Abstract is missing.
- Operator and radio resource sharing in multi-carrier environmentsPongsakorn Teeraparpwong, Per Johansson, Harsha V. Madhyastha, Amin Vahdat. 1-8 [doi]
- WiMFlow: a distributed, self-adaptive architecture for flow monitoring in Wireless Mesh NetworksCristian Popi, Olivier Festor. 9-16 [doi]
- A cross-layer cooperative method for IEEE 802.16 mesh networksYun Li, Yanqiu Huang, Chonggang Wang, Xiaohu You, Ali Daneshmand. 17-23 [doi]
- An architecture and implementation for IP Network and Service Quality MeasurementsPeter Racz, Daniel Donni, Burkhard Stiller. 24-31 [doi]
- Redundant virtual machine placement for fault-tolerant consolidated server clustersFumio Machida, Masahiro Kawato, Yoshiharu Maeno. 32-39 [doi]
- Optimized network configuration parameter assignment based on graph coloringTobias Bandh, Georg Carle, Henning Sanneck, Lars-Christoph Schmelz, Raphael Romeikat, Bernhard Bauer. 40-47 [doi]
- Elements of system design optimization in service quality managementNikos Anerousis, Yixin Diao, Aliza Heching. 48-55 [doi]
- Automated runtime risk management for voice over IP networks and servicesOussema Dabbebi, Remi Badonnel, Olivier Festor. 57-64 [doi]
- Automating the delivery of IT Service Continuity Management through cloud service orchestrationMarkus Klems, Stefan Tai, Larisa Shwartz, Genady Grabarnik. 65-72 [doi]
- Interactive SNMP traffic analysis through information visualizationPaulo Teles Barbosa, Lisandro Zambenedetti Granville. 73-79 [doi]
- SMON: Self-Managed Overlay Networks for managing distributed applicationsChongnan Gao, Hongliang Yu, Guangyu Shi, Jian Chen, Weimin Zheng. 80-87 [doi]
- Analysis of P2P file sharing network s credit system for fairness managementYunzhao Li, Don Gruenbacher. 88-95 [doi]
- Online detection of utility cloud anomalies using metric distributionsChengwei Wang, Vanish Talwar, Karsten Schwan, Parthasarathy Ranganathan. 96-103 [doi]
- Virtual Hypervisor: Enabling fair and economical resource partitioning in cloud environmentsMichael R. Head, Andrzej Kochut, Charles Schulz, Hidayatullah Shaikh. 104-111 [doi]
- Kahuna: Problem diagnosis for Mapreduce-based cloud computing environmentsJiaqi Tan, Xinghao Pan, Eugene Marinelli, Soila Kavulya, Rajeev Gandhi, Priya Narasimhan. 112-119 [doi]
- TANSO: A componentized distributed service foundation in cloud environmentLi Li, Ruixiong Tian, Bo Yang, Haiping Huang, Hao Liu, Kai Shuang. 120-127 [doi]
- Extended topic map: Knowledge collaborative building for distributed knowledge resourceHuimin Lu, Boqin Feng, Xi Chen. 128-135 [doi]
- A model of information systems operation and maintenance process complexityGang Xiao, Feng Han, Jian-Xin Wang. 136-143 [doi]
- Information-theoretic treatment of sensor measurements in network systemsK. Ravindran. 144-151 [doi]
- Dynamic obligation specification and negotiationMario Lischka. 155-162 [doi]
- In-home and remote QoS control for home networksB. Loew, Hao Hu, Hans-Jörg Kolbe, Michael Stier, T. Dietz, Marcus Brunner. 163-170 [doi]
- Estimations of additional delays for mobile application data from Comparative Output-Input throughput AnalysisKatarzyna Wac, Markus Fiedler, Richard Bults, Hermie Hermens. 171-178 [doi]
- Analysis of SIP retransmission probability using a Markov-Modulated Poisson Process modelYang Hong, Changcheng Huang, James Yan. 179-186 [doi]
- Identifying symptoms of recurrent faults in log files of distributed information systemsThomas Reidemeister, Mohammad Ahmad Munawar, Paul A. S. Ward. 187-194 [doi]
- Hybrid architecture for resource reservation in IP based mobile networksHai Lin, Houda Labiod. 195-200 [doi]
- A trust-incentive-based combinatorial double auction algorithmKun Wang, Li Li, David Hausheer, Zhiyong Liu, Wei Li, Denian Shi, Guili He, Burkhard Stiller. 209-215 [doi]
- VeTo: An exploit prevention language from known vulnerabilities in SIP servicesAbdelkader Lahmadi, Olivier Festor. 216-223 [doi]
- Distributed approaches to S-CSCF selection in an IMS networkPlarent Tirana, Deep Medhi. 224-231 [doi]
- IMS network deployment cost optimization based on flow-based traffic modelJie Xiao, Changcheng Huang, James Yan. 232-239 [doi]
- Business-driven management of differentiated servicesJavier Rubio-Loyola, Marinos Charalambides, Issam Aib, Joan Serrat, George Pavlou, Raouf Boutaba. 240-247 [doi]
- On strategies for planning the assignment of human resources to IT change activitiesRoben Castagna Lunardi, Fabrício Girardi Andreis, Weverton Luis da Costa Cordeiro, Juliano Araujo Wickboldt, Bruno Lopes Dalmazo, Ricardo Luis dos Santos, Luís Armando Bianchin, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, Claudio Bartolini. 248-255 [doi]
- Modeling IT support organizations from transactional logsClaudio Bartolini, Cesare Stefanelli, Mauro Tortonesi. 256-263 [doi]
- Packet sampling for worm and botnet detection in TCP connectionsLothar Braun, Gerhard Münz, Georg Carle. 264-271 [doi]
- QoS control mechanism based on flow rate to improve quality of short flows and low-rate flowsKenji Yokota, Takuya Asaka, Tatsuro Takahashi. 272-277 [doi]
- SCRIPT: A framework for Scalable Real-time IP Flow Record AnalysisCristian Morariu, Peter Racz, Burkhard Stiller. 278-285 [doi]
- An effective similarity metric for application traffic classificationJae Yoon Chung, Byungchul Park, Young J. Won, John Strassner, James W. Hong. 286-292 [doi]
- Doing don ts: Modifying BGP attributes within an autonomous systemLuca Cittadini, Stefano Vissicchio, Giuseppe Di Battista. 293-300 [doi]
- DA VINCI: A tool to improve VoIP call routing configurationsKunwadee Sripanidkulchai, Shu Tao, Zon-Yin Shae. 301-308 [doi]
- Optimizing unique shortest paths for resilient routing and fast reroute in IP-based networksDavid Hock, Matthias Hartmann, Michael Menth, Christian Schwartz. 309-316 [doi]
- A dynamic Peer-to-Peer traffic limiting policy for ISP networksChaojiong Wang, Ning Wang, Michael P. Howarth, George Pavlou. 317-324 [doi]
- Using resource-level information into nonadditive negotiation models for cloud Market environmentsMario Macías, Jordi Guitart. 325-332 [doi]
- DReaM-Cache: Distributed Real-Time Transaction Memory Cache to support two-factor authentication services and its reliabilityHaiyang Qian, Chandra Sekhar Surapaneni, Marsh Ray, Steve Dispensa, Deep Medhi. 333-340 [doi]
- Exploiting non-dedicated resources for cloud computingArtur Andrzejak, Derrick Kondo, David P. Anderson. 341-348 [doi]
- Bayesian decision aggregation in collaborative intrusion detection networksCarol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar. 349-356 [doi]
- End-to-end disaster recovery planning: From art to scienceTapan Kumar Nayak, Ramani Routray, Aameek Singh, Sandeep Uttamchandani, Akshat Verma. 357-364 [doi]
- Multilayer failure detection method for network services based on distributed componentsEisuke Hirota, Kazuhiko Kinoshita, Hideki Tode, Koso Murakami, Shinji Kikuchi, Satoshi Tsuchiya, Atsuji Sekiguchi, Tsuneo Katsuyama. 365-372 [doi]
- Performance-driven task co-scheduling for MapReduce environmentsJorda Polo, David Carrera, Yolanda Becerra, Malgorzata Steinder, Ian Whalley. 373-380 [doi]
- Runtime Demand Estimation for effective dynamic resource managementCanturk Isci, James E. Hanson, Ian Whalley, Malgorzata Steinder, Jeffrey O. Kephart. 381-388 [doi]
- Management intelligence for optimal resource allocations in network server systemsKaliappa Ravindran, Mohammad Rabby, Shereef Elmetwaly. 389-396 [doi]
- Computer-generated comprehensive risk assessment for IT project managementJuliano Araujo Wickboldt, Luís Armando Bianchin, Roben Castagna Lunardi, Fabrício Girardi Andreis, Ricardo Luis dos Santos, Bruno Lopes Dalmazo, Weverton Luis da Costa Cordeiro, Abraham Lincoln Rabelo de Sousa, Lisandro Zambenedetti Granville, Luciano Paschoal Gaspary, Claudio Bartolini. 400-407 [doi]
- Learning from past experiences to enhance decision support in IT change managementMaher Rahmouni, Claudio Bartolini. 408-415 [doi]
- Value-driven IT service portfolio selection under uncertaintyJ. Augusto Oliveira, Jacques Philippe Sauvé, Antão Moura, Magno Queiroz, Claudio Bartolini, Marianne Hickey. 416-423 [doi]
- New packet aggregation schemes for multimedia applications in WLANMangalathu Jibukumar, Raja Datta, Prabir K. Biswas. 424-431 [doi]
- Virtual ad hoc network testbeds for network-aware applicationsConstantin Serban, Alexander Poylisher, Cho-Yu Jason Chiang. 432-439 [doi]
- A self-adaptive method of task allocation in clustering-based MANETsYang Yang, Xuesong Qiu, Luoming Meng, Lan-lan Rui. 440-447 [doi]
- Cognitive passive estimation of available bandwidth (cPEAB) in overlapped IEEE 802.11 WiFi WLANsShahnaza Tursunova, Khamidulla Inoyatov, Young-Tak Kim. 448-454 [doi]
- Checkpoint-based fault-tolerant infrastructure for virtualized service providersIñigo Goiri, Ferran Julià, Jordi Guitart, Jordi Torres. 455-462 [doi]
- Distributed autonomic resource management for network virtualizationClarissa Cassales Marquezan, Lisandro Zambenedetti Granville, Giorgio Nunzi, Marcus Brunner. 463-470 [doi]
- Multi-provider service negotiation and contracting in network virtualizationFida-E. Zaheer, Jin Xiao, Raouf Boutaba. 471-478 [doi]
- Dynamic resource allocation and power management in virtualized data centersRahul Urgaonkar, Ulas C. Kozat, Ken Igarashi, Michael J. Neely. 479-486 [doi]
- On the feasibility of Web 2.0 technologies for network management: A mashup-based approachRafael Santos Bezerra, Carlos Raniery Paula dos Santos, Leandro Marcio Bertholdo, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 487-494 [doi]
- Combining identity federation with Payment: The SAML-based Payment ProtocolDavid J. Lutz, Burkhard Stiller. 495-502 [doi]
- ROCS: a remotely provisioned OSGi framework for ambient systemsStéphane Frénot, Noha Ibrahim, Frédéric Le Mouël, Amira Ben Hamida, Julien Ponge, Mathieu Chantrel, Denis Beras. 503-510 [doi]
- Towards adaptive policy-based managementRaphael M. Bahati, Michael A. Bauer. 511-518 [doi]
- Consistency maintenance of policy states in decentralized autonomic network managementJéferson Campos Nobre, Lisandro Zambenedetti Granville. 519-526 [doi]
- Towards an Information Management Overlay for emerging networksLefteris Mamatas, Stuart Clayman, Marinos Charalambides, Alex Galis, George Pavlou. 527-534 [doi]
- Individually targeted radio network optimizationHiroto Sugahara, Yuma Matsuda, Kosei Kobayashi, Yoshinori Watanabe, Yasuhiko Matsunaga, Kin Ming Chan, Kenneth Ko. 535-542 [doi]
- Multi-aspect hardware management in enterprise server consolidationJames E. Hanson, Ian Whalley, Malgorzata Steinder, Jeffrey O. Kephart. 543-550 [doi]
- Hardware performance counter-based problem diagnosis for e-commerce systemsKeith A. Bare, Soila Kavulya, Priya Narasimhan. 551-558 [doi]
- Choking polluters in BitTorrent file sharing communitiesFlavio Roberto Santos, Weverton Luis da Costa Cordeiro, Luciano Paschoal Gaspary, Marinho P. Barcellos. 559-566 [doi]
- Supporting System-wide Similarity Queries for networked system managementSongyun Duan, Hui Zhang 0002, Guofei Jiang, Xiaoqiao Meng. 567-574 [doi]
- Ontological generation of filter rules for context exchange in autonomic multimedia networksSteven Latré, Sven van der Meer, Filip De Turck, John Strassner, James Won-Ki Hong. 575-582 [doi]
- Traffic control through bilateral cooperation between network operators and peers in P2P networksHyunYong Lee, Akihiro Nakao, JongWon Kim. 583-590 [doi]
- PaCRA: A Path-aware Content Replication Approach to support QoS guaranteed video on demand service in metropolitan IPTV networksGajaruban Kandavanam, Dmitri Botvich, Sasitharan Balasubramaniam. 591-598 [doi]
- On topology construction in layered P2P live streaming networksRunzhi Li, Qishi Wu, Yunyue Lin, Xukang Lu, Zongmin Wang. 599-606 [doi]
- Impact of topology on parallel video streamingNoriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Shigeaki Harada, Haruhisa Hasegawa. 607-614 [doi]
- Integrated management of application performance, power and cooling in data centersYuan Chen, Daniel Gmach, Chris Hyser, Zhikui Wang, Cullen Bash, Christopher Hoover, Sharad Singhal. 615-622 [doi]
- NETradamus: A forecasting system for system event messagesAlexander Clemm, Malte Hartwig. 623-630 [doi]
- Extending a knowledge-based network to support temporal event reasoningJohn Keeney, Clay Stevens, Declan O Sullivan. 631-638 [doi]
- Configuration discovery and monitoring middleware for enterprise datacentersSandip Agarwala, Luis Angel D. Bathen, Divyesh Jadav, Ramani Routray. 639-646 [doi]
- Cluster aware storage resource provisioning in a data centerSandip Agarwala, Ramani Routray. 647-660 [doi]
- Power reduction effect of higher room temperature operation in data centersKenichi Muroya, Takeshi Kinoshita, Hiroyuki Tanaka, Minori Youro. 661-673 [doi]
- End-to-end YANG-based configuration managementEmmanuel Nataf, Olivier Festor. 674-684 [doi]
- Implementing a Service Desk: A practitioner s perspectiveAlexander Keller, Tyson Midboe. 685-696 [doi]
- A search engine for systems managementMetin Feridun, Axel Tanner. 697-710 [doi]
- CASFI Data Sharing PlatformNicolas Aycirieix, Sue Moon. 711-723 [doi]
- Risk identification and project health prediction in IT service managementGeraldine Abbott, Nikos Anerousis, Forrest Gordon, Allen Grussing, Sergey Makogon, Paul Manore, Fiona Humphries, Joan Sherry, Shu Tao. 724-733 [doi]
- Fault locaization mechanism using integrated resource information model in next generation networkMasanori Miyazawa, Munefumi Tsurusawa. 734-747 [doi]
- Architecture for inter-domain service deliveryHélia Pouyllau, Richard Douville, Veronique Piperaud, Remi Theillaud. 748-762 [doi]
- Benchmark-based assessment of outtasking, outsourcing, and managed services for mobile network operatorsThomas Frisanco. 763-776 [doi]
- Secure large fiille transfer over mulltiiplle network pathsDan Moser, Enriique Cano, Peter Racz. 777-792 [doi]
- Network distance based coordinate systems for P2P multimedia streamingSanghwan Lee, Sambit Sahu. 793-796 [doi]
- WIND: A scalable and lightweight network topology service for peer-to-peer applicationsHongqiang Liu, Yongqiang Xiong, CongXiao Bao, Xing Li, Guobin Shen, Dan Li. 797-800 [doi]
- Improved steiner tree algorithm applied to P2MP traffic engineeringHiroshi Matsuura, Naotaka Morita, Kazumasa Takami. 801-804 [doi]
- Dimensioning of overlay networks for P2P multicastingKrzysztof Walkowiak. 805-808 [doi]
- Energy-saving set-top box enhancement in BitTorrent networksYong-Ju Lee, Jin-Hwan Jeong, Hag-Young Kim, Cheol-Hoon Lee. 809-812 [doi]
- A generic model for the management of virtual network environmentsWalter Fuertes, Jorge E. López de Vergara, F. Meneses, Fermín Galán Márquez. 813-816 [doi]
- On Evaluating JARS: Job history-based Adaptive grid resource selectionCinyoung Hur, Yoonhee Kim. 817-820 [doi]
- Towards intelligent scheduling of multimedia content in future access networksJeroen Famaey, Wim Van de Meerssche, Steven Latré, Stijn Melis, Tim Wauters, Filip De Turck, Koen De Schepper, Bart De Vleeschauwer, Rafael Huysegems. 821-824 [doi]
- Cell BE and Bluetooth applied to Digital TVAislan Gomide Foina, Javier Javier Ramirez Fernandez, Rosa M. Badia. 825-828 [doi]
- Service creation and execution with the Service Refinement CycleCarlos Alberto Kamienski, Ramide Dantas, Joseane Farias Fildago, Djamel Sadok, Börje Ohlman. 829-832 [doi]
- Analysis of spam mail sent to Japanese mail addresses in the long termDaisuke Yamakawa, Noriaki Yoshiura. 833-836 [doi]
- Manageability of the internet: Management with new functionalitySung-Su Kim, Young J. Won, John Strassner, James Won-Ki Hong. 837-840 [doi]
- Study on performance management and application behavior in virtualized environmentPengCheng Xiong, Zhikui Wang, Gueyoung Jung, Calton Pu. 841-844 [doi]
- Federation, a matter of autonomic management in the Future InternetMartin Serrano, Sven van der Meer, V. Holum, J. Murphy, John Strassner. 845-849 [doi]
- A quadtree-based location management scheme for wireless sensor networksChih-Yu Lin. 850-853 [doi]
- A multi-dimensional data storage algorithm in wireless sensor networksWen-Hwa Liao, Chun-Chu Chen. 854-857 [doi]
- A centralized scheduling algorithm for WiMAX mesh networkWen-Hwa Liao, Sital Prasad Kedia, Avinash Kumar Dubey. 858-861 [doi]
- Availability and effectiveness of root DNS servers: A long term studyBu-Sung Lee, Yu Shyang Tan, Yuji Sekiya, Atsushi Narishige, Susumu Date. 862-865 [doi]
- A resilient architecture for automated fault tolerance in virtualized data centersWai-Leong Yeow, Cédric Westphal, Ulas C. Kozat. 866-869 [doi]
- Wireless sensor network for disaster managementRone Ilidio da Silva, Virgil Del Duca Almeida, Andre Marques Poersch, José Marcos S. Nogueira. 870-873 [doi]
- Congestion control alternatives for residential broadband accessGeorge Kesidis. 874-877 [doi]
- Design of a rule engine for analyzing messages from network elementsJeong Ho Lee, Hyun-seop Jeong, Sung-sook Yoon, Dong Il Kim, Soon Yong Song, Byung-Deok Chung. 878-881 [doi]
- Detecting and recovering prefix hijacking using multi-agent inter-AS diagnostic systemSaburo Seto, Naoki Tateishi, Manabu Nishio, Hikaru Seshake. 882-885 [doi]
- Secure setup of inter-provider Ethernet services based on a novel naming schemaBernhard Lichtinger, Oliver Hanka. 886-889 [doi]
- Management through cross-layer design in mobile tactical networksDavid Kidston, Li Li. 890-893 [doi]
- DDoS defense as a network servicePing Du, Akihiro Nakao. 894-897 [doi]
- Knowledge-enhanced change audit for configuration managementBo Yang. 898-901 [doi]
- Scalable network emulator architecture to support IP+optical network managementEiji Oki, Nattapong Kitsuwan, Shunichi Tsunoda, Takashi Miyamura, Akeo Masuda, Kohei Shiomoto. 902-905 [doi]
- VLS: Simulated system management test infrastructure as a serviceRamani Routray, Shripad Nadgowda. 906-909 [doi]
- Measuring available path capacity using short probe trainsMartin Nilsson. 910-913 [doi]
- A dependency modeling approach for the management of ontology based integration systemsAidan Boran, Declan O Sullivan, Vincent Wade. 914-917 [doi]
- Fast and accurate flow counting algorithm for the management of IP networksShan Zhu, Satoru Ohta. 918-921 [doi]
- IM-DB: Information retrieval system for interactive network-status analysisAtsushi Terauchi, Osamu Akashi, Kensuke Fukuda. 922-925 [doi]
- Using linked data for systems managementMetin Feridun, Axel Tanner. 926-929 [doi]
- Resource management in large scale experimental facilitiesKonrad Campowsky, Thomas Magedanz, Sebastian Wahle. 930-933 [doi]
- Service oriented architecture realized by a messaging networkJunya Terazono, Hideyuki Fukuhara, Isamu Koseda, Ryutaroh Fujita, Toshiaki Miyazaki, Senro Saito, Takafumi Hayashi. 934-937 [doi]
- Network traffic prediction using PCA and K-meansRaimir Holanda Filho, José Everardo Bessa Maia. 938-941 [doi]
- Modeling the propagation of Peer-to-Peer worms under quarantineXiang Fan, Yang Xiang. 942-945 [doi]
- Context based configuration management of plug & play LTE base stationsHenning Sanneck, Yves Bouwen, Eddy Troch. 946-949 [doi]