Abstract is missing.
- Bypassing Cloud Providers' data validation to store arbitrary dataGuilherme Sperb Machado, Fabio Victora Hecht, Martin Waldburger, Burkhard Stiller. 1-8 [doi]
- Cost aware fault recovery in cloudsAssaf Israel, Danny Raz. 9-17 [doi]
- VDC Planner: Dynamic migration-aware Virtual Data Center embedding for cloudsMohamed Faten Zhani, Qi Zhang, Gwendal Simon, Raouf Boutaba. 18-25 [doi]
- Network virtualization over heterogeneous federated infrastructures: Data plane connectivityChristos Argyropoulos, Georgios Androulidakis, Dimitrios Kalogeras, Blazej Pietrzak, Bartosz Belter, Leonidas Lymberopoulos, Vasilis Maglaris. 26-33 [doi]
- Federation-less-federation of network-virtualization platformsYasusi Kanada, Toshiaki Tarui, Kei Shiraishi. 34-41 [doi]
- An intent-based approach for network virtualizationRami Cohen, Katherine Barabash, Benny Rochwerger, Liran Schour, Daniel Crisan, Robert Birke, Cyriel Minkenberg, Mitchell Gusat, Renato Recio, Vinit Jain. 42-50 [doi]
- Optimal scheduling in the hybrid-cloudMark Shifrin, Rami Atar, Israel Cidon. 51-59 [doi]
- Dynamic SLA based elastic cloud service management: A SaaS perspectiveBipin B. Nandi, Ansuman Banerjee, Sasthi C. Ghosh, Nilanjan Banerjee. 60-67 [doi]
- Cost-aware scheduling of deadline-constrained task workflows in public cloud environmentsHendrik Moens, Koen Handekyn, Filip De Turck. 68-75 [doi]
- Morpheus: Learning configurations by exampleDeepak Jeswani, Rahul Balani, Akshat Verma, Kamal Bhattacharya. 76-84 [doi]
- RPO: Runtime web server optimization under simultaneous multithreadingSamira Musabbir, Diwakar Krishnamurthy, Giuliano Casale. 85-92 [doi]
- Getting more for less in optimized MapReduce workflowsZhuoyao Zhang, Ludmila Cherkasova, Boon Thau Loo. 93-100 [doi]
- An efficient approach to multi-level route analyticsAng Chen, Edmond W. W. Chan, Xiapu Luo, Waiting W. T. Fok, Rocky K. C. Chang. 101-108 [doi]
- A query language for network searchMisbah Uddin, Rolf Stadler, Alexander Clemm. 109-117 [doi]
- Identifying the root cause of failures in IT changes: Novel strategies and trade-offsRicardo Luis dos Santos, Juliano Araujo Wickboldt, Bruno Lopes Dalmazo, Lisandro Zambenedetti Granville, Luciano Paschoal Gaspary, Roben Castagna Lunardi. 118-125 [doi]
- Synthetic incident generation in the reenactment of IT support organization behaviorClaudio Bartolini, Cesare Stefanelli, Mauro Tortonesi. 126-133 [doi]
- Recommending resolutions for problems identified by monitoringLiang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik. 134-142 [doi]
- Quality improvement and quantitative modeling - Using mashups for human error preventionCarlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Larisa Shwartz, Nikos Anerousis, David Loewenstern. 143-150 [doi]
- The right tool for the job: Switching data centre management strategies at runtimeGraham Foster, Gastón Keller, Michael Tighe, Hanan Lutfiyya, Michael Bauer. 151-159 [doi]
- Static validation of network device configurations in virtualized multi-tenant datacentersYosuke Himura, Yoshiko Yasuda. 160-168 [doi]
- Paradigm-based adaptive provisioning in virtualized data centersRafael Pereira Esteves, Lisandro Zambenedetti Granville, Hadi Bannazadeh, Raouf Boutaba. 169-176 [doi]
- On tackling virtual data center embedding problemMd. Golam Rabbani, Rafael Pereira Esteves, Maxim Podlesny, Gwendal Simon, Lisandro Zambenedetti Granville, Raouf Boutaba. 177-184 [doi]
- Managed hybrid storage for home and SOHO environmentsTiago Cruz, Paulo Simões, João Rodrigues, Edmundo Monteiro, Fernando Bastos. 185-193 [doi]
- Distributed firewall anomaly detection through LTL model checkingSylvain Hallé, Eric Lunaud Ngoupe, Roger Villemaire, Omar Cherkaoui. 194-201 [doi]
- PReSET: A toolset for the evaluation of network resilience strategiesAlberto E. Schaeffer Filho, Andreas Mauthe, David Hutchison, Paul Smith, Yue Yu, Michael Fry. 202-209 [doi]
- MonoScope: Automating network faults diagnosis based on active measurementsWaiting W. T. Fok, Xiapu Luo, Ricky K. P. Mok, Weichao Li, Yujing Liu, Edmond W. W. Chan, Rocky K. C. Chang. 210-217 [doi]
- Performance comparison of not-via addresses and maximally redundant trees (MRTs)Michael Menth, Wolfgang Braun. 218-225 [doi]
- Dynamic risk-aware routing for OSPF networksBruno Vidalenc, Laurent Ciavaglia, Ludovic Noirie, Eric Renault. 226-234 [doi]
- OCCASIO: An operable concept for confidential and secure identity outsourcingJens Köhler, Hannes Hartenstein. 235-243 [doi]
- A formal approach for network security management based on qualitative risk analysisMohammad Ashiqur Rahman, Ehab Al-Shaer. 244-251 [doi]
- Evaluating third-party Bad Neighborhood blacklists for Spam detectionGiovane Cesar Moreira Moura, Anna Sperotto, Ramin Sadre, Aiko Pras. 252-259 [doi]
- ASMATRA: Ranking ASs providing transit service to malware hostersCynthia Wagner, Jérôme François, Radu State, Alexandre Dulaunoy, Thomas Engel, Gilles Massen. 260-268 [doi]
- A component-based performance comparison of four hypervisorsJinho Hwang, Sai Zeng, Frederick Wu, Timothy Wood. 269-276 [doi]
- Maximizing server utilization while meeting critical SLAs via weight-based collocation managementSergey Blagodurov, Daniel Gmach, Martin F. Arlitt, Yuan Chen, Chris Hyser, Alexandra Fedorova. 277-285 [doi]
- Achieving sub-second downtimes in internet-wide virtual machine live migrations in LISP networksPatrick Raad, Giulio Colombo, Dung Phung Chi, Stefano Secci, Antonio Cianfrani, Pascal Gallard, Guy Pujolle. 286-293 [doi]
- Resource contention detection and management for consolidated workloadsJoydeep Mukherjee, Diwakar Krishnamurthy, Jerry Rolia, Chris Hyser. 294-302 [doi]
- PseudoApp: Performance prediction for application migration to cloudByung-Chul Tak, Chunqiang Tang, Hai Huang, Long Wang. 303-310 [doi]
- Leveraging OpenFlow for resource placement of virtual desktop cloud applicationsPrasad Calyam, Sudharsan Rajagopalan, Arunprasath Selvadhurai, Mohan Saravanan, Aishwarya Venkataraman, Alex Berryman, Rajiv Ramnath. 311-319 [doi]
- What to discover before migrating to the cloudKun Bai, Niyu Ge, Hani Jamjoom, Ea-Ee Jan, Lakshmi Renganarayana, Xiaolan Zhang. 320-327 [doi]
- BonaFide: A traffic shaping detection tool for mobile networksVitali Bashko, Nikolay Melnikov, Anuj Sehgal, Jürgen Schönwälder. 328-335 [doi]
- Load-aware self-configuration in mobile peer-to-peer applicationsDiego N. da Hora, Daniel F. Macedo, José Marcos S. Nogueira. 336-343 [doi]
- Characterizing smart phone traffic: A mobile carrier's perspectiveMahmoud Taghizadeh, Haiyong Xie, Cheng He, Gong Zhang. 344-351 [doi]
- Gateway selection in hybrid wireless networks through cooperative probingBong-Jun Ko, Sisi Liu, Murtaza Zafer, Ho Yin Starsky Wong, Kang-Won Lee. 352-360 [doi]
- Exploiting user context information for energy management in enterprise femtocell networksKonstantinos Samdanis, Marcus Schoeller. 361-368 [doi]
- Energy-aware adaptive network resource managementMarinos Charalambides, Daphné Tuncer, Lefteris Mamatas, George Pavlou. 369-377 [doi]
- Energy-saving routing algorithm using Steiner treeHiroshi Matsuura. 378-386 [doi]
- Make it green and useful: Reshaping puzzles for identity management in large-scale distributed systemsWeverton Luis da Costa Cordeiro, Flavio Roberto Santos, Marinho P. Barcellos, Luciano Paschoal Gaspary. 387-394 [doi]
- Assuring trustworthiness of sensor data for cyber-physical systemsBjörn Stelte, Gabi Dreo Rodosek. 395-402 [doi]
- A framework for managing the selection of spatiotemporally relevant information providersGeorgios Tychogiorgos, Chatschik Bisdikian. 403-410 [doi]
- Detecting job interference in large distributed multi-agent systems - A formal approachWenjie Lin, Michael McGrath, Ingy Ramzy, Ten-Hwang Lai, David Lee. 411-418 [doi]
- On the merits of SVC-based HTTP Adaptive StreamingJeroen Famaey, Steven Latré, Niels Bouten, Wim Van de Meerssche, Bart De Vleeschauwer, Werner Van Leekwijck, Filip De Turck. 419-426 [doi]
- Analysis of content charge by ISPsNoriaki Kamiyama, Ryoichi Kawahara. 427-434 [doi]
- Slowing down to speed up: Mitigating collusion attacks in Content Distribution SystemsFlavio Santos, Weverton Luis da Costa Cordeiro, Marinho P. Barcellos, Luciano Paschoal Gaspary, Fabio Victora Hecht, Burkhard Stiller. 435-442 [doi]
- CloudView: Enabling tenants to monitor and control their cloud instantiationsPuneet Sharma, Sarbajit Chatterjee, Deepti Sharma. 443-449 [doi]
- Rethinking cloud platforms: Network-aware flexible resource allocation in IaaS cloudsJuliano Araujo Wickboldt, Lisandro Zambenedetti Granville, Fabian Schneider, Dominique Dudkowski, Marcus Brunner. 450-456 [doi]
- Dynamic SLA management with forecasting using multi-objective optimizationAlexandru-Florian Antonescu, Philip Robinson, Torsten Braun. 457-463 [doi]
- Navigating the clouds with a MAPMark Shtern, Bradley Simmons, Michael Smit, Marin Litoiu. 464-470 [doi]
- Improving present security through the detection of past hidden vulnerable statesMartín Barrère, Remi Badonnel, Olivier Festor. 471-477 [doi]
- A semantic firewall for Content-Centric NetworkingDavid Goergen, Thibault Cholez, Jérôme François, Thomas Engel. 478-484 [doi]
- Guaranteeing confidentiality in multi-domain networks: The PCE Anomaly Detector (PAD)Molka Gharbaoui, Francesco Paolucci, Alessio Giorgetti, Piero Castoldi, Barbara Martini. 485-491 [doi]
- NEOD: Network Embedded On-line Disaster management framework for Software Defined NetworkingSejun Song, Sungmin Hong, Xinjie Guan, Baek-Young Choi, Changho Choi. 492-498 [doi]
- Provisioning of requests for virtual machine sets with placement constraints in IaaS cloudsLei Shi, Bernard Butler, Dmitri Botvich, Brendan Jennings. 499-505 [doi]
- Balancing the load across virtual links from virtual machine requests in Distributed CloudsGlauco Estacio Gonçalves, André Vitor de Almeida Palhares, Marcelo Anderson Batista dos Santos, Patricia Takako Endo, Judith Kelner, Djamel Sadok. 506-512 [doi]
- Improving virtual machines networking performance for cloud computingManel Bourguiba, Inès El Korbi, Kamel Haddadou, Guy Pujolle. 513-519 [doi]
- An architecture for virtualized home gatewaysTiago Cruz, Paulo Simões, Nuno Reis, Edmundo Monteiro, Fernando Bastos. 520-526 [doi]
- Discovering service dependencies in mobile ad hoc networksPetr Novotný, Alexander L. Wolf, Bong-Jun Ko. 527-533 [doi]
- A framework for integrated configuration management toolsBart Van Brabant, Wouter Joosen. 534-540 [doi]
- A statistical machine learning approach for ticket mining in IT service deliveryEa-Ee Jan, Jian Ni, Niyu Ge, Naga Ayachitula, Xiaolan Zhang. 541-546 [doi]
- Design of a management infrastructure for smart grid pilot data processing and analysisMatthias Strobbe, Tom Verschueren, Stijn Melis, Dieter Verslype, Kevin Mets, Filip De Turck, Chris Develder. 547-553 [doi]
- Image transfer optimization for agile developmentAlexei Karve, Andrzej Kochut. 554-560 [doi]
- NCP: Service replication in data centers through software defined networkingVijay Mann, Kalapriya Kannan, Anilkumar Vishnoi, Aakash Iyer. 561-567 [doi]
- Effective resource control strategies using OpenFlow in cloud data centerDavide Adami, Barbara Martini, Molka Gharbaoui, Piero Castoldi, Gianni Antichi, Stefano Giordano. 568-574 [doi]
- Software bundling selection for Cloud virtual machine imagesMarco Aurélio Stelmar Netto, Marcos Dias de Assunção. 575-581 [doi]
- Cache-aware routing in Information-Centric NetworksVasilis Sourlas, Paris Flegkas, Leandros Tassiulas. 582-588 [doi]
- Viewing YouTube from a metropolitan area: What do users accessing from residential ISPs experience?Parikshit Juluri, Louis Plissonneau, Yong Zeng, Deep Medhi. 589-595 [doi]
- Evaluation of a policy-based network management system for energy-efficiencyGuilherme C. Januario, Carlos H. A. Costa, Marcelo C. Amarai, Ana C. Riekstin, Tereza Cristina M. B. Carvalho, Catalin Meirosu. 596-602 [doi]
- Power-effiicent resource allocation in MapReduce clustersKaiqi Xiong, Yuxiong He. 603-608 [doi]
- VCG auction-based approach for efficient Virtual Network embeddingAbdallah Jarray, Ahmed Karmouch. 609-615 [doi]
- An experimental study on dynamic network reconfiguration in a virtualized network environment using autonomic managementXuan Liu, Parikshit Juluri, Deep Medhi. 616-622 [doi]
- CSS-VM: A centralized and semi-automatic system for VLAN managementFuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Siyang Wang, Ning Jiang. 623-629 [doi]
- Dynamic CPU scheduling for QoS provisioningKostas Katsalis, Georgios S. Paschos, Leandros Tassiulas, Yannis Viniotis. 630-635 [doi]
- Nine years of observing traffic anomalies: Trending analysis in backbone networksYoungjoon Won, Romain Fontugne, Kenjiro Cho, Hiroshi Esaki, Kensuke Fukuda. 636-642 [doi]
- NFQL: A tool for querying network flow recordsVaibhav Bajpai, Johannes Schauer, Jürgen Schönwälder. 643-649 [doi]
- Constraint conditions to eliminate AS incentive of lying in interdomain routingJian Jiang, Junzhou Luo, Wei Li 0017, You Lu. 650-656 [doi]
- Enhanced OSPF Graceful RestartCarole Hounkonnou, Eric Fabre. 657-663 [doi]
- SAVI testbed: Control and management of converged virtual ICT resourcesJoon-Myung Kang, Hadi Bannazadeh, Alberto Leon-Garcia. 664-667 [doi]
- Methods for rapidly testing node reachability on multiple virtual private networks and evaluationNaoki Tateishi, Naoyuki Tanji, Mitsuho Tahara, Hikaru Seshake. 668-671 [doi]
- Reliability-aware controller placement for Software-Defined NetworksYannan Hu, Wendong Wang, Xiangyang Gong, Xirong Que, Shiduan Cheng. 672-675 [doi]
- A redesign methodology for storage management virtualizationTahani Hussain, Sami Habib. 676-679 [doi]
- OpenFlow: Why latency does matterKevin Phemius, Mathieu Bouet Thales. 680-683 [doi]
- Flow count: A CDN dynamic Replica Placement Algorithm for cross traffic optimizationMoisés Rodrigues, André Moreira, Márcio Neves, Emani Azevedo, Djamel Sadok, Arthur C. Callado, Victor Souza. 684-687 [doi]
- Enhancing network management frameworks with SDN-like controlPuneet Sharma, Sujata Banerjee, Sébastien Tandel, Renato Aguiar, Raphael Amorim, David Pinheiro. 688-691 [doi]
- Network Virtualization: A step closer for seamless resource mobilityMárcio Melo, Jorge Carapinha, Susana Sargento. 692-695 [doi]
- Towards opportunistic flow management in OpenFlowSeung-Il Moon, Rossi Kamal, Choong Seon Hong, Sungwon Lee. 696-699 [doi]
- Emulated and software defined networking convergenceMarcos F. Schwarz, Marco A. T. Rojas, Charles Miers, Fernando F. Redigolo, Tereza Cristina M. B. Carvalho. 700-703 [doi]
- A new service platform unifying network control and its prototypingMasanori Yamazaki, Yuya Inoue, Yusuke Hirota, Kazuhiko Kinoshita, Hideki Tode, Koso Murakami. 704-707 [doi]
- RDStore: In-network resource datastore with distributed processing of resource graphMasanori Miyazawa, Michiaki Hayashi. 708-711 [doi]
- Runtime configuration validation for self-configurable systemsLudi Akue, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla. 712-715 [doi]
- Aesop: A semantic system for autonomic management of end-user service qualityLiam Fallon, Declan O'Sullivan. 716-719 [doi]
- Performance of self-adapting power-saving algorithms for ICT systemsPaul J. Kühn, Maggie Mashaly. 720-723 [doi]
- A scheme for adaptive self-diagnosis of QoS degradation in future networksPanagiotis Spapis, Panagiotis Theodoropoulos, George Katsikas, Nancy Alonistioti, Stylianos Georgoulas. 724-727 [doi]
- Delay-tolerant management using self-∗ properties and P2P technologyJéferson Campos Nobre, Pedro Arthur Pinheiro Rosa Duarte, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 728-731 [doi]
- Large-scale E-maintenance: A new frontier for management?Roberto Lazzarini, Cesare Stefanelli, Mauro Tortonesi. 732-735 [doi]
- Selecting measurement paths for efficient network monitoring on a user-cooperative schemeAtsuo Tachibana, Shigehiro Ano, Masato Tsuru. 736-739 [doi]
- Lightweight discovery and exchange of network information in distributed network managementLucas Guardalben, Tomé Gomes, Rui Sousa, Paulo Salvador, Susana Sargento. 740-743 [doi]
- Towards interoperability of energy management systems using flexibility through conceptual modelingFrens Jan Rumph, George B. Huitema, Jack Verhoosel. 744-747 [doi]
- FTTH network design under power budget constraintsAnis Ouali, Kin Fai Poon, Andrej Chu. 748-751 [doi]
- Adaptive signatures of soft-failures in end-user devices using aggregated TCP statisticsChathuranga Widanapathirana, Jonathan C. Li, Milosh V. Ivanovich, Paul G. Fitzpatrick, Y. Ahmet Sekercioglu. 752-755 [doi]
- Building NETCONF-enabled network management systems with libnetconfRadek Krejcí. 756-759 [doi]
- A recommender-system for telecommunications network management actionsJohn Keeney, Sven van der Meer, Gabriel Hogan. 760-763 [doi]
- IT Services Reference CatalogNelson Gama, Maria do Mar Rosa, Miguel Mira da Silva. 764-767 [doi]
- Integrating heterogeneous IT/network management models using linked dataKenichi Ogaki, Masanori Miyazawa, Michiaki Hayashi, Shinichi Kadono. 768-771 [doi]
- Compliance aware cross-organization medical record sharingJovan Stevovic, Fabio Casati, Bilal Farraj, Jun Li, Hamid R. Motahari Nezhad, Giampaolo Armellin. 772-775 [doi]
- Rational Policy System for Network ManagementChristoph Frenzel, Henning Sanneck, Bernhard Bauer. 776-779 [doi]
- Semantic web technologies to aid dominance detection for access control policiesJason Barron, Steven Davy. 780-783 [doi]
- A behavior based policy management for adaptive trustworthiness assignment in future networkAkira Wada, Yasuhiro Sato, Xuan Liu, Tianyi Xing, Shingo Ata, Deep Medhi, Dijiang Huang, Ikuo Oka. 784-787 [doi]
- Predictive network traffic engineering for streaming video serviceHaruhisa Hasegawa, Shouji Kouno, Akihiro Shiozu, Masaaki Sasaki, Shinsuke Shimogawa. 788-791 [doi]
- Selecting the most suited cache strategy for specific streaming media workloadsMárcio Neves, Moisés Rodrigues, Ernani Azevedo, Djamel Sadok, Arthur C. Callado, Josilene Moreira, Victor Souza. 792-795 [doi]
- ISP-driven practical P2P traffic control techniqueHyunYong Lee, Akihiro Nakao. 796-799 [doi]
- On the impact of packet sampling on Skype traffic classificationPedro M. Santiago del Río, D. Corral, José Luis García-Dorado, Javier Aracil. 800-803 [doi]
- Design of an emulation framework for evaluating large-scale open content aware networksSteven Latré, Jeroen Famaey, Tim Wauters, Werner Van Leekwijck, Filip De Turck. 804-807 [doi]
- Improving the security of Android inter-component communicationAdam Cozzette, Kathryn Lingel, Steve Matsumoto, Oliver Ortlieb, Jandria Alexander, Joseph Betser, Luke Florer, Geoff Kuenning, John Nilles, Peter L. Reiher. 808-811 [doi]
- MuSIC: An IT security architecture for inter-community cloudsGabi Dreo Rodosek, Mario Golling, Wolfgang Hommel. 812-815 [doi]
- Overcoming DNSSEC performance issues with DHT-based architecturesDaniel Migault, Stanislas Francfort, Stéphane Sénécal, Emmanuel Herbert, Maryline Laurent. 816-819 [doi]
- Byzantine Robustness for future inter-domain routing security through integrated management planeVahid Heydari Famit Tafreshi, Haitham S. Cruickshank, Zhili Sun. 820-823 [doi]
- Routing tables building methods for increasing DNS(SEC) resolving platforms efficiencyEmmanuel Herbert, Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Maryline Laurent. 824-827 [doi]
- A key management scheme for Content Centric NetworkingSarmad Ullah Khan, Thibault Cholez, Thomas Engel, Luciano Lavagno. 828-831 [doi]
- On the automatic establishment of security relations for devicesNicolai Kuntze, Carsten Rudolph. 832-835 [doi]
- On differentiating cyber-insurance contracts a topological perspectiveRanjan Pal, Pan Hui. 836-839 [doi]
- Personalized radio: Using an integrated management system to uniquely personalize radio contentChristopher Ward, Raymond Lowe, Terry Smith, Bob Law. 840-843 [doi]
- A management suite for a disruption-tolerant wireless network testbedKerry Veenstra, Katia Obraczka, Wade Gobel, Daniel Olivares, Vladislav Petkov. 844-847 [doi]
- A novel self-organized optimization for wireless network nodes CAC mechanismLei Feng, Wenjing Li, Xuesong Qiu. 848-851 [doi]
- Autonomic learning through stochastic games for rational allocation of scarce medical resourcesRossi Kamal, Choong Seon Hong, Mi-Jung Choi. 852-855 [doi]
- Data-centric programming environment for cooperative applications in WSNShunsuke Mori, Takaaki Umedu, Akihito Hiromori, Hirozumi Yamaguchi, Teruo Higashino. 856-859 [doi]
- Architecture design for management as a service cloudCong Xu, Jiahai Yang, Xiao Ling, Yuding Wang, Liyao Li. 860-863 [doi]
- MicroCloud-based network traffic monitoringLuca Deri, Francesco Fusco. 864-867 [doi]
- Differentiating data collection for cloud environment monitoringYou Meng, Zhongzhi Luan, Zhendong Cheng, Depei Qian. 868-871 [doi]
- Scheduling heterogeneous MapReduce jobs for efficiency improvement in enterprise clustersYi Yao, Jianzhe Tai, Bo Sheng, Ningfang Mi. 872-875 [doi]
- Energy aware scheduling across 'green' cloud data centresCathryn Peoples, Gerard Parr, Sally I. McClean, Philip J. Morrow, Bryan W. Scotney. 876-879 [doi]
- Scale-out architecture for service order processing systemsMasafumi Shimizu, Hikotoshi Nakazato, Hikaru Seshake. 880-883 [doi]
- When cloud virtual machine images need to be updatedMarco Aurélio Stelmar Netto, Marcos Dias de Assunção. 884-887 [doi]
- Network-aware coordination of virtual machine migrations in enterprise data centers and cloudsHaifeng Chen, Hui Kang, Guofei Jiang, Yueping Zhang. 888-891 [doi]
- Global enterprise cloud transformation: Centralize, distribute or federate?David Breitgand, Alex Glikson. 892-895 [doi]
- Detecting software aging in a cloud computing framework by comparing development versionsFelix Langner, Artur Andrzejak. 896-899 [doi]
- Migrating medical communications software to a multi-tenant cloud environmentPieter-Jan Maenhaut, Hendrik Moens, Marino Verheye, Piet Verhoeve, Stefan Walraven, Eddy Truyen, Wouter Joosen, Veerle Ongenae, Filip De Turck. 900-903 [doi]
- MiceTrap: Scalable traffic engineering of datacenter mice flows using OpenFlowRamona Trestian, Gabriel-Miro Muntean, Kostas Katrinis. 904-907 [doi]
- Self-provisioning of network infrastructure for server landings in complex data center environmentsPatrick Apel, Greg Botts, Alex Fullam. 912-915 [doi]
- Universal Script Wrapper - An innovative solution to manage endpoints in large and heterogeneous environmentSai Zeng, Shang Guo, Frederick Wu, Constantin Adam, Long Wang, Cashchakanithara Venugopal, Rajeev Puri, Ramesh Palakodeti. 916-919 [doi]
- Towards user-aware Peer-to-Peer live video streaming systemsIhsan Ullah, Guillaume Doyen, Dominique Gaïti. 920-926 [doi]
- Federated and autonomic management of multimedia servicesJeroen Famaey, Filip De Turck. 927-933 [doi]
- A management framework for residential broadband environmentsTiago Cruz, Paulo Simões. 934-940 [doi]
- Quality of Service analysis of Internet links with minimal informationFelipe Mata, Javier Aracil. 941-947 [doi]
- Data center resource management with temporal dynamic workloadHaiyang Qian, Deep Medhi. 948-954 [doi]
- Design and management of collaborative intrusion detection networksCarol J. Fung, Raouf Boutaba. 955-961 [doi]
- Investigating event log analysis with minimum apriori informationAdetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. 962-968 [doi]
- FRA: Financial Risk Analytics for IT Outsourcing contractsSinem Guven, Shu Tao, Sherif Goma. 969-983 [doi]
- Assessing service deployment readiness using enterprise crowdsourcingMaja Vukovic, Jim Laredo, Yaoping Ruan, Milton Hernandez, Sriram Rajagopal. 984-989 [doi]
- Presence based open contact center leveraging social networksArup Acharya, Justin Manweiler, Shachi Sharma, Nilanjan Banerjee. 990-1003 [doi]
- A language driven approach to multi-system access controlSteven Davy, Jason Barron, Lei Shi, Bernard Butler, Brendan Jennings, Keith Griffin, Kevin Collins. 1004-1008 [doi]
- Multi-vendor auto-connectivity in heterogeneous networksPéter Szilágyi, Henning Sanneck. 1009-1014 [doi]
- Large-scale geolocation for NetFlowPavel Celeda, Petr Velan, Martin Rabek, Rick Hofstede, Aiko Pras. 1015-1020 [doi]
- Practical experience with IPFIX flow collectorsPetr Velan. 1021-1026 [doi]
- A system for monitoring mobile networks using performance management eventsSajeevan Achuthan, Jimmy O'Meara. 1027-1041 [doi]
- Pattern detection in unstructured data: An experience for a virtualized IT infrastructureMazda A. Marvasti, Arnak V. Poghosyan, Ashot N. Harutyunyan, Naira Grigoryan. 1048-1053 [doi]
- Workload analysis and demand prediction for the HP ePrint ServiceVipul Garg, Ludmila Cherkasova, Swaminathan Packirisami, Jerome A. Rolia. 1054-1059 [doi]
- Benefits and challenges of managing heterogeneous data centersJinho Hwang, Sai Zeng, Frederick Wu, Timothy Wood. 1060-1065 [doi]
- A demonstration of automatic bootstrapping of resilient OpenFlow networksSachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet, Piet Demeester. 1066-1067 [doi]
- ACE: Automated capacity evaluation for HP ePrintVipul Garg, Ludmila Cherkasova, Swaminathan Packirisami, Jerome A. Rolia. 1068-1069 [doi]
- Real-time search in cloudsMisbah Uddin, Amy Skinner, Rolf Stadler, Alexander Clemm. 1070-1071 [doi]
- Maximizing server utilization while meeting critical SLAs via weight-based collocation managementSergey Blagodurov, Daniel Gmach, Martin F. Arlitt, Yuan Chen, Chris Hyser, Alexandra Fedorova. 1072-1073 [doi]
- Ovaldroid: An OVAL-based vulnerability assessment framework for AndroidMartín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor. 1074-1075 [doi]
- Demo: Zero touch configurationNicolai Kuntze, Pedro Larbig, Carsten Rudolph. 1076-1077 [doi]
- A common performance monitoring system for Wi-Fi and 3GPP networksIcaro da Silva, Yu Wang, Filip Mestanov. 1078-1079 [doi]
- Distributed monitoring of self-configuring Virtual Private NetworksMichael Rossberg, Michael Grey, Markus Trapp, Franz Girlich, Guenter Schaefer. 1080-1081 [doi]
- QoE monitoring (QMON) demo proposalMarcus Eckert, Thomas Martin Knoll. 1082-1083 [doi]
- Managing Software-Driven Networks with a unified management frameworkNikolaos Koutsouris, Kostas Tsagkaris, Panagiotis Demestichas, Lefteris Mamatas, Stuart Clayman, Alex Galis. 1084-1085 [doi]
- Simulation and evaluation of network resilience with PReSETAlberto E. Schaeffer Filho, Andreas Mauthe, David Hutchison, Paul Smith, Yue Yu, Michael Fry. 1086-1087 [doi]
- Distributed Overlay Virtual Ethernet (DOVE) integration with OpenstackRami Cohen, Katherine Barabash, Liran Schour. 1088-1089 [doi]
- DCSim: A data centre simulation toolGastón Keller, Michael Tighe, Hanan Lutfiyya, Michael Bauer. 1090-1091 [doi]
- Conflict free coordination of SON functions in a Unified Management Framework: Demonstration of a proof of concept prototyping platformNikolaos Koutsouris, Kostas Tsagkaris, Panagiotis Demestichas, Zwi Altman, Richard Combes, Pierre Peloso, Laurent Ciavaglia, Lefteris Mamatas, Stuart Clayman, Alex Galis. 1092-1093 [doi]
- Probability-based adaptive forwarding strategy in named data networkingHaiyang Qian, Ravishankar Ravindran, Guoqiang Wang, Deep Medhi. 1094-1101 [doi]
- Information-centric networking based homenetRavishankar Ravindran, Trisha Biswas, Xinwen Zhang, Asit Chakraborti, Guoqiang Wang. 1102-1108 [doi]
- CCN & TCP co-existence in the future Internet: Should CCN be compatible to TCP?Stefan Braun, Massimo Monti, Manolis Sifalakis, Christian F. Tschudin. 1109-1115 [doi]
- Graph contraction based self-organizing networks for future InternetTae-Hwan Kim, Jung-Yeun Lee, Joon Heo, Sang Heum Cho. 1116-1121 [doi]
- Progressive virtual topology embedding in OpenFlow networksRoberto Riggio, Francesco De Pellegrini, Elio Salvadori, Matteo Gerola, Roberto Doriguzzi Corin. 1122-1128 [doi]
- Secure resource provisioning across multiple domainsToru Mano, Kimihiro Mizutani, Osamu Akashi. 1129-1134 [doi]
- A novel approach to accurately compute an IP traffic matrix using optical bypassMarcel Caria, Admela Jukan. 1135-1141 [doi]
- An approach to energy-efficient virtual network embeddingsAndreas Fischer, Michael Till Beck, Hermann de Meer. 1142-1147 [doi]
- Automated allocation and configuration of dual stack IP networksWilfried Daniels, Bart Van Brabant, Danny Hughes, Wouter Joosen. 1148-1153 [doi]
- A novel scheme for node failure recovery in virtualized networksHabib Abid, Nancy Samaan. 1154-1160 [doi]
- Collaborative selfish node detection with an incentive mechanism for opportunistic networksRadu-Ioan Ciobanu, Ciprian Dobre, Mihai Dascalu, Stefan Trausan-Matu, Valentin Cristea. 1161-1166 [doi]
- A platform for tenant network provisioning with provisioning templateYoji Ozawa, Yoshiko Yasuda, Yosuke Himura. 1167-1170 [doi]
- Using dynamic software variability to manage wireless sensor and actuator networksMary Luz Mouronte, Óscar Ortiz, Ana Belén García, Rafael Capilla. 1171-1174 [doi]
- A framework for SLA establishment of virtual networks based on QoS classesRafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira. 1175-1178 [doi]
- Topology reconfiguration in Wi-Fi home networksJoao Nogueira, Susana Sargento, Peter Steenkiste. 1179-1182 [doi]
- Describing commercial virtual networks: Requirement analysis and TMF SID-based solutionDavid P. Wagner, Sebastian Meier, Klaus Hoffmann, Franz Rambach. 1183-1186 [doi]
- Toward user-classified P2P IPTV systems: A persona-based approachIhsan Ullah, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti. 1187-1190 [doi]
- Towards early deployable Content-Centric Networking enhanced by using IPv6Shingo Ata, Hiroshi Kitamura, Masayuki Murata. 1191-1194 [doi]
- Towards the design of a platform for abuse detection in OSNs using multimedial data analysisThomas Vanhove, Philip Leroux, Tim Wauters, Filip De Turck. 1195-1198 [doi]
- RB-tracker: A fully distributed, replicating, network-, and topology-aware P2P CDNAndri Lareida, Thomas Bocek, Martin Waldburger, Burkhard Stiller. 1199-1202 [doi]
- CacheMule: A mobile-carried content location mechanismCédric Westphal. 1203-1206 [doi]
- ICEMAN: An architecture for secure federated inter-cloud identity managementGabi Dreo, Mario Golling, Wolfgang Hommel, Frank Tietze. 1207-1210 [doi]
- SARA: A tool for service levels - Aware contractsMario Alessandro Bochicchio, Antonella Longo, Sara Giacovelli. 1211-1217 [doi]
- An ontology-based approach for semantic interoperability in interorganizational IT service managementSilvia Knittl, David Schmitz. 1218-1224 [doi]
- Value cost impact analysis: Estimating the IT cost impact of business developmentsSusanne Magdalene-Glissmann, Heiko Ludwig. 1225-1232 [doi]
- Automatic optimization for a clustering based approach to support IT managementCan Bozdogan, A. Nur Zincir-Heywood, Yasemin Gokcen. 1233-1236 [doi]
- Managing customers' IT capabilities in IT outsourcing over time: A system dynamic approachTarcio R. Bezerra, Vera L. C. de Medeiros. 1237-1240 [doi]
- Adaptive and business-driven service placement in federated Cloud computing environmentsLuca Foschini, Mauro Tortonesi. 1245-1251 [doi]
- Robustness of comparison sequential test for the piloting in Service DeliveryYefim Haim Michlin, Genady Grabarnik, Larisa Shwartz, Ofer Shaham. 1252-1259 [doi]
- Towards value-based information security management monitoringAlberto S. Lima, José Neuman de Souza, E. C. Branco, Maristella Ribas. 1260-1267 [doi]
- Federated ICT for global supply chains: IT service management in cross-border tradeMatti Heikkurinen, Owen Appleton, Luca Urciuoli, Juha Hintsa. 1268-1275 [doi]
- A generic algorithm for mid-call audio codec switchingHaytham Assem, Mohamed Adel, Brendan Jennings, David Malone, Jonathan Dunne, Pat O'Sullivan. 1276-1281 [doi]
- Quality of experience driven control of interactive media stream parametersBert Vankeirsbilck, Tim Verbelen, Dieter Verslype, Nicolas Staelens, Filip De Turck, Piet Demeester, Bart Dhoedt. 1282-1287 [doi]
- Model for estimating QoE of video delivered using HTTP adaptive streamingJohan De Vriendt, Danny De Vleeschauwer, David C. Robinson. 1288-1293 [doi]
- Evaluation of full-reference objective video quality metrics on high efficiency video codingGlenn Van Wallendael, Sebastiaan Van Leuven, Jan De Cock, Peter Lambert, Rik Van de Walle, Nicolas Staelens, Piet Demeester. 1294-1299 [doi]
- Neurophysiological experimental facility for Quality of Experience (QoE) assessmentKhalil ur Rehman Laghari, Rishabh Gupta, Sebastian Arndt, Jan-Niklas Antons, Robert Schleicher, Sebastian Möller, Tiago H. Falk. 1300-1305 [doi]
- Video quality monitoring based on precomputed frame distortionsDominik Klein, Thomas Zinner, Stanislav Lange. 1306-1311 [doi]
- Optimized segmentation of H.264/AVC video for HTTP adaptive streamingJan Lievens, Shahid M. Satti, Nikos Deligiannis, Peter Schelkens, Adrian Munteanu. 1312-1317 [doi]
- Implementation and user-centric comparison of a novel adaptation logic for DASH with SVCChristian Sieber, Tobias Hoßfeld, Thomas Zinner, Phuoc Tran-Gia, Christian Timmerer. 1318-1323 [doi]
- Improving performance of H.264/AVC transmissions over vehicular networksIsmael Rozas-Ramallal, Tiago M. Fernández-Caramés, Adriana Dapena, Pedro A. Cuenca-Castillo. 1324-1327 [doi]
- Sampling in transform domain for improved QoE of 3D frame-compatible video codingJin Li, Jan De Cock, Peter Lambert, Rik Van de Walle. 1332-1335 [doi]
- No-reference algorithms for video quality assessment based on artifact evaluation in MPEG-2 and H.264 encoding standardsJ. P. Lopez, David Jiménez, Ana Cerezo, José Manuel Menéndez. 1336-1339 [doi]
- Design of a large-scale subjective test in the cinemaKatriina Kilpi, Wendy Van den Broeck, An Jacobs. 1340-1345 [doi]
- An eVoting platform for QoE evaluationJosé Luis Tornos, José Luis Salazar, Joan Josep Piles. 1346-1351 [doi]
- Quality of experience in remote virtual desktop servicesPedro Casas, Michael Seufert, Sebastian Egger, Raimund Schatz. 1352-1357 [doi]
- A chemical-inspired approach to design distributed rate controllers for packet networksMassimo Monti, Manolis Sifalakis, Thomas Meyer, Christian F. Tschudin, Marco Luise. 1358-1364 [doi]
- Autonomous resource provision in virtual data centersNoha Elprince. 1365-1371 [doi]
- An experimental design approach for link loss inference on large networksJuan Li, Yan Qiao, Guanjue Wang, Xuesong Qiu. 1372-1375 [doi]
- Adaptive REST applications via model inference and probabilistic model checkingCarlo Ghezzi, Mauro Pezzè, Giordano Tamburrelli. 1376-1382 [doi]
- Diagnosis of stochastic discrete event systems based on N-gram models with wildcard charactersKunihiko Hiraishi, Miwa Yoshimoto, Koichi Kobayashi. 1383-1388 [doi]
- Improving network services' resilience using independent configuration replicationMiguel Lopes, Antonio Costa, Bruno Dias. 1389-1392 [doi]
- Towards automatic network fault localization in real time using probabilistic inferenceAndreas Johnsson, Catalin Meirosu. 1393-1398 [doi]
- Minimizing the impact of delay on live SVC-based HTTP adaptive streaming servicesNiels Bouten, Steven Latré, Jeroen Famaey, Filip De Turck, Werner Van Leekwijck. 1399-1404 [doi]
- Synthesis of observers for autonomic evolutionary systems from requirements modelsJan-Philipp Steghöfer, Benedikt Eberhardinger, Florian Nafz, Wolfgang Reif. 1405-1408 [doi]
- Perron-Frobenius measure of systemic risk of cascading overload in complex clouds: Work in progressVladimir Marbukh. 1409-1412 [doi]
- Management engine using hierarchical role model: A new management platform for virtual networksWenyu Shen, Kenji Minato, Yukio Tsukishima, Katsuhiro Shimano. 1413-1418 [doi]