Abstract is missing.
- Latency-Sensitive Data Allocation for cloud storageSong Yang, Philipp Wieder, Muzzamil Aziz, Ramin Yahyapour, Xiaoming Fu 0001. 1-9 [doi]
- Welcome from the ChairsProsper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simóes. 1-2 [doi]
- Admission control of API requests in OpenStackTatsuma Matsuki, Noboru Iwamatsu. 10-18 [doi]
- Energy-efficient resource allocation and provisioning for in-memory database clustersKarsten Molka, Giuliano Casale. 19-27 [doi]
- Elastic, on-line and network aware Virtual Machine placement within a data centerFederico Larumbe, Brunilde Sansò. 28-36 [doi]
- Vantage point selection for IPv6 measurements: Benefits and limitations of RIPE Atlas tagsVaibhav Bajpai, Steffie Jacob Eravuchira, Jürgen Schönwälder, Robert Kisteleki, Emile Aben. 37-44 [doi]
- Mining causes of network events in log data with causal inferenceSatoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki. 45-53 [doi]
- ConMon: An automated container based network performance monitoring systemFarnaz Moradi, Christofer Flinta, Andreas Johnsson, Catalin Meirosu. 54-62 [doi]
- Predictive modeling and scalability analysis for large graph analyticsSourav Medya, Ludmila Cherkasova, Ambuj K. Singh. 63-71 [doi]
- Content Poisoning in Named Data Networking: Comprehensive characterization of real deploymentTan N. Nguyen, Xavier Marchal, Guillaume Doyen, Thibault Cholez, Rémi Cogranne. 72-80 [doi]
- Network defence strategy evaluation: Simulation vs. live networkJana Medková, Martin Husák, Martin Drasar. 81-88 [doi]
- A scalable approach for managing access control in Information Centric NetworksRafael Hansen da Silva, Weverton Luis da Costa Cordeiro, Luciano Paschoal Gaspary. 89-97 [doi]
- A cost-effective security management for clouds: A game-theoretic deception mechanismMohammad Taghi Adili, Amin Mohammadi, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman. 98-106 [doi]
- A distributed NFV orchestrator based on BDI reasoningFrederico Schardong, Ingrid Nunes, Alberto E. Schaeffer Filho. 107-115 [doi]
- ReViNE: Reallocation of Virtual Network Embedding to eliminate substrate bottlenecksShihabur Rahman Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba, Jeebak Mitra, Liu Liu. 116-124 [doi]
- Affinity measurement for NFV-enabled networks: A criteria-based approachArthur Selle Jacobs, Ricardo Luis dos Santos, Muriel Figueredo Franco, Eder John Scheid, Ricardo Jose Pfitscher, Lisandro Zambenedetti Granville. 125-133 [doi]
- A graph approach to placement of Service Functions ChainsNicolas Tastevin, Mathis Obadia, Mathieu Bouet. 134-141 [doi]
- Design and evaluation of a flexible Advance bandwidth Reservation Algorithm for media production networksMaryam Barshan, Hendrik Moens, Bruno Volckaert, Filip De Turck. 142-150 [doi]
- Abstracting .torrent content consumption into two-mode graphs and their projection to content networks (ConNet)Andri Lareida, Romana Pernischova, Bruno Bastos Rodrigues, Burkhard Stiller. 151-159 [doi]
- A transparent load balancing algorithm for heterogeneous Local Area NetworksTom De Schepper, Steven Latré, Jeroen Famaey. 160-168 [doi]
- Joint optimization of content placement and request redirection in Mobile-CDNJiayi Liu, Qinghai Yang, Gwendal Simon. 169-176 [doi]
- LMS: Label Management Service for intent-driven Cloud ManagementJoon-Myung Kang, Jeongkeun Lee, Vasudevan Nagendra, Sujata Banerjee. 177-185 [doi]
- INSpIRE: Integrated NFV-based Intent Refinement EnvironmentEder J. Scheid, Cristian Cleder Machado, Muriel Figueredo Franco, Ricardo Luis dos Santos, Ricardo J. Pfitscher, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville. 186-194 [doi]
- Securing communication in multiple Autonomous System domains with Software Defined NetworkingVijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula. 195-203 [doi]
- HyperExchange: A protocol-agnostic exchange fabric enabling peering of Virtual NetworksSaeed Arezoumand, Hadi Bannazadeh, Alberto Leon-Garcia. 204-212 [doi]
- A link failure recovery algorithm for Virtual Network Function chainingOussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. 213-221 [doi]
- ARES: An autonomic and resilient framework for smart gridsYona Lopes, Natalia Castro Fernandes, Débora Christina Muchaluat-Saade, Katia Obraczka. 222-229 [doi]
- Performance comparison of resilience mechanisms for stateless multicast using BIERWolfgang Braun, Manuel Albert, Toerless Eckert, Michael Menth. 230-238 [doi]
- Neev: A cognitive support agent for content improvement in hardware ticketsNishtha Madaan, Gautam Singh, Arun Kumar, Gargi Banerjee Dasgupta. 239-246 [doi]
- An effective swapping mechanism to overcome the memory limitation of SDN devicesAntonio Marsico, Roberto Doriguzzi Corin, Domenico Siracusa. 247-254 [doi]
- Software-defined traffic load balancing for cost-effective data center interconnection serviceYoung-Jin Kim, Jesse E. Simsarian, Marina Thottan. 255-262 [doi]
- Programming abstractions for wireless multicasting in software-defined enterprise WLANsEstefania Coronado, Roberto Riggio, José Villalón, Antonio Garrido. 263-271 [doi]
- CityFlow, enabling quality of service in the Internet: Opportunities, challenges, and experimentationSachin Sharma, David Palma, João Gonçalves, Dimitri Staessens, Nick Johnson, Charaka Palansuriya, Ricardo Figueiredo, Luís Cordeiro, Donal Morris, Adam Carter, Robert Baxter, Didier Colle, Mario Pickavet. 272-280 [doi]
- Using residual resource consumption to resample top-k monitoring reportsThomas Gschwind, Metin Feridun. 281-288 [doi]
- Decentralized monitoring for large-scale Software-Defined NetworksGioacchino Tangari, Daphné Tuncer, Marinos Charalambides, George Pavlou. 289-297 [doi]
- Time-series models for cloud workload prediction: A comparisonAbiola Adegboyega. 298-307 [doi]
- Learning behavioral fingerprints from Netflows using Timed AutomataGaetano Pellegrino, Qin Lin, Christian A. Hammerschmidt, Sicco Verwer. 308-316 [doi]
- A remote attestation infrastructure for verifying the application of software updatesKarthick Ramachandran, Hanan Lutfiyya. 317-325 [doi]
- On achieving high data availability in heterogeneous cloud storage systemsMouhamad Dieye, Mohamed Faten Zhani, Halima Elbiaze. 326-334 [doi]
- The actual cost of software switching for NFV chainingMarcelo Caggiani Luizelli, Danny Raz, Yaniv Sa'ar, Jose Yallouz. 335-343 [doi]
- Enabling service-centric networks for cloudlets using SDNAhmet Cihat Baktir, Atay Ozgovde, Cem Ersoy. 344-352 [doi]
- Layer-independent PCI assignment method for Ultra-Dense multi-layer co-channel mobile NetworksStephen S. Mwanje, Janne Ali-Tolppa. 353-360 [doi]
- An approximation of the backhaul bandwidth aggregation potential using a partial sharing schemeValentin Burger, Michael Seufert, Thomas Zinner, Phuoc Tran-Gia. 361-368 [doi]
- A GRASP based heuristic for Deployment Roadside Units in VANETsJoao F. M. Sarubbi, Tais R. Silva, Flávio V. C. Martins, Elizabeth F. Wanner, Cristiano M. Silva. 369-376 [doi]
- Client-side routing-agnostic gateway selection for heterogeneous Wireless Mesh NetworksEmmanouil Dimogerontakis, Joao Neto, Roc Meseguer, Leandro Navarro, Luis Veiga. 377-385 [doi]
- Adaptive service management for cloud applications using overlay networksNasim Beigi Mohammadi, Hamzeh Khazaei, Mark Shtern, Cornel Barna, Marin Litoiu. 386-392 [doi]
- Enabling L2 network programmability in multi-tenant cloudsThomas Lin, Byungchul Park, Hadi Bannazadeh, Alberto Leon-Garcia. 393-399 [doi]
- CloudSim Plus: A cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctnessManoel C. Silva Filho, Raysa L. Oliveira, Claudio C. Monteiro, Pedro R. M. Inácio, Mário M. Freire. 400-406 [doi]
- IP multicast in virtualized data centers: Challenges and opportunitiesOlufemi Komolafe. 407-413 [doi]
- Distributed Management Information ModelsLiam Fallon, John Keeney, Sven van der Meer. 414-420 [doi]
- FLIPPER: Fault-tolerant distributed network management and controlSubhrendu Chattopadhyay, Niladri Sett, Sukumar Nandi, Sandip Chakraborty. 421-427 [doi]
- Reinforcement learning based dynamic resource migration for virtual networksTakaya Miyazawa, Ved P. Kafle, Hiroaki Harai. 428-434 [doi]
- PrIXP: Preserving the privacy of routing policies at Internet eXchange PointsMarco Chiesa, Roberto di Lallo, Gabriele Lospoto, Habib Mostafaei, Massimo Rimondini, Giuseppe Di Battista. 435-441 [doi]
- ADE: An ensemble approach for early Anomaly DetectionTeodora Sandra Buda, Haytham Assem, Lei Xu. 442-448 [doi]
- The BitTorrent Peer Collector ProblemAndri Lareida, Tobias Hoßfeld, Burkhard Stiller. 449-455 [doi]
- Fault detection and diagnosis for solar-powered Wireless Mesh Networks using machine learningVinicius C. Ferreira, Ricardo C. Carrano, Joacir O. Silva, Célio Vinicius N. Albuquerque, Débora C. Muchaluat-Saade, Diego G. Passos. 456-462 [doi]
- Sharing performance measurement events across domainsKasper Apajalahti, Juha Niiranen, Shubham Kapoor, Vilho Räisänen. 463-469 [doi]
- Performance evaluation of OpenFlow data planesLeonardo C. Costa, Alex Borges Vieira, Erik de Britto e Silva, Daniel F. Macedo, Geraldo Gomes, Luiz Henrique A. Correia, Luiz Filipe M. Vieira. 470-475 [doi]
- Sharing data store and backup controllers for resilient control plane in multi-domain SDNJiacong Li, Ying Wang, Wenjing Li, Xuesong Qiu. 476-482 [doi]
- A Network Access Control solution combining OrBAC and SDNRafael Aschoff, Daniel Rosendo, Marcos Machado, Alexandre Santos, Djamel Sadok. 483-489 [doi]
- Using SDN congestion controls to ensure zero packet loss in storage area networksShie-Yuan Wang, Li Min Chen, Shih-Kai Lin, Liang-Chi Tseng. 490-496 [doi]
- Task assignment optimization in geographically distributed data centersBowu Zhang, Jinho Hwang. 497-502 [doi]
- SIMECA: SDN-based IoT Mobile Edge Cloud ArchitectureBinh Nguyen, Nakjung Choi, Marina Thottan, Jacobus E. van der Merwe. 503-509 [doi]
- Opportunistic fog computing: Feasibility assessment and architectural proposalRicardo Silva, Jorge Sá Silva, Fernando Boavida. 510-516 [doi]
- Cloudified mobility and bandwidth prediction in virtualized LTE networksZhongliang Zhao, Morteza Karimzadeh, Torsten Braun, Aiko Pras, Hans van den Berg. 517-523 [doi]
- A Web-based framework for fast synchronization of live video playersDries Pauwels, Jeroen van der Hooft, Stefano Petrangeli, Tim Wauters, Danny De Vleeschauwer, Filip De Turck. 524-530 [doi]
- Overlay routing for fast video transfers in CDNPaolo Medagliani, Stefano Paris, Jeremie Leguay, Lorenzo Maggi, Chuangsong Xue, Haojun Zhou. 531-536 [doi]
- MoViDiff: Enabling service differentiation for mobile video appsSatadal Sengupta, Vinay Kumar Yadav, Yash Saraf, Harshit Gupta, Niloy Ganguly, Sandip Chakraborty, Pradipta De. 537-543 [doi]
- Augmenting cloud architectures to support decentralized applicationsMichael Coughlin, Kelly Kaoudis, Eric Keller. 544-547 [doi]
- Adaptive auto-scaling for virtual resources in software-defined infrastructureMorteza Moghaddassian, Hadi Bannazadeh, Alberto Leon-Garcia. 548-551 [doi]
- Heterogeneous NetwOrk Policy Enforcement in data centersLin Cui, Fung Po Tso, Weijia Jia. 552-555 [doi]
- Locality based approach to improve propagation delay on the Bitcoin peer-to-peer networkMuntadher Fadhil Sallal, Gareth Owenson, Mo Adda. 556-559 [doi]
- SDN middlebox architecture for resilient transfersPradeeban Kathiravelu, Luís Veiga. 560-563 [doi]
- Valley times in the Spanish academic networkSergio Albandea, José Luis García-Dorado, David Muelas, Jorge E. López de Vergara, Javier Aracil. 564-567 [doi]
- SFC Path Tracer: A troubleshooting tool for Service Function ChainingRafael Anton Eichelberger, Tiago Ferreto, Sébastien Tandel, Pedro Arthur P. R. Duarte. 568-571 [doi]
- An analytical model for combined SDN Forwarding ElementQinglei Qi, Wendong Wang, Xiangyang Gong, Xirong Que. 572-575 [doi]
- Equivalent forwarding set evaluation in software defined networkingLiang Yang, Bryan Ng, Winston K. G. Seah, Lindsay Groves. 576-579 [doi]
- Network virtualization for Mobile Operators in Software-Defined based LTE networksOmer Narmanlioglu, Engin Zeydan. 580-583 [doi]
- Measurement correlation for improving cooperation in measurement federationsJéferson Campos Nobre, Leandro Lisboa Penz, Lisandro Zambenedetti Granville. 584-587 [doi]
- A traffic classification approach based on characteristics of subflows and ensemble learningChangyu Wang, Xiaohong Guan, Tao Qin. 588-591 [doi]
- Application of functional feature extraction to the compression of network time seriesDavid Muelas, José Luis García-Dorado, Jorge E. López de Vergara, Javier Aracil. 592-595 [doi]
- FM-Delta: Fault Management packet compressionTal Mizrahi, Yoram Revah, Yehonathan Refael Kalim, Elad Kapuza, Yuval Cassuto. 596-599 [doi]
- Risk assessment and optimization for key services in smart grid communication networkPuyuan Zhao, Xingyu Chen, Peng Yu, Wenjing Li, Xuesong Qiu, Shao-yong Guo. 600-603 [doi]
- Exchanging security events: Which and how many alerts can we aggregate?Martin Husák, Milan Cermák, Martin Lastovicka, Jan Vykopal. 604-607 [doi]
- Leveraging SDN to monitor critical infrastructure networks in a smarter wayRoberto di Lallo, Federico Griscioli, Gabriele Lospoto, Habib Mostafaei, Maurizio Pizzonia, Massimo Rimondini. 608-611 [doi]
- Rule-based technical management for the dependable operation of networked building automation systemsMalte Burkert, Joe Volmer, Heiko Krumm, Christoph Fiehe. 612-615 [doi]
- Hybrid Radio Frequency and Free Space Optical communication for 5G backhaulDa Feng, Weiqiang Sun, Weisheng Hu. 616-619 [doi]
- Fault-tolerant topology control for heterogeneous wireless sensor networks using Multi-Routing TreeGuizhen Ma, Yang Yang, Xuesong Qiu, Zhipeng Gao, He Li. 620-623 [doi]
- Instantaneous throughput prediction in cellular networks: Which information is needed?Alassane Samba, Yann Busnel, Alberto Blanc, Philippe Dooze, Gwendal Simon. 624-627 [doi]
- A handover statistics based approach for Cell Outage Detection in self-organized Heterogeneous NetworksTao Zhang, Lei Feng, Peng Yu, Shaoyong Guo, Wenjing Li, Xuesong Qiu. 628-631 [doi]
- DTRF: A dynamic-trust-based recruitment framework for Mobile Crowd Sensing systemYali Gao, Xiaoyong Li, Jirui Li, Yunquan Gao. 632-635 [doi]
- Ensuring two routes connectivity in mobile ad hoc networks with Random Waypoint mobilityTareq Hayajna, Miochdel Kaldoching. 636-639 [doi]
- A New ICN routing selecting algorithm based on Link Expiration Time of VANET under the highway environmentHui Guo, Lanlan Rui, Ruichang Shi, Haoqiu Huang, Xuesong Qiu. 640-643 [doi]
- QoS-aware virtual SDN network planningJunchao Wang, Cees de Laat, Zhiming Zhao. 644-647 [doi]
- Receive Buffer based Path Management for MPTCP in heterogeneous networksJinhwan Kim, BongHwan Oh, Jaiyong Lee. 648-651 [doi]
- Delay-based priority queueing for VoIP over Software Defined NetworksCristian Olariu, Martin Zuber, Christina Thorpe. 652-655 [doi]
- SDQ: Enabling rapid QoE experimentation using Software Defined NetworkingLyndon Fawcett, Mu Mu, Matthew Broadbent, Nicholas Hart, Nicholas J. P. Race. 656-659 [doi]
- OpenFlow based VoIP QoE monitoring in enterprise SDNBartlomiej Siniarski, Cristian Olariu, Philip Perry, John Murphy 0001. 660-663 [doi]
- An enhanced Path Computation for Wide Area Networks based on Software Defined NetworkingDjamel Eddine Kouicem, Ilhem Fajjari, Nadjib Aitsaadi. 664-667 [doi]
- Model-driven analytics in SDN networksMouli Chandramouli, Alexander Clemm. 668-673 [doi]
- NFV service dynamicity with a DevOps approach: Insights from a use-case realizationSteven van Rossem, Xuejun Cai, Ivano Cerrato, Per Danielsson, Felician Németh, Bertrand Pechenot, István Pelle, Fulvio Risso, Sachin Sharma, Pontus Sköldström, Wolfgang John. 674-679 [doi]
- Virtualization of radio access network by Virtual Machine and Docker: Practice and performance analysisAravinthan Gopalasingham, Dalia-Georgiana Herculea, Chung Shue Chen, Laurent Roullet. 680-685 [doi]
- BlueWall: Software defined network management in hybrid enterprise cloud environmentsJinho Hwang, Jin Xiao, Nikos Anerousis. 686-700 [doi]
- How is your event Wi-Fi doing? Performance measurements of large-scale and dense IEEE 802.11n/ac networksPatrick Bosch, Jeroen Wyffels, Bart Braem, Steven Latré. 701-707 [doi]
- On the impact of TCP segmentation: Experience in VoIP monitoringDavid Muelas, Jorge E. López de Vergara, Javier Ramos de Santiago, José Luis García-Dorado, Javier Aracil. 708-713 [doi]
- Analysis of a large multimedia-rich web portal for the validation of personal delivery networksJeroen van der Hooft, Stefano Petrangeli, Tim Wauters, Rameez Rahman, Nico Verzijp, Rafael Huysegems, Tom Bostoen, Filip De Turck. 714-719 [doi]
- COACH: Cognitive analytics for changeSinem Guven, Pawel Jasionowski, Karin Murthy, Krishna Tunga, George Stark. 720-725 [doi]
- Managing vulnerabilities in a cloud native world with bluefixJin Xiao, John J. Rofrano. 726-740 [doi]
- Attacking SCADA systems: A practical perspectiveLuís Rosa, Tiago Cruz, Paulo Simões, Edmundo Monteiro, Leonid Lev. 741-746 [doi]
- Using the COMPA autonomous architecture for mobile network securityLiam Fallon, John Keeney, Mark McFadden, John Quilty, Sven van der Meer. 747-753 [doi]
- Traffic steering of middlebox policy chain based on SDNQichao He, Ying Wang, Wenjing Li, Xuesong Qiu. 754-759 [doi]
- SDN policy-driven service chain placement in OpenStackManuel Stein, Michael Scharf, Volker Hilt. 760-765 [doi]
- Evaluation of scalable, on-demand DNS-as-a-ServiceBruno Sousa, Vitor Fonseca, Paulo Simões, Luís Cordeiro. 766-771 [doi]
- Blockchains everywhere - a use-case of blockchains in the pharma supply-chainThomas Bocek, Bruno Bastos Rodrigues, Tim Strasser, Burkhard Stiller. 772-777 [doi]
- BlueShift: Automated application transformation to Cloud Native architecturesMaja Vukovic, Jinho Hwang, John J. Rofrano, Nikos Anerousis. 778-792 [doi]
- Sustainable implementation-level workflow for automating NFV operationTatsuji Miyamoto, Masanori Miyazawa, Michiaki Hayashi. 793-796 [doi]
- Failover time evaluation between checkpoint services in multi-tier stateful applicationsDemis Gomes, Glauco Estacio Gonçalves, Moises Bezerra, Djamel Sadok, Patricia Takako Endo, Calin Curescu. 797-800 [doi]
- Advanced testing of mobile applications and devicesAlmudena Díaz-Zayas, Alberto Salmerón, F. Javier Rivas Tocado, Pedro Merino. 801-804 [doi]
- Prototyping a high availability PaaS: Performance analysis and lessons learnedMarcos Machado, Daniel Rosendo, Demis Gomes, André Moreira, Moises Bezerra, Djamel Sadok, Patricia Takako Endo, Calin Curescu. 805-808 [doi]
- GoLCoNDa: Geo-IP Lookup for campus network NetFlow dataSwatesh Pakhare, Deep Medhi. 809-812 [doi]
- Towards tackling privacy disclosure issues in Domain Name ServiceXuebiao Yuchi, Guanggang Geng, Zhiwei Yan, Xiaodong Lee. 813-816 [doi]
- QoE awareness for the Mobile Termination Rates monopoly liberationChristos Tsiaras, Burkhard Stiller. 817-822 [doi]
- A methodology and test environment for QoS measurements in mobile networksF. Javier Rivas Tocado, Almudena Díaz-Zayas, Pedro Merino. 823-828 [doi]
- Mechanisms for management of SLA for Virtual Software Defined Networks based on QoS ClassesRafael Lopes Gomes, Edmundo R. M. Madeira, Luiz Fernando Bittencourt. 829-834 [doi]
- Decentralized detection of violations of Service Level Agreements using Peer-to-Peer technologyJéferson Campos Nobre, Lisandro Zambenedetti Granville. 835-840 [doi]
- Understanding the impact of network infrastructure changes using large-scale measurement platformsVaibhav Bajpai, Jürgen Schönwälder. 841-846 [doi]
- Securing networked embedded systems code through distributed systems analysisFernando Augusto Teixeira, José Marcos S. Nogueira, Leonardo B. Oliveira. 847-851 [doi]
- A Survival Performance degrAdation fRamework for lArge-scale neTworked systemsRicardo Macedo, Yacine Ghamri-Doudane, Michele Nogueira Lima. 852-857 [doi]
- Energy-efficient peer-to-peer networking for constrained-capacity mobile environmentsErkki Harjula, Timo Ojala, Mika Ylianttila. 858-864 [doi]
- NFV service dynamicity with a DevOps approachSteven van Rossem, Xuejun Cai, Ivano Cerratoz, Per Danielsson, Felician Németh, Bertrand Pechenot, István Pelle, Fulvio Risso, Sachin Sharma, Pontus Sköldström, Wolfgang John. 865-866 [doi]
- FlowVisor vulnerability analysisYing Qian, Wanqing You, Kai Qian. 867-868 [doi]
- A RAN/SDN controller based connectivity management platform for Mobile Service ProvidersEngin Zeydan, Ahmet Serdar Tan, Gokhan Ayhan, Melih Koca. 869-870 [doi]
- Implementation of self-managing applications on cloud using overlay networksNasim Beigi Mohammadi, Hamzeh Khazaei, Mark Shtern, Cornel Barna, Marin Litoiu. 871-872 [doi]
- Online approach to performance fault localization for cloud and datacenter servicesJawwad Ahmed, Andreas Johnsson, Farnaz Moradi, Rafael Pasquini, Christofer Flinta, Rolf Stadler. 873-874 [doi]
- CacheMAsT: Cache Management Analysis and Visualization ToolDaphné Tuncer, Tom Sherborne, Marinos Charalambides, George Pavlou. 875-876 [doi]
- Real-time resource prediction engine for cloud managementChristofer Flinta, Andreas Johnsson, Jawwad Ahmed, Farnaz Moradi, Rafael Pasquini, Rolf Stadler. 877-878 [doi]
- Enhancing SDN security by device fingerprintingNicholas Gray, Thomas Zinner, Phuoc Tran-Gia. 879-880 [doi]
- Demonstration of sustainable implementation-level workflow for automating NFV operationTatsuji Miyamoto, Masanori Miyazawa, Michiaki Hayashi. 881-882 [doi]
- An adaptive detection and prevention architecture for unsafe traffic in SDN enabled mobile networksMehrnoosh Monshizadeh, Vikramajeet Khatri, Raimo Kantola. 883-884 [doi]
- Click-on-OSv: A platform for running Click-based middleboxesLeonardo da Cruz Marcuzzo, Vinicius F. Garcia, Vitor A. Cunha, Daniel Corujo, João Paulo Barraca, Rui L. Aguiar, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville, Carlos R. P. dos Santos. 885-886 [doi]
- Honeypot testbed for network defence strategy evaluationJana Medková, Martin Husák, Martin Vizváry, Pavel Celeda. 887-888 [doi]
- An experimental system for verifying topology changes in mobile communication networksTsvetko Tsvetkov, Janne Ali-Tolppa, Henning Sanneck, Georg Carle. 889-890 [doi]
- A graph-based representation of relations in network security alert sharing platformsMartin Husák, Milan Cermák. 891-892 [doi]
- Dynamic cloud service placement for live video streaming with a remote-controlled droneFlorian Wamser, Frank Loh, Michael Seufert, Phuoc Tran-Gia, Roberto Bruschi, Paolo Lago. 893-894 [doi]
- A platform for home network traffic monitoringAbdesselem Kortebi, Zied Aouini, Christophe Delahaye, Jean-Philippe Javaudin, Yacine Ghamri-Doudane. 895-896 [doi]
- Overcoming the memory limits of network devices in SDN-enabled data centersAntonio Marsico, Roberto Doriguzzi Corin, Domenico Siracusa. 897-898 [doi]
- AMNESiA: Affinity measurement platform for NFV-enabled networksArthur Selle Jacobs, Ricardo Luis dos Santos, Muriel Figueredo Franco, Eder John Scheid, Ricardo Jose Pfitscher, Lisandro Zambenedetti Granville. 899-900 [doi]
- SDN-based transparent flow scheduling for heterogeneous wireless LANsTom De Schepper, Patrick Bosch, Ensar Zeljkovic, Koen De Schepper, Chris Hawinkel, Steven Latré, Jeroen Famaey. 901-902 [doi]
- ETSO: End-To-End SFC Orchestration FrameworkMarouen Mechtri, Chaima Ghribi, Oussama Soualah, Djamal Zeghlache. 903-904 [doi]
- Demo: Scalable and reliable software-defined multicast with BIER and P4Wolfgang Braun, Joshua Hartmann, Michael Menth. 905-906 [doi]
- Layer-two peering across SAVI and GENI testbeds using HyperExchangeSaeed Arezoumand, Hadi Bannazadeh, Alberto Leon-Garcia. 907-908 [doi]
- Generating synthetic Internet- and IP-topologies using the Stochastic-Block-ModelPatrick Kalmbach, Andreas Blenk, Markus Klügel, Wolfgang Kellerer. 911-916 [doi]
- Virtual instance resource usage modeling: A method for efficient resource provisioning in the cloudSeyed Ali Jokar Jandaghi, Kaveh Mahdaviani, Cristiana Amza. 917-922 [doi]
- Tag-and-Forward: A source-routing enabled data plane for OpenFlow Fat-Tree NetworksAirton Ishimori, Eduardo Cerqueira, Antonio Abelém. 923-928 [doi]
- Learning in SDN-based multi-tenant cellular networks: A game-theoretic perspectiveOmer Narmanlioglu, Engin Zeydan. 929-934 [doi]
- Knowledge discovery of port scans from darknetSofiane Lagraa, Jérôme Francois. 935-940 [doi]
- Investigation of malicious portable executable file detection on the network using supervised learning techniquesRushabh Vyas, Xiao Luo, Nichole McFarland, Connie Justice. 941-946 [doi]
- Exploring a service-based normal behaviour profiling system for botnet detectionWeikeng Chen, Xiao Luo, A. Nur Zincir-Heywood. 947-952 [doi]
- The application of Neural Networks to predicting the root cause of service failuresRobert Harper, Philip Tee. 953-958 [doi]
- Discovering Cloud Operation History through Log AnalysisMitsunari Kobayashi, Yosuke Himura, Yoshiko Yasuda. 959-964 [doi]
- Random access in nondelimited variable-length record collections for parallel reading with HadoopJason W. Anderson, Christopher Gropp, Linh Ngo, Amy W. Apon. 965-970 [doi]
- On extracting user-centric knowledge for personalised Quality of Service in 5G networksJuan Sanchez-Gonzalez, Oriol Sallent, Jordi Pérez-Romero, Ramón Agustí. 971-974 [doi]
- Comprehensive vulnerability assessment and optimization method for smart grid communication transmission systemsChenchen Ji, Peng Yu, Wenjing Li, Puyuan Zhao, Xuesong Qiu. 975-978 [doi]
- Assembling VoLTE CDRs based on network monitoring - challenges with fragmented informationPál Varga, Dániel Kozma, Tamas Tothfalusi. 979-982 [doi]
- Monitoring the network monitoring system: Anomaly Detection using pattern recognitionMaha Mdini, Alberto Blanc, Gwendal Simon, Jerome Barotin, Julien Lecoeuvre. 983-986 [doi]
- Quantifying cloud workload burstiness: New measures and modelsAbiola Adegboyega. 987-990 [doi]
- A clustering-based analysis of DPI-labeled video flow characteristics in cellular networksJohan Garcia. 991-994 [doi]
- Application switch using DPN for improving TCP based data center applicationsShinnosuke Nirasawa, Akihiro Nakao, Shu Yamamoto, Masaki Hara, Masato Oguchi, Saneyasu Yamaguchi. 995-998 [doi]
- Study on the accuracy of QoE monitoring for HTTP adaptive video streaming using VNFLam Dinh-Xuan, Michael Seufert, Florian Wamser, Phuoc Tran-Gia. 999-1004 [doi]
- QoE based comparison of H.264/AVC and WebM/VP8 in an error-prone wireless networkOmer Nawaz, Tahir Nawaz Minhas, Markus Fiedler. 1005-1010 [doi]
- Betas: Deriving quantiles from MOS-QoS relations of IQX models for QoE managementTobias Hoßfeld, Markus Fiedler, Jorgen Gustafsson. 1011-1016 [doi]
- OTT-ISP joint service management: A Customer Lifetime Value based approachArslan Ahmad, Alessandro Floris, Luigi Atzori. 1017-1022 [doi]
- Embracing uncertainty: A probabilistic view of HTTP video qualityMartín Varela, Toni Mäki. 1023-1026 [doi]
- Comparison of the initial delay for video playout start for different HTTP-based transport protocolsThomas Zinner, Stefan Geissler, Fabian Helmschrott, Valentin Burger. 1027-1030 [doi]
- Quality evaluation of 3D video for QoE management in media networksPedro Miguel Regalo Rocha, Pedro A. Amado Assunção, Luís Alberto da Silva Cruz. 1031-1033 [doi]
- Towards a Hybrid Intrusion Detection System for Android-based PPDR terminalsPedro Borges, Bruno Sousa, Luis Ferreira, Firooz B. Saghezchi, Georgios Mantas, José Carlos Ribeiro, Jonathan Rodriguez, Luís Cordeiro, Paulo Simões 0001. 1034-1039 [doi]
- Methods and techniques to identify security incidents using domain knowledge and contextual informationAhmed AlEroud, George Karabatis. 1040-1045 [doi]
- Defending against Probe-Response AttacksEmmanouil Vasilomanolakis, Noorulla Sharief, Max Mühlhäuser. 1046-1051 [doi]
- Efficient probing of heterogeneous IoT networksLionel Metongnon, Eugène C. Ezin, Ramin Sadre. 1052-1058 [doi]
- Privacy-preserving data aggregation in Intelligent Transportation SystemsCatalin Gosman, Ciprian Dobre, Florin Pop. 1059-1064 [doi]
- Towards optimally resilient topologies against optimal attacksMartin Backhaus, Günter Schäfer. 1065-1070 [doi]
- DroidVisor: An Android secure application recommendation systemPulkit Rustgi, Carol J. Fung, Bahman Rashidi, Bridget T. McInnes. 1071-1076 [doi]
- Domain names abuse and TLDs: From monetization towards mitigationGiovane C. M. Moura, Moritz Müller, Marco Davids, Maarten Wullink, Cristian Hesselman. 1077-1082 [doi]
- DDoS attack volume forecasting using a statistical approachDongwoo Kwon, Hyeonwoo Kim, Donghyeok An, Hongtaek Ju. 1083-1086 [doi]
- Applied Machine Learning predictive analytics to SQL Injection Attack detection and preventionSolomon Ogbomon Uwagbole, William J. Buchanan, Lu Fan. 1087-1090 [doi]
- Q-Learning for Policy Based SON Management in wireless Access NetworksTony Daher, Sana Ben Jemaa, Laurent Decreusefond. 1091-1096 [doi]
- Towards Location Management in SDN-based MCNMaja Sulovic, Clarissa Cassales Marquezan, Artur Hecker. 1097-1102 [doi]
- Efficient RRH assignments for mobile network operators in shared cellular network architectureOmer Narmanlioglu, Engin Zeydan. 1103-1108 [doi]
- Capacity self-planning in Small Cell multi-tenant 5G NetworksP. Munoz, Oriol Sallent, Jordi Pérez-Romero. 1109-1114 [doi]
- Demystifying network slicing: From theory to practiceThomas Soenen, Ratul Banerjee, Wouter Tavernier, Didier Colle, Mario Pickavet. 1115-1120 [doi]
- Cost-efficient method for managing network slices in a multi-service 5G core networkTakuya Shimojo, Malla Reddy Sama, Ashiq Khan, Shigeru Iwashina. 1121-1126 [doi]
- Meeting the observability challenges for VNFs in 5G systemsWolfgang John, Farnaz Moradi, Bertrand Pechenot, Pontus Sköldström. 1127-1130 [doi]
- Cache peering in multi-tenant 5G networksKonstantinos V. Katsaros, Vasilis Glykantzis, George Petropoulos. 1131-1134 [doi]
- A framework to facilitate management of services in cloud based 5G environmentsNikos Koutsouris, Apostolos Voulkidis, Kostas Tsagkaris. 1135-1138 [doi]
- On non-parametric models for detecting outages in the mobile networkEric Falk, Ramino Camino, Radu State, Vijay K. Gurbani. 1139-1142 [doi]
- Real-time performance management of assisted living services for Bluetooth low energy sensor communicationJonas Wåhslén, Thomas Lindh. 1143-1148 [doi]
- Cost-benefit analysis game for efficient storage allocation in cloud-centric Internet of Things systems: A game theoretic perspectiveGeorgios Skourletopoulos, Constandinos X. Mavromoustakis, George Mastorakis, John N. Sahalos, Jordi Mongay Batalla, Ciprian Dobre. 1149-1154 [doi]
- QoS management mechanisms for Enhanced Living Environments in IoTYassine Banouar, Clovis Anicet Ouedraogo, Christophe Chassot, Abdellah Zyane. 1155-1161 [doi]
- An AAL-oriented measurement-based evaluation of different HTTP-based data transport protocolsThomas Zinner, Stefan Geissler, Fabian Helmschrott, Susanna Spinsante, An Braeken. 1162-1167 [doi]
- SVC-based video streaming over highway vehicular networks with base layer guaranteeRuijian An, Zhi Liu, Yusheng Ji. 1168-1173 [doi]
- Energy reduction platform based on occupant behavior pattern detection in enhanced living environmentsDan Popa, Ciprian Dobre, Florin Pop. 1174-1177 [doi]
- Framework to monitor pregnant women with a high risk of premature labour using sensor networksHisham Allahem, Srinivas Sampalli. 1178-1181 [doi]
- Basic Human Activity Recognition based on sensor fusion in smartphonesCharlene V. San Buenaventura, Nestor Michael C. Tiglao. 1182-1185 [doi]
- A decentralized approach for adaptive workload estimation in virtualized environmentsNisrine Ghadban, Rémi Cogranne, Guillaume Doyen. 1186-1194 [doi]
- Orchestrating resource allocation for interactive vs. batch services using a hybrid controllerBilal Ahmad, Anis Yazidi, Hårek Haugerud, Soodeh Farokhi. 1195-1203 [doi]
- Online learning and adaptation of network hypervisor performance modelsChristian Sieber, Andreas Obermair, Wolfgang Kellerer. 1204-1212 [doi]
- Cross-layer management of a containerized NoSQL data storeEvdoxos Bekas, Kostas Magoutis. 1213-1221 [doi]
- Resource aware placement of IoT application modules in Fog-Cloud Computing ParadigmMohit Taneja, Alan Davy. 1222-1228 [doi]
- State-machine driven collaborative mobile sensing serving multiple Internet-of-Things applicationsRadhika Loomba, Lei Shi, Brendan Jennings. 1229-1237 [doi]
- Lightweight virtualization as enabling technology for future smart carsRoberto Morabito, Riccardo Petrolo, Valeria Loscrè, Nathalie Mitton, Giuseppe Ruggeri, Antonella Molinaro. 1238-1245 [doi]
- Distributed spatial indexing for the Internet of Things data managementYasmin Fathy, Payam M. Barnaghi, Rahim Tafazolli. 1246-1251 [doi]