Abstract is missing.
- Spectrum, network and operations management in cognitive radio networksIan F. Akyildiz. [doi]
- From value chains to ecosystem: New opportunities for telecommunications and new challenges for managing networks and servicesRoberto Saracco. [doi]
- Brazilian terrestrial digital TV systemLuiz Fernando Gomes Soares. [doi]
- Device Instrumentation for performance monitoring and its application in service level managementAlexander Clemm, Ralf Wolter. [doi]
- Spectrum management in cognitive radio networksIan F. Akyildiz. [doi]
- IT Service Management and Business-Driven IT ManagementClaudio Bartolini, Jacques Philippe Sauvé. [doi]
- Designing, optimizing, and evaluating network security configurationEhab Al-Shaer. [doi]
- Peer-to-Peer networking: State of the art and research challengesRaouf Boutaba. [doi]
- Internet routing managementDeep Medhi. [doi]
- Enterprise mashups and Web 2.0 for managementHani Jamjoom, Nikos Anerousis. [doi]
- Autonomic networking: Theory and practiceJohn Strassner. [doi]
- Distinguished experts panelGeorge Pavlou, Luciano Paschoal Gaspary. [doi]
- Optimizing software packages for application managementJoseph L. Hellerstein. 1-8 [doi]
- Utility-based placement of dynamic Web applications with fairness goalsDavid Carrera, Malgorzata Steinder, Ian Whalley, Jordi Torres, Eduard Ayguadé. 9-16 [doi]
- Application domain independent policy conflict analysis using information modelsSteven Davy, Brendan Jennings, John Strassner. 17-24 [doi]
- Using machine learning for non-intrusive modeling and prediction of software agingArtur Andrzejak, Luís Moura Silva. 25-32 [doi]
- Alert prioritization in Intrusion Detection SystemsKhalid Alsubhi, Ehab Al-Shaer, Raouf Boutaba. 33-40 [doi]
- CPU-based DoS attacks against SIP serversMing Luo, Tao Peng, Christopher Leckie. 41-48 [doi]
- Relieving hot spots in collaborative intrusion detection systems during worm outbreaksChenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie. 49-56 [doi]
- Network domain entrypoint/path determination for DDoS attacksVrizlynn L. L. Thing, Morris Sloman, Naranker Dulay. 57-64 [doi]
- A novel approach to bottleneck analysis in networksNikhil Shetty, Assane Gueye, Jean C. Walrand. 65-72 [doi]
- Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic controlLopa Roychoudhuri, Ehab S. Al-Shaer. 73-80 [doi]
- Making IP traffic engineering robust to intra- and inter-AS transient link failuresMina Amin, Kin-Hon Ho, Ning Wang, Michael P. Howarth, George Pavlou. 81-88 [doi]
- Detecting Skype flows in Web trafficEmanuel P. Freire, Artur Ziviani, Ronaldo M. Salles. 89-96 [doi]
- Applying a model of configuration complexity to measure security impact on IT proceduresGiovane Cesar Moreira Moura, Luciano Paschoal Gaspary. 97-104 [doi]
- Towards malware inspired management frameworksJérôme François, Radu State, Olivier Festor. 105-112 [doi]
- Dynamic inter-organizational cooperation setup in Circle-of-Trust environmentsLatifa Boursas, Vitalian A. Danciu. 113-120 [doi]
- Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacksDaniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shaozhi Ye, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong. 121-128 [doi]
- Infrastructure sharing and shared operations for mobile network operators From a deployment and operations viewThomas Frisanco, Paul Tafertshofer, Pierre Lurin, Rachel Ang. 129-136 [doi]
- Secure route optimization for Mobile Network Node using secure address proxyingManhee Jo, Hiroshi Inamura. 137-143 [doi]
- On utility models for access network selection in wireless heterogeneous networksQuoc-Thinh Nguyen-Vuong, Yacine Ghamri-Doudane, Nazim Agoulmine. 144-151 [doi]
- Neighbor cell relation list and measured cell identity management in LTEMehdi Amirijoo, Pål K. Frenger, Fredrik Gunnarsson, Harald Kallin, Johan Moe, K. Zetterberg. 152-159 [doi]
- Towards automated application signature generation for traffic identificationByung-Chul Park, Young J. Won, Myung-Sup Kim, James W. Hong. 160-167 [doi]
- Network-wide inference of end-to-end path intersectionsBengi Karacali, Mark J. Karol. 168-175 [doi]
- A queueing equivalent thresholding method for thinning traffic capturesJose Luis García-Dorado, Javier Aracil, José Alberto Hernández, Jorge E. López de Vergara. 176-183 [doi]
- Wire-speed application flow generation in hardware platform for multi-gigabit traffic monitoringTaesang Choi, Sangsik Yoon, Dongwon Kang, Sangwan Kim, Joonkyung Lee, Kyeongho Lee. 184-191 [doi]
- A state-space approach to SLA based managementVibhore Kumar, Karsten Schwan, Subu Iyer, Yuan Chen, Akhil Sahai. 192-199 [doi]
- Decision support for service transition management Enforce change scheduling by performing change risk and business impact analysisThomas Setzer, Kamal Bhattacharya, Heiko Ludwig. 200-207 [doi]
- Estimating business value of IT services through process complexity analysisYixin Diao, Kamal Bhattacharya. 208-215 [doi]
- Analysis of application performance and its change via representative application signaturesNingfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat, Julie Symons, Evgenia Smirni. 216-223 [doi]
- Eigen space based method for detecting faulty nodes in large scale enterprise systemsManoj K. Agarwal. 224-231 [doi]
- A Framework for the establishment of inter-domain, on-demand VPNsAlexandre Matos, Fernando Matos, Paulo Simões, Edmundo Monteiro. 232-239 [doi]
- Fast similarity search in peer-to-peer networksThomas Bocek, Ela Hunt, David Hausheer, Burkhard Stiller. 240-247 [doi]
- Optimizing request denial and latency in an agent-based VPN architectureHaiyang Qian, Steve Dispensa, Deep Medhi. 248-255 [doi]
- Characterization of IP flows eligible for lambda-connections in optical networksTiago Fioreze, Mattijs Oude Wolbers, Remco van de Meent, Aiko Pras. 256-262 [doi]
- Multi-layer network management system with dynamic control of MPLS/GMPLS LSPs based on IP flowsMasanori Miyazawa, Kenichi Ogaki, Tomohiro Otani. 263-270 [doi]
- Supporting control plane-enabled transport networks within ITU-T Next Generation Network (NGN) architectureFabio Baroncelli, Barbara Martini, Valerio Martini, Piero Castoldi. 271-278 [doi]
- Dynamic reconfiguration of logical topology for WDM networks under traffic changesPhuong Nga Tran, Ulrich Killat. 279-286 [doi]
- A self-organizing composition towards autonomic overlay networksIbrahim Al-Oqily, Ahmed Karmouch. 287-294 [doi]
- On the complexity of determining autonomic policy constrained behaviourMark Burgess, Lars Kristiansen. 295-301 [doi]
- Analyzing security and energy tradeoffs in autonomic capacity managementÍtalo S. Cunha, Itamar Viana, João Palotti, Jussara M. Almeida, Virgilio Almeida. 302-309 [doi]
- A resource management framework for multi-tier service delivery in autonomic virtualized environmentsXiaoying Wang, Dong-Jun Lan, Xing Fang, Meng Ye, Ying Chen. 310-316 [doi]
- A state machine approach for problem detection in large-scale distributed systemKewei Sun, Jie Qiu, Ying Li, Ying Chen, Weixing Ji. 317-324 [doi]
- Efficient physical topology discovery for large OSPF networksChoonho Son, Junsuk Oh, Kyoung Ho Lee, Kieung Kim, Jaehyung Yoo. 325-330 [doi]
- A strategic approach for re-organization of internet topology for improving both efficiency and attack toleranceYasuhiro Sato, Shingo Ata, Ikuo Oka. 331-338 [doi]
- PathCrawler: Automatic harvesting web infra-structureCesar Marcondes, M. Y. Sanadidi, Mario Gerla, Ramon S. Schwartz, Raphael O. Santos, Magnos Martinello. 339-346 [doi]
- Enabling rollback support in IT change management systemsGuilherme Sperb Machado, F. F. Daitx, Weverton Luis da Costa Cordeiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, Claudio Bartolini, Akhil Sahai, David Trastour, Katia B. Saikoski. 347-354 [doi]
- A template-based solution to support knowledge reuse in IT change designWeverton Luis da Costa Cordeiro, Guilherme Sperb Machado, F. F. Daitx, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, Akhil Sahai, Claudio Bartolini, David Trastour, Katia B. Saikoski. 355-362 [doi]
- ReCon: A tool to Recommend dynamic server Consolidation in multi-cluster data centersSameep Mehta, Anindya Neogi. 363-370 [doi]
- ChargeView: An integrated tool for implementing chargeback in IT systemsSandip Agarwala, Ramani Routray, Sandeep Uttamchandani. 371-378 [doi]
- CyberPlanner: A comprehensive toolkit for network service providersRaouf Boutaba, Jin Xiao, Issam Aib. 379-386 [doi]
- Coordinated management of power usage and runtime performanceMalgorzata Steinder, Ian Whalley, James E. Hanson, Jeffrey O. Kephart. 387-394 [doi]
- Data tagging architecture for system monitoring in dynamic environmentsBharat Krishnamurthy, Anindya Neogi, Bikram Sengupta, Raghavendra Singh. 395-402 [doi]
- QoS and reputation-aware service selectionNoura Limam, Raouf Boutaba. 403-410 [doi]
- Monitoring scheduling for home gatewaysStéphane Frénot, Yvan Royon, Pierre Parrend, D. Beras. 411-416 [doi]
- LNMP- Management architecture for IPv6 based low-power wireless Personal Area Networks (6LoWPAN)Hamid Mukhtar, Kang-Myo Kim, Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Seung-Wha Yoo. 417-424 [doi]
- Survival multipath routing for MANETsMichele Nogueira Lima, Helber W. da Silva, Aldri L. dos Santos, Guy Pujolle. 425-432 [doi]
- Policy-based self-management of hybrid ad hoc networks for dynamic channel configurationAntonis M. Hadjiantonis, George Pavlou. 433-440 [doi]
- Tracking back the root cause of a path change in interdomain routingAlessio Campisano, Luca Cittadini, Giuseppe Di Battista, Tiziana Refice, Claudio Sasso. 441-448 [doi]
- Efficient method of collecting routing tables based on OSPF/iBGP monitoringYuichiro Hei, Tomohiko Ogishi, Shigehiro Ano. 449-456 [doi]
- Relaxed multiple routing configurations for IP fast rerouteTarik Cicic, Audun Fosselie Hansen, Amund Kvalbein, Matthias Hartmann, Rüdiger Martin, Michael Menth. 457-464 [doi]
- Detecting BGP anomalies with waveletJianning Mai, Lihua Yuan, Chen-Nee Chuah. 465-472 [doi]
- Availability weak point analysis over an SOA deployment frameworkLei Xie, Jing Luo, Jie Qiu, John A. Pershing, Ying Li, Ying Chen. 473-480 [doi]
- Performance evaluation of the Flow-Aware Networking (FAN) architecture under Grid environmentCésar Cárdenas, Maurice Gagnaire, Víctor López, Javier Aracil. 481-487 [doi]
- Data-WISE: Efficient management of data-intensive workflows in scheduled grid environmentsGargi Dasgupta, Koustuv Dasgupta, Balaji Viswanathan. 488-495 [doi]
- On the planning of a hybrid IT infrastructurePaulo Ditarso Maciel Jr., Flavio de Figueiredo, D. Maia, Francisco Vilar Brasileiro, Alvaro Coelho. 496-503 [doi]
- Integrating business performance management with IT management through impact analysis and provisioningAna Biazetti, Germán S. Goldszmidt. 504-518 [doi]
- Orchestration of heterogeneous virtualized resources for end-to-end service controlMichiaki Hayashi, Nobutaka Matsumoto, Takahiro Miyamoto, Hideaki Tanaka. 519-533 [doi]
- Template based rapid service creation environment for service delivery platformPing Pan, Ling Jin, Chun Ying, Jin Hua Liu. 534-545 [doi]
- Common business process model for continuous SDP transformationLing Jin, Ping Pan, Chun Ying, Xiaoyan Chen, Qiming Tian. 546-559 [doi]
- UTRAN O&M support system with statistical fault identification and customizable rule setsYoshinori Watanabe, Yasuhiko Matsunaga, Kosei Kobayashi, Toshio Tonouchi, Tomohiro Igakura, Shinji Nakadai, Kenichirou Kamachi. 560-573 [doi]
- WiMAX network performance monitoring & optimizationQi Zhang, H. Dam. 574-586 [doi]
- A monitoring tool for Wireless Multi-hop Mesh NetworksFrancois Jan, Bertrand Mathieu, Djamal-Eddine Meddour. 587-601 [doi]
- First steps towards an autonomic management systemMoez Esseghir, Samir Ghamri-Doudane, Kamel Haddadou. 602-614 [doi]
- Grid-enabling orbital analysis and computationally intensive applications for a growing set of diversified usersThomas Barr, C. Byron, Z. Duron, Robert M. Keller, B. Lickly, Carl Nygaard, K. Roberts, Michael AuYeung, Joseph Betser, J. Coggi, Brooks Davis, Craig A. Lee, D. Stodden, Mark Thomas. 615-629 [doi]
- The SCRUB security data sharing infrastructureWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham. 630-644 [doi]
- JXTA PEER SNMP: An SNMP peer for inter-domain managementMaverson Rosa, A. Nascimento, L. Sytnifc, Elias Procópio Duarte Jr.. 645-659 [doi]
- Feasibility validation of management capability for an Ethernet based access network using Ethernet OAM functionalityMunefumi Tsurusawa, Yukio Horiuchi. 660-673 [doi]
- Evaluation on data modeling languages for NETCONF-based network managementHui Xu, Debao Xiao. 674-677 [doi]
- Service capacity allocation and pricingChunhua Tian, Feng Li, Rongzeng Cao, Wei Ding. 678-681 [doi]
- Automatic model-based service hosting environment migrationLiang Liu, Ying Li, Qian Ma, Kewei Sun, Ying Chen, Hao Wang. 682-685 [doi]
- Assessing the Madeira NorthBound InterfacePablo Arozarena, D. Ortega, B. Baesjou. 686-689 [doi]
- A model for heterogeneous networks management and performance evaluationAntónio Serrador, Luis M. Correia. 690-693 [doi]
- GARCH - non-linear time series model for traffic modeling and predictionChaoba Nikkie Anand, Caterina M. Scoglio, Balasubramaniam Natarajan. 694-697 [doi]
- Fast recovery paths schema to improve reliability in IP networksFernando Barreto, Emílio C. G. Wille, Luiz Nacamura. 698-701 [doi]
- Improvement in resource reservations management within tunnels over all-IP mobile networks using IntServ6Jhon Padilla, Josep Paradells Aspas. 702-705 [doi]
- MANKOP: A Knowledge Plane for wireless ad hoc networksDaniel F. Macedo, Aldri L. dos Santos, Guy Pujolle, José Marcos S. Nogueira. 706-709 [doi]
- Routing with a bandwidth based algorithm in virtual call centresAkinbola Adetunji, Hadi Larijani. 710-713 [doi]
- Decomposition of IT service processes and alternative service identification using ontologiesChristian Bartsch, Larisa Shwartz, Christopher Ward, Genady Grabarnik, Melissa J. Buco. 714-717 [doi]
- A new methodology for RF failure detection in UMTS networksJuan Sanchez-Gonzalez, Oriol Sallent, Jordi Pérez-Romero, Ramón Agustí, Miguel Ángel Díaz-Guerra, Juan Antonio Moreno, Daniel Paul. 718-721 [doi]
- Towards autonomic risk-aware security configurationMohammad Salim Ahmed, Ehab Al-Shaer, M. M. Taibah, Muhammad Abedin, Latifur Khan. 722-725 [doi]
- Dependency graph to improve notifications semantic on anomaly detectionBruno Bogaz Zarpelão, Leonardo de Souza Mendes, M. L. Proenca. 726-729 [doi]
- Privacy management service contacts as a new business opportunity for operatorsLouis-François Pau. 730-733 [doi]
- Cost analysis of the service migration problem between communication platformsDayyan Shayani, Carmen Mas Machuca, Monica Jäger, Andreas Gladisch. 734-737 [doi]
- Heuristics on link stability in ad hoc networksMatthias R. Brust, Carlos H. C. Ribeiro, Steffen Rothkugel. 738-741 [doi]
- Applying aspect oriented service control in IMS networkJia Jia Wen, Li Na Ren, Lee Longmore, Qi Yu. 742-746 [doi]
- A model-driven configuration management methodology for testbed infrastructuresFermín Galán Márquez, Jorge E. López de Vergara, David Fernández, Raul Muñoz. 747-750 [doi]
- Dynamic pull-based load balancing for autonomic serversRemi Badonnel, Mark Burgess. 751-754 [doi]
- Towards SLA-based optimal workload distribution in SANsEray Gencay, Carsten Sinz, Wolfgang Küchlin. 755-758 [doi]
- A scheme for dynamic monitoring and logging of topology information in Wireless Mesh NetworksCristian Popi, Olivier Festor. 759-762 [doi]
- Service continuity management through an E2E dynamic session in NGNNoëmie Simoni, Chunyang Yin, Ghislain Du Chéné. 763-766 [doi]
- Bootstrapping device state in managed systemsGreg W. Cox, Walter L. Johnson, John Strassner, David Raymer. 767-770 [doi]
- A Bayesian knowledge engineering framework for service managementWei Wang, Hao Wang, Bo Yang, Liang Liu, Peini Liu, Guosun Zeng. 771-774 [doi]
- Design and implementation of a policy-based management framework for Ambient Networks: Choices and lessons learnedCarlos Alberto Kamienski, Joseane Farias Fidalgo, Ramide Dantas, Djamel Sadok, Börje Ohlman. 775-778 [doi]
- SRDP-Sign: a reliable multicast protocol for signalingFranco Tommasi, Simone Molendini, Elena Scialpi. 779-782 [doi]
- An incentive engineering mechanism for optimizing handoff decisions between cellular data networks and WLANsJun Wang, Victor C. M. Leung. 783-786 [doi]
- Using trust for key distribution and route selection in Wireless Sensor NetworksNathan Lewis, Noria Foukia, Donovan G. Govan. 787-790 [doi]
- SIP network discovery by using SIP message probingJin Zhou, Jie Li, Yin Ben Xia, Bin Cai, Chun Ying. 791-794 [doi]
- Real-time problem localization for synchronous transactions in HTTP-based composite enterprise applicationsNarendran Sachindran, Manish Gupta 0007. 795-798 [doi]
- On the multi-scale behavior of packet size distribution in Internet backbone networkSeongjin Lee, Youjip Won, Dong-Joon Shin. 799-802 [doi]
- An open framework for federating integrated management model of distributed it environmentManish Sethi, Ashok Anand, Dipayan Gangopadhyay, Venkateswara Reddy Madduri, Manish Gupta 0007. 803-806 [doi]
- Towards integrating management interfacesElyes Lehtihet, Nazim Agoulmine. 807-810 [doi]
- Load balancing scheme and implementation in multihoming mobile routerGyu Myoung Lee, Byung-Chun Jeon, Siyoung Heo, Hanlim Kim, Jongsam Jin, Seongchun Lee. 811-814 [doi]
- Asset-based requirement analysis in telecom Service Delivery Platform domainQiming Tian, Xiaoyan Chen, Ling Jin, Ping Pan, Chun Ying. 815-818 [doi]
- Handover prediction strategy for 3G-WLAN overlay networksHyeyeon Kwon, Mijeong Yang, Aesoon Park, S. Venkatesan. 819-822 [doi]
- SIP application composition framework based on business rulesLi Na Ren, Jia Jia Wen, Qi Yu, Lee Longmore. 823-826 [doi]
- Web services monitoring: An initial case study on the tools perspectiveAimilios Chourmouziadis, George Pavlou. 827-830 [doi]
- A comprehensive semantic-based resource allocation framework for workflow management systemsChong Wang, Zhile Zou, Qian Ma, Ru Fang, Hao Wang. 831-834 [doi]
- Distributed fault correlation scheme using a semantic publish/subscribe systemWei Tai, Declan O Sullivan, John Keeney. 835-838 [doi]
- Manageability design for an autonomic management of semi-dynamic web service compositionsChristof Momm, I. P. Hallerbach, Sebastian Abeck, Christoph Rathfelder. 839-842 [doi]
- Harmonizing service and network provisioning for federative access in a mobile environmentDavid J. Lutz, Patrick Mandic, Sascha Neinert, Ruth del Campo, Jürgen Jähnert. 843-846 [doi]
- Effective implementation of network composition for ambient networksRamide Dantas, Joseane Farias Fidalgo, Jennifer Lima, Djamel Sadok, Carlos Alberto Kamienski, Börje Ohlman. 847-850 [doi]
- DYSWIS: An architecture for automated diagnosis of networksVishal Kumar Singh, Henning Schulzrinne, Kai Miao. 851-854 [doi]
- Inter-domain QoS signaling under mobilityEraldo Silveira e Silva, Florin Racaru, Jean-Marie Farines, Michel Diaz. 855-858 [doi]
- A model-based approach to adding autonomic capabilities to network fault management systemYan Liu, Jing Zhang, Michael Jiang, David Raymer, John Strassner. 859-862 [doi]
- Improving distributed service management using Service Modeling Language (SML)Robert Adams, Ricardo Rivaldo, Guilherme Germoglio, Flavio Santos, Yuan Chen, Dejan S. Milojicic. 863-866 [doi]
- Intrusion detection through artificial neural networksI. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral. 867-870 [doi]
- A real-time flow monitor architecture encompassing on-demand monitoring functionsJohn McGlone, Alan Marshall, Roger Woods. 871-874 [doi]
- SPIRIT: Service for providing infrastructure recommendations for ITAshwin Lall, Anca Sailer, Mark Brodie. 875-878 [doi]
- Non-intrusive transaction monitoring using system logsBikram Sengupta, Nilanjan Banerjee, Animashree Anandkumar, Chatschik Bisdikian. 879-882 [doi]
- MANETs routing protocols evaluation in a scenario with high mobility MANET routing protocols performance and behaviorRicardo de Oliveira Schmidt, Marco A. S. Trentin. 883-886 [doi]
- An investigation of visualization techniques forSNMP traffic tracesEwerton Monteiro Salvador, Lisandro Zambenedetti Granville. 887-890 [doi]
- ALBA: An autonomic load balancing algorithm for IEEE 802.11 wireless networksGilbert Sawma, Issam Aib, Ryad Ben-El-Kezadri, Guy Pujolle. 891-894 [doi]
- Using mixed integer programming to schedule it change requestsLeila Zia, Yixin Diao, Christopher Ward, Kamal Bhattacharya. 895-898 [doi]
- Reinforcement learning in policy-driven autonomic managementRaphael M. Bahati, Michael A. Bauer. 899-902 [doi]
- Policy-based dynamic provisioning in data centers based on SLAs, business rules and business objectivesAngela McCloskey, Bradley Simmons, Hanan Lutfiyya. 903-906 [doi]
- An Internet traffic classification methodology based on statistical discriminatorsRaimir Holanda, Marcus Fabio Fontenelle do Carmo, José Everardo Bessa Maia, G. P. Siqueira. 907-910 [doi]
- A step towards understanding Joost IPTVJosilene Moreira, Rafael Antonello, Stenio F. L. Fernandes, Carlos Alberto Kamienski, Djamel Sadok. 911-914 [doi]
- Host-aware routing in multicast overlay backboneJun Guo, Sanjay Jha. 915-918 [doi]
- A scalable monitoring strategy for highly dynamic systemsLuis Carlos Erpen De Bona, Keiko Verônica Ono Fonseca, Elias Procópio Duarte Jr.. 919-922 [doi]
- Algorithm to automatically solve security policy conflicts among IP devices configurationsSimone Ferraresi, Emanuele Francocci, Alessio Quaglini, Andrea Baiocchi. 923-926 [doi]
- Provisioning IMS-based seamless triple play services over different access networksAdel Al-Hezmi, Fabricio Carvalho de Gouveia, Muhammad Sher, Oliver Friedrich, Thomas Magedanz. 927-930 [doi]
- A self-diagnosis approach for performance problem localization in component-based applicationsSand Correa, Eduardo Fonseca, Renato Cerqueira. 931-934 [doi]
- A security management framework for sensor networksSergio de Oliveira, Thiago Rodrigues de Oliveira, José Marcos S. Nogueira. 935-938 [doi]
- Wavelength conversion architectures in OBS networksJosé Maranhão Neto, Helio Waldman, André Castelo Branco Soares, William Giozza. 939-942 [doi]
- An ontology for privacy policy management in ubiquitous environmentsLuciana Andréia Fondazzi Martimiano, Müller R. P. Gonçalves, Edson dos Santos Moreira. 947-950 [doi]
- Kalinahia: Considering quality of service to design and execute distributed multimedia applicationsSophie Laplace, Marc Dalmau, Philippe Roose. 951-954 [doi]
- Value network model for service ecosystem in business environmentFeng Li, Chunhua Tian, Rongzeng Cao, Shun Jiang. 955-958 [doi]
- Home/office intranet resource management for QoS-guaranteed realtime stream service provisioning on IEEE 802.11e WLANYoung-Chul Jung, Byung-Kil Kim, Young-Tak Kim. 959-962 [doi]
- Towards a flexible security management solution for dynamic MANETsVincent Toubiana, Houda Labiod. 963-966 [doi]
- Improving QoS guarantees through implicit ACSolange Rito Lima, Pedro Sousa, Paulo Carvalho. 967-970 [doi]
- Improving user experience and resource management in wireless communicationsRicardo Rabelo Oliveira, Antonio Alfredo Ferreira Loureiro. 971-974 [doi]
- Adapt-RDM - A bandwidth management algorithm suitable for DiffServ services aware traffic engineeringWalter da Costa Pinto Neto, Joberto Martins. 975-978 [doi]
- Information integration techniques to automate incident managementRajeev Gupta, K. Hima Prasad, M. Mohania. 979-982 [doi]
- Grid resource management with tightly coupled WBEM/CIM local managementShahnaza Tursunova, Tran Trong Son, Young-Tak Kim. 983-986 [doi]
- An improved GPS scheduling discipline based on multifractal traffic characteristicsFlávio Henrique Vieira Teles, Luan Ling Lee, C. Jorge. 987-990 [doi]
- Measuring anonymization privacy/analysis tradeoffs inherent to sharing network dataWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham. 991-994 [doi]
- Fostering the simulation-based evaluation of management architectures over multi-hop topologiesJose Angel Irastorza, Ramón Agüero, Luis Muñoz. 995-998 [doi]
- Enforcing security in mobile RFID networks multilateral approaches and solutionsNamje Park, Dooho Choi, Seungjoo Kim, Dongho Won. 999-1002 [doi]
- Policy and role based mobile RFID user privacy data management systemNamje Park, Youjin Song, Dongho Won. 1003-1006 [doi]
- Policy-based self-healing for radio access networksJavier Baliosian, Katarína Matusíková, Karl Quinn, Rolf Stadler. 1007-1010 [doi]
- An attribute aggregation architecture with trust-based evaluation for access controlJaewon Lee, Heeyoul Kim, Joon Sung Hong. 1011-1014 [doi]
- Towards an efficient implementation of traceback mechanisms in autonomous systemsKarima Boudaoud, F. LeBorgne. 1015-1018 [doi]
- High performance distributed Denial-of-Service resilient web cluster architectureSupranamaya Ranjan, Edward W. Knightly. 1019-1024 [doi]
- HyperBone: A scalable overlay network based on a virtual hypercubeLuis C. E. Bona, Keiko Verônica Ono Fonseca, Elias Procópio Duarte Jr.. 1025-1030 [doi]
- Model-based management of security services in complex network environmentsJoão Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus. 1031-1036 [doi]
- Self-tuning network support for MANETsYangcheng Huang, Saleem N. Bhatti, Søren-Aksel Sørensen. 1037-1042 [doi]
- Unsupervised learning algorithms for intrusion detectionStefano Zanero, Giuseppe Serazzi. 1043-1048 [doi]
- Transmission power control techniques for MAC protocols in wireless sensor networksLuiz Henrique A. Correia, José Marcos S. Nogueira. 1049-1054 [doi]
- Application of adaptive probing for fault diagnosis in computer networksMaitreya Natu, Adarshpal S. Sethi. 1055-1060 [doi]
- A 2-tier architecture to support real-time communication in CSMA-based networksRicardo Moraes, Francisco Vasques, Paulo Portugal. 1061-1066 [doi]
- Integrating cfengine and scli: Managing network devices like host systemsJürgen Schönwälder, Vladislav Marinov, Mark Burgess. 1067-1070 [doi]
- Mining event logs with SLCT and LogHoundRisto Vaarandi. 1071-1074 [doi]
- SGNET: Implementation insightsCorrado Leita, Marc Dacier. 1075-1078 [doi]