naosuke Yokoe, Yusuke Hirota, Kazuhiko Kinoshita, Hideki Tode, Koso Murakami. 678-681 [doi]
- On the design of Virtual machine Intrusion detection systemUdaya Kiran Tupakula, Vijay Varadharajan. 682-685 [doi]
- A state recognition method based on screen images toward advanced integrated operation management supportKenichi Nishikawa, Takeshi Masuda, Yousuke Ohno, Yukio Akiyama. 686-689 [doi]
- A characterization study of SNMP usage patternsEwerton Monteiro Salvador, Jussara Almeida, Jose Marcos Nogueira, Paulo Teles Barbosa, Lisandro Zambenedetti Granville. 690-693 [doi]
- INSPIRE Ontology Handler: Automatically building and managing a knowledge base for Critical Information Infrastructure protectionMathieu Bouet, Maurice Israël. 694-697 [doi]
- An approach for autonomic performance management in SOA workflowsMarkus Schmid. 698-701 [doi]
- Online monitoring for sustainable communities of Web ServicesAbdelghani Benharref, Mohamed Adel Serhani, Salah Bouktif, Jamal Bentahar. 702-705 [doi]
- Limiting pre-distribution and clustering users on multicast pre-distribution VoDNoriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Haruhisa Hasegawa. 706-709 [doi]
- MapReduce framework based distributed NMS architectureR. Ananthalakshmi Ammal, Kumar K. B. Aneesh. 710-713 [doi]
- Cover-VT: Converged Security Visualization ToolWilliam Urbanski, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront. 714-717 [doi]
- A multiple criteria service composition selection algorithm supporting time-sensitive rulesLei Xu, Lei Shi, Runxin Wang, Brendan Jennings. 718-721 [doi]
- A low-energy consuming and user-centric security management architecture adapted to mobile environmentsMichel Kamel, Karima Boudaoud, S. Resondry, Michel Riveill. 722-725 [doi]
- Distributed demand response and user adaptation in smart gridsZhong Fan. 726-729 [doi]
- Wi-design, Wi-manage, why bother?Muhammad Sohaib Aslam, Antony Guinard, Alan McGibney, Susan Rea, Dirk Pesch. 730-744 [doi]
- Embedded approach for device inventory collection utilizing OS programmabilityShyyunn Sheran Lin, Gregory S. Thompson, Viren Malaviya. 745-759 [doi]
- Virtualisation - Securing a greener tomorrow with yesteryear' technologyMaria Pretorius, Mona Ghassemian, C. Ierotheou. 760-772 [doi]
- The cost of service quality in IT OutsourcingNikos Anerousis, Yixin Diao, Aliza Heching. 773-784 [doi]
- Presence based network topology tracing system for VoIP networksArup Acharya, Shachi Sharma, Nilanjan Banerjee. 785-799 [doi]
- YANG-based configuration modeling - The SecSIP IPS case study -Abdelkader Lahmadi, Emmanuel Nataf, Olivier Festor. 800-811 [doi]
- COPD24: From Future Internet technologies to health telemonitoring and teletreatment applicationKatarzyna Wac, David Hausheer. 812-826 [doi]
- Policy-based coordination and management of SON functionsTobias Bandh, Raphael Romeikat, Henning Sanneck, Haitao Tang. 827-840 [doi]
- LTE relay node self-configurationPéter Szilágyi, Henning Sanneck. 841-855 [doi]
- Network topology visualization and monitoring for multi-hop wireless networksRoberto Riggio, Matteo Gerola, Antonio Francescon, Andrea Zanardi, Tinku Rasheed, François Jan. 856-870 [doi]
- Novel distributed call admission control solution based on machine learning approachAbul Bashar, Gerard Parr, Sally I. McClean, Bryan W. Scotney, Detlef Nauck. 871-881 [doi]
- OMEGA-Q: A platform for measuring, troubleshooting and monitoring the quality of IPTV servicesAntonio Cuadra Sánchez, Maria del Mar Cutanda-Rodriguez, Rosa Maria Martinez, Olga Fernandez, Silvia Prieto, Salvador Serrano, Jose Carlos Barbadillo. 882-895 [doi]
- Discovering anomalous behavior in large networked systemsPeter W. Mullarkey, Mike Johns, Shaun Rooney. 896-910 [doi]
- Planetopus: A system for facilitating collaborative network monitoringWeichao Li, Waiting W. T. Fok, Edmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang. 911-924 [doi]
- Monitoring as an SLA-oriented consumable service for SaaS assurance: A prototypeDavid Roxburgh, Daniel Spaven, Craig Gallen. 925-939 [doi]
- Self-configuration of wireless multi-hop networksDaniel F. Macedo, José Marcos S. Nogueira, Guy Pujolle. 940-945 [doi]
- Self-management of hybrid optical and packet switching networksTiago Fioreze, Aiko Pras. 946-951 [doi]
- An open architecture for distributed IP traffic analysis (DITA)Cristian Morariu, Burkhard Stiller. 952-957 [doi]
- Flow-based intrusion detectionAnna Sperotto, Aiko Pras. 958-963 [doi]
- Business-driven IT managementClaudio Bartolini, Cesare Stefanelli. 964-969 [doi]
- Distributed monitoring and resource management for large cloud environmentsFetahi Wuhib, Rolf Stadler. 970-975 [doi]
- On the investigation of the joint use of self-* properties and Peer-To-Peer for network managementClarissa Cassales Marquezan, Lisandro Zambenedetti Granville. 976-981 [doi]
- Telco clouds and Virtual Telco: Consolidation, convergence, and beyondPeter Bosch, Alessandro Duminuco, Fabio Pianese, Thomas L. Wood. 982-988 [doi]
- A method to reduce interruption time considering number of clients on broadcast and communications integration environmentsYusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa. 989-996 [doi]
- Performance evaluation and improvement of TCP throughput over PFMIPv6 with MIHIgor Kim, Young-Tak Kim. 997-1004 [doi]
- Joint source channel coding optimization for heterogeneous access networks in multiuser scenarioLaura Toni, Lorenzo Rossi, Nazim Agoulmine, Jean-Guy Fontaine. 1005-1012 [doi]
- Hybrid optical and wireless technology integrations for next generation broadband access networksN. Moradpoor, Gerard P. Parr, Sally I. McClean, Bryan W. Scotney, G. Owusu. 1013-1020 [doi]
- Taking advantage of the diversity in wireless access networks: On the simulation of a user centric approachEl Hadi Cherkaoui, Nazim Agoulmine, Thinh Nguyen, Laura Toni, Jean-Guy Fontaine. 1021-1028 [doi]
- The node-centric formulation for network utility maximization of multihop wireless networks with elastic and inelastic trafficPhuong Luu Vo, Muhammad Shoaib Siddiqui, Choong Seon Hong. 1029-1034 [doi]
- Contract Management for Cloud Services: Information modelling aspectsMario A. Bochicchio, Antonella Longo, Caterina Mansueto. 1035-1042 [doi]
- An information model for inter-organizational fault managementPatricia Marcu, Thomas Schaaf. 1043-1049 [doi]
- A maturity model for tool landscapes of IT service providersChristian Richter, Thomas Schaaf. 1050-1057 [doi]
- A study in the expressiveness of semantically different policy modelling schemesChristos Tsarouchis, Declan O Sullivan, David Lewis. 1058-1061 [doi]
- Towards automated business-driven indication and mitigation of VM sprawl in Cloud supply chainsMaik A. Lindner, Fiona McDonald, Barry McLarnon, Philip Robinson. 1062-1065 [doi]
- Learning to self-recoverThomas Reidemeister, Miao Jiang, Paul A. S. Ward. 1066-1069 [doi]
- Initial thoughts on business-driven IT management challenges in Cloud computing providersJosep Oriol Fitó, Jordi Guitart. 1070-1073 [doi]
- Towards a Configuration Management System for hybrid cloud deploymentsSilvia Knittl, Michael Brenner. 1074-1077 [doi]
- Towards adopting a tooldriven, integrated and automated change management process for virtual machine provisioningMichael Hauser. 1078-1081 [doi]
- On decision making in business-driven IT managementClaudio Bartolini, Cesare Stefanelli, Mauro Tortonesi. 1082-1088 [doi]
- On the design of a flexible software platform for in-building OTT service provisioningTim De Pauw, Bruno Volckaert, Filip De Turck, Veerle Ongenae. 1089-1094 [doi]
- A business-driven IT services improvement modelAlberto S. Lima, José Neuman de Souza, A. C. Callado, J. Augusto Oliveira, Jacques Philippe Sauvé, Antão Moura. 1095-1102 [doi]
- Towards automatic provisioning and validation of Ethernet services over transport networksAndreas Johnsson, Catalin Meirosu, Navid Anjum, Amir Tirdad. 1103-1108 [doi]
- Autonomic management of client concurrency in a distributed storage serviceMarkus Tauber, Graham N. C. Kirby, Alan Dearle. 1109-1115 [doi]
- Introducing automated management through iteratively increased automation and indicatorsBarry McLarnon, Philip Robinson, Peter Milligan, Paul Sage. 1116-1121 [doi]
- GSQR: A generic service quality reporting protocol for terminalsLiam Fallon, Yangcheng Huang. 1122-1128 [doi]
- UML visualization of YANG modelsStefan Wallin. 1129-1134 [doi]
- Situated vs. global aggregation schemes for autonomous management systemsRafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti. 1135-1139 [doi]
- Adopting the DSM paradigm: Defining federation scenarios through resource brokers for experimentally driven researchChristos Tranoris. 1140-1147 [doi]
- Explicit federal relationship management to support semantic integrationRob Brennan, Kevin Feeney, Brian Walsh, Hendrik Thomas, Declan O Sullivan. 1148-1155 [doi]
- A component-based orchestration management framework for multidomain SOAFrançoise Baude, Virginie Legrand Contes. 1156-1163 [doi]
- Analysis of cooperative management strategies against route-hijackingOsamu Akashi. 1164-1171 [doi]
- Improving the efficiency of collaborative work with trust managementXingyu Zheng, Patrick Maillé, Cam Tu Phan Le, Stephane Morucci. 1172-1179 [doi]
- Conflict analysis during authoring of management policies for federationsJason Barron, Steven Davy, Brendan Jennings. 1180-1187 [doi]
- Extension for information card systems to achieve User-Controlled Automated Identity DelegationThorsten Höllrigl, Holger Kühner, Jochen Dinger, Hannes Hartenstein. 1188-1191 [doi]
- Trust management of XMPP federationSimon N. Foley, Wayne Mac Adams. 1192-1195 [doi]
- Heterogeous resource description and management in generic resource federation frameworksSebastian Wahle, Thomas Magedanz, Shane Fox, Eamonn Power. 1196-1199 [doi]
- Inherently self-managed networks: Requirements, properties and an initial modelMartin Johnsson, Brendan Jennings, Dmitri Botvich. 1200-1207 [doi]
- A distributed network monitoring framework for wireless networksRoberto Riggio, Matteo Gerola, Daniele Miorandi, Andrea Zanardi, François Jan. 1208-1215 [doi]
- Network virtualization in GpENI: Framework, implementation & integration experienceRamkumar Cherukuri, Xuan Liu, Andy Bavier, James P. G. Sterbenz, Deep Medhi. 1216-1223 [doi]
- Towards a compelling new Internet platformDavid Hausheer, Abhay Parekh, Jean C. Walrand, Galina Schwartz. 1224-1227 [doi]
- OSLAM: Towards ontology-based SLA management for IPTV servicesSin-Seok Seo, Arum Kwon, Joon-Myung Kang, James Won-Ki Hong. 1228-1234 [doi]
- Managing federations of virtualized infrastructures: A semantic-aware policy based approachLeonidas Lymberopoulos, Paola Grosso, Chrysa A. Papagianni, Dimitrios Kalogeras, Georgios Androulidakis, Jeroen van der Ham, Cees de Laat, Vasilis Maglaris. 1235-1242 [doi]
- Optimized network utilisation through buffering in PCN enabled multimedia access networksKlaas Roobroeck, Steven Latré, Tim Wauters, Filip De Turck. 1243-1249 [doi]
- Context-aware characterisation of energy consumption in data centresCathryn Peoples, Gerard Parr, Sally I. McClean. 1250-1257 [doi]