Abstract is missing.
- Cost-effective complex service mapping in cloud infrastructuresKhanh-Toan Tran, Nazim Agoulmine, Youssef Iraqi. 1-8 [doi]
- CloudMap: Workload-aware placement in private heterogeneous cloudsBalaji Viswanathan, Akshat Verma, Sourav Dutta. 9-16 [doi]
- Feature placement algorithms for high-variability applications in cloud environmentsHendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck. 17-24 [doi]
- Adapting data-intensive workloads to generic allocation policies in cloud infrastructuresIoannis Kitsos, Antonis Papaioannou, Nikos Tsikoudis, Kostas Magoutis. 25-33 [doi]
- Optimizing system monitoring configurations for non-actionable alertsLiang Tang, Tao Li, Florian Pinel, Larisa Shwartz, Genady Grabarnik. 34-42 [doi]
- Using a semantic knowledge base for communication service quality management in Home Area NetworksLiam Fallon, Declan O'Sullivan. 43-51 [doi]
- Interactive learning of alert signatures in High Performance Cluster system logsAdetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. 52-60 [doi]
- Closed loop performance management for service delivery systemsYixin Diao, Aliza Heching. 61-69 [doi]
- Hercules: Integrated control framework for datacenter traffic managementWonho Kim, Puneet Sharma. 70-78 [doi]
- Ranking anomalies in data centersKrishnamurthy Viswanathan, Choudur Lakshminarayan, Vanish Talwar, Chengwei Wang, Greg Macdonald, Wade Satterfield. 79-87 [doi]
- CrossRoads: Seamless VM mobility across data centers through software defined networkingVijay Mann, Anilkumar Vishnoi, Kalapriya Kannan, Shivkumar Kalyanaraman. 88-96 [doi]
- Fault tolerance in spatial query processing for Wireless Sensor NetworksRone Ilidio da Silva, Daniel Fernandes Macedo, José Marcos S. Nogueira. 97-104 [doi]
- A secure routing protocol for wireless sensor networks with consideration of energy efficiencyHuei-Wen Ferng, Dian Rachmarini. 105-112 [doi]
- An efficient data acquisition model for urban sensor networksSergio S. Furlaneto, Aldri L. dos Santos, Carmem S. Hara. 113-120 [doi]
- Autonomic cache management in Information-Centric NetworksVasilis Sourlas, Paris Flegkas, Lazaros Gkatzikis, Leandros Tassiulas. 121-129 [doi]
- FedRR - A Federated Resource Reservation algorithm for multimedia servicesJeroen Famaey, Steven Latré, Tim Wauters, Filip De Turck. 130-137 [doi]
- An inter-AS routing component for software-defined networksRicardo Bennesby, Paulo Fonseca, Edjard Mota, Alexandre Passito. 138-145 [doi]
- Management by network searchMisbah Uddin, Rolf Stadler, Alexander Clemm. 146-154 [doi]
- Deterministic Finite Automaton for scalable traffic identification: The power of compressing by rangeRafael Antonello, Stenio F. L. Fernandes, Djamel Sadok, Judith Kelner, Geza Szabo. 155-162 [doi]
- Model-based real-time volume control for interactive network traffic replayWeibo Chu, Xiaohong Guan, Lixin Gao, Zhongmin Cai. 163-170 [doi]
- Cost-aware replication for dataflowsClaris Castillo, Asser N. Tantawi, Diana Arroyo, Malgorzata Steinder. 171-178 [doi]
- Leveraging local image redundancy for efficient virtual machine provisioningAndrzej Kochut, Alexei Karve. 179-187 [doi]
- CloudVS: Enabling version control for virtual machines in an open-source cloud under commodity settingsChung Pan Tang, Tsz Yeung Wong, Patrick P. C. Lee. 188-195 [doi]
- Virtual machine migration in an over-committed cloudXiangliang Zhang, Zon-Yin Shae, Shuai Zheng, Hani Jamjoom. 196-203 [doi]
- An adaptive hybrid elasticity controller for cloud infrastructuresAhmed Ali-Eldin, Johan Tordsson, Erik Elmroth. 204-212 [doi]
- CloudAffinity: A framework for matching servers to cloudmatesMarcos Dias de Assunção, Marco Aurélio Stelmar Netto, Brian Peterson, Lakshminarayanan Renganarayana, John J. Rofrano, Chris Ward, Chris Young. 213-220 [doi]
- Optimization for time-driven link sleeping reconfigurations in ISP backbone networksFrédéric François, Ning Wang, Klaus Moessner, Stylianos Georgoulas. 221-228 [doi]
- An optimized seamless IP flow mobility management architecture for traffic offloadingJinho Kim, Yasufumi Morioka, Junichiro Hagiwara. 229-236 [doi]
- Monitoring the status of MPLS VPN and VPLS based on BGP signaling informationGiuseppe Di Battista, Massimo Rimondini, Giorgio Sadolfo. 237-244 [doi]
- Optimization of flow record handling by applying a decentralized cooperative semantic caching approachAndrei Vancea, Laurent d'Orazio, Burkhard Stiller. 245-252 [doi]
- On network intrusion detection for deployment in the wildSun-il Kim, Nnamdi Nwanze, William Edmonds, Blake Johnson, Paloma Field. 253-260 [doi]
- Dynamic exposure control in P2PSIP networksOussema Dabbebi, Remi Badonnel, Olivier Festor. 261-268 [doi]
- The effects of DDoS attacks on flow monitoring applicationsRamin Sadre, Anna Sperotto, Aiko Pras. 269-277 [doi]
- A bio-inspired scheme on quorum systems for reliable services data management in MANETsElisa Mannes, Michele Nogueira, Aldri Luiz dos Santos. 278-285 [doi]
- An optimal channel assignment strategy for WLANs using distributed optimizationTânia L. Monteiro, Guy Pujolle, Marcelo Eduardo Pellenz, Manoel Camillo Penna, Richard Demo Souza. 286-292 [doi]
- MeshAdmin: An integrated platform for wireless mesh network managementRafael De Tommaso do Valle, Débora Christina Muchaluat-Saade. 293-301 [doi]
- Shared Content Addressing Protocol (SCAP): Optimizing multimedia content distribution at the transport layerKoen De Schepper, Bart De Vleeschauwer, Chris Hawinkel, Werner Van Leekwijck, Jeroen Famaey, Wim Van de Meerssche, Filip De Turck. 302-310 [doi]
- Analyzing caching benefits for YouTube traffic in edge networks - A measurement-based evaluationLothar Braun, Alexander Klein, Georg Carle, Helmut Reiser, Jochen Eisl. 311-318 [doi]
- Revenue-maximizing server selection and admission control for IPTV content servers using available bandwidth estimatesBrian Meskill, Alan Davy, Brendan Jennings. 319-326 [doi]
- Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networksAdler Hoff Schmidt, Rodolfo Stoffel Antunes, Marinho P. Barcellos, Luciano Paschoal Gaspary. 327-334 [doi]
- Towards the assessment of distributed vulnerabilities in autonomic networks and systemsMartín Barrère, Remi Badonnel, Olivier Festor. 335-342 [doi]
- Internet bad neighborhoods aggregationGiovane Cesar Moreira Moura, Ramin Sadre, Anna Sperotto, Aiko Pras. 343-350 [doi]
- An evasive attack on SNORT flowbitsTung Tran, Issam Aib, Ehab Al-Shaer, Raouf Boutaba. 351-358 [doi]
- PCA-subspace method - Is it good enough for network-wide anomaly detectionBin Zhang 0016, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao. 359-367 [doi]
- Efficient verification of IT change operations or: How we could have prevented Amazon's cloud outageSebastian Hagen, Michael Seibold, Alfons Kemper. 368-376 [doi]
- Modeling IT support organizations using multiple-priority queuesClaudio Bartolini, Cesare Stefanelli, Mauro Tortonesi. 377-384 [doi]
- A BPM-based solution for inter-domain circuit managementJose Jair Cardoso de Santanna, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville. 385-392 [doi]
- Maximizing profit using SLA-aware provisioningAnanya Das. 393-400 [doi]
- A framework for the design and evaluation of network resilience managementAlberto E. Schaeffer Filho, Paul Smith, Andreas Mauthe, David Hutchison, Yue Yu, Michael Fry. 401-408 [doi]
- A highly available transaction processing system with non-disruptive failure handlingGong Su, Arun Iyengar. 409-416 [doi]
- DACoRM: A coordinated, decentralized and adaptive network resource management schemeDaphné Tuncer, Marinos Charalambides, George Pavlou, N. Wang. 417-425 [doi]
- End-to-end verification of QoS policiesAdel El-Atawy, Taghrid Samak. 426-434 [doi]
- Distributed multi-agent algorithm for residential energy management in smart gridsKevin Mets, Matthias Strobbe, Tom Verschueren, Thomas Roelens, Filip De Turck, Chris Develder. 435-443 [doi]
- Energy consumption analysis of video streaming to Android mobile devicesRamona Trestian, Arghir-Nicolae Moldovan, Olga Ormond, Gabriel-Miro Muntean. 444-452 [doi]
- Towards energy-awareness in managing wireless LAN applicationsMarkus Tauber, Saleem N. Bhatti, Yi Yu. 453-461 [doi]
- Adaptive multiuser detection in DS/CDMA systems using generalized regression neural networkMohsen Rajabpour, Farbod Razzazi, Hamidreza Bakhshi. 462-465 [doi]
- Firewall anomaly detection with a model checker for visibility logicBassam Khorchani, Sylvain Hallé, Roger Villemaire. 466-469 [doi]
- Towards modeling effect of packet-level TCP dynamics on Internet operations and managementVladimir Marbukh. 470-473 [doi]
- Designing standard service offerings for reducing IT service management costSanghwan Lee, Sambit Sahu, Rajeev Puri. 474-477 [doi]
- An energy-efficient data storage scheme in wireless sensor networksWen-Hwa Liao, Hung-Chun Yang. 478-481 [doi]
- Effective load balancing in Ethernet ringsKwang-Koog Lee, Jeong-dong Ryoo, Sun Me Kim, Jong-Hyun Lee. 482-485 [doi]
- VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploitsRyan Farley, Xinyuan Wang. 486-489 [doi]
- Converged network and device management for data offloadingAntonis Hadjiantonis, Georgios Ellinas. 490-493 [doi]
- Thoughts on the Internet architecture from a modern enterprise network outageBenjamin Ujcich, Kuang-Ching Wang, Brian Parker, Daniel Schmiedt. 494-497 [doi]
- A distance-based method to detect anomalous attributes in log filesStefan Hommes, Radu State, Thomas Engel. 498-501 [doi]
- Intelligent cloud capacity managementYexi Jiang, Chang-Shing Perng, Tao Li, Rong N. Chang. 502-505 [doi]
- Aggregation-based spectrum allocation algorithm in cognitive radio networksYun Li, Lili Zhao, Chonggang Wang, Ali Daneshmand, Qing Hu. 506-509 [doi]
- SAFEM: Scalable analysis of flows with entropic measures and SVMJérôme François, Cynthia Wagner, Radu State, Thomas Engel. 510-513 [doi]
- Multi-observer privacy-preserving Hidden Markov ModelsHung X. Nguyen, Matthew Roughan. 514-517 [doi]
- A first look into SCADA network trafficRafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras. 518-521 [doi]
- Tracking configuration changes proactively in large IT environmentsManoj Soni, Venkateswara Reddy Madduri, Manish Gupta 0007, Pradipta De. 522-525 [doi]
- An object tracking scheme for wireless sensor networks using data mining mechanismWen-Hwa Liao, Kuo-Chiang Chang, Sital Prasad Kedia. 526-529 [doi]
- xAccess: A unified user-centric access control framework for web applicationsKapil Singh. 530-533 [doi]
- What's going on in Chinese IPv6 worldLei Gao, Jiahai Yang, Hui Zhang, Donghong Qin, Bin Zhang. 534-537 [doi]
- Estimated zone configuration for Fixed Mobile Substitution by RF fingerprintJae-Hoon Kim, Ju-Yeoul Park. 538-541 [doi]
- Network traffic anomaly detection using machine learning approachesKriangkrai Limthong, Thidarat Tawsook. 542-545 [doi]
- Spring-based geolocationStephan M. Gunther, Johann Schlamp, Georg Carle. 546-549 [doi]
- A framework to leverage domain expertise to support novice users in the visual exploration of Home Area NetworksYuqian Song, John Keeney, Owen Conlan. 550-553 [doi]
- An efficient data storage scheme for top-k query in wireless sensor networksWen-Hwa Liao, Chong-Hao Huang. 554-557 [doi]
- Universal economic analysis methodology for IT transformationsChang-Shing Perng, Rong N. Chang, Tao Tao, Edward So, Mihwa Choi, Hidayatullah Shaikh. 558-561 [doi]
- Caching techniques for rapid provisioning of virtual servers in cloud environmentPradipta De, Manish Gupta, Manoj Soni, Aditya Thatte. 562-565 [doi]
- SeCoA: Autonomous semantic service composition algorithm in symbiotic networksTim De Pauw, Bruno Volckaert, Veerle Ongenae, Filip De Turck. 566-569 [doi]
- Frequency filtering approach for data aggregation in periodic sensor networksJacques M. Bahi, Abdallah Makhoul, Maguy Medlej. 570-573 [doi]
- Distributed service control technique for detecting security attacksUdaya Kiran Tupakula, Vijay Varadharajan. 574-577 [doi]
- Prediction of failure occurrence time based on system log message pattern learningMasataka Sonoda, Yukihiro Watanabe, Yasuhide Matsumoto. 578-581 [doi]
- Extending the NetServ autonomic management capabilities using OpenFlowEmanuele Maccherani, Mauro Femminella, Jae-Woo Lee, Roberto Francescangeli, Jan Janak, Gianluca Reali, Henning Schulzrinne. 582-585 [doi]
- Content and host-centric information dissemination in delay-tolerant smartphone MANETs: An architecture and demonstrationPraveen Sharma, Jason Biddle, Aaron Daubman, Evan Fiore, Timothy Gallagher, Maximilian Merfeld, Santiago Paredes, Daniel Souza, Heather Zwahlen, Jeffrey Gottschalk, D. Marquis. 586-589 [doi]
- Policy and mechanism for carbon-aware cloud applicationsNan Deng, Christopher Stewart, Daniel Gmach, Martin F. Arlitt. 590-594 [doi]
- A QoS architecture for provisioning high quality in intelligent transportation servicesHamada Alshaer, Thierry Ernst, Arnaud de La Fortelle. 595-598 [doi]
- A dynamic flow control mechanism based on a hierarchical feedback model for data center networksKimihiro Mizutani, Osamu Akashi, Atsushi Terauchi, Takeshi Kugimoto, Mitsuru Maruyama. 599-602 [doi]
- Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor networkAlexandre Gava Menezes, Carlos Becker Westphall, Carla Merkle Westphall, Eliel Marlon de Lima Pinto. 603-606 [doi]
- An experimental evaluation of lightweight virtualization for software-defined routing platformCarlos N. A. Correa, Sidney C. de Lucena, Daniel de A. Leao Marques, Christian Esteve Rothenberg, Marcos Rogério Salvador. 607-610 [doi]
- TARWIS - A testbed management architecture for wireless sensor network testbedsPhilipp Hurni, Markus Anwander, Gerald Wagenknecht, Thomas Staub, Torsten Braun. 611-614 [doi]
- On feasibility of P2P traffic control through network performance manipulationHyunYong Lee, Masahiro Yoshida, Akihiro Nakao. 615-618 [doi]
- Optimization of fault diagnosis based on the combination of Bayesian Networks and Case-Based ReasoningLeila Bennacer, Laurent Ciavaglia, Abdelghani Chibani, Yacine Amirat, Abdelhamid Mellouk. 619-622 [doi]
- NEEM: Network energy efficiency managerPuneet Sharma, Sujata Banerjee, Deniz Demir, Srikanth Natarajan, Swamy Mandavilli. 623-626 [doi]
- Naïve Bayesian filters for log file analysis: Despam your logsRussel W. Havens, Barry Lunt, Chia-Chi Teng. 627-630 [doi]
- Virtual machine re-assignment considering migration overheadThomas Setzer, Andreas Wolke. 631-634 [doi]
- Multi-task overlapping coalition formation mechanism in wireless sensor networkXiao-fei Bao, Yang Yang, Xuesong Qiu. 635-638 [doi]
- A Future Internet architecture supporting multipath communication networksMartin Becke, Thomas Dreibholz, Hakim Adhari, Erwin P. Rathgeb. 639-642 [doi]
- Proposal and development of the Web services input validation modelRafael Bosse Brinhosa, Carla Merkle Westphall, Carlos Becker Westphall. 643-646 [doi]
- Comparing efficiency and costs of cloud computing modelsDaniel Gmach, Jerry Rolia, Ludmila Cherkasova. 647-650 [doi]
- Impact analysis of hierarchical transitions in multi-hop clustered networksDavid Palma, Marilia Curado. 651-654 [doi]
- Evaluating compressive sampling strategies for performance monitoring of data centersTingshan Huang, Nagarajan Kandasamy, Harish Sethu. 655-658 [doi]
- D-CRAS: Distributed cloud resource allocation systemGlauco Estacio Gonçalves, Marcelo Anderson Santos, Gustavo Charamba, Patricia Takako Endo, Djamel Sadok, Judith Kelner, Bob Melander, Jan-Erik Mångs. 659-662 [doi]
- Fault detection in MANETsWalee Al Mamun, Hanan Lutfiyya, David Kidston, Li Li 0009. 663-666 [doi]
- SAAM: A self-adaptive aggregation mechanism for autonomous management systemsRafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti. 667-670 [doi]
- RegSOP: A registry for service oriented programming with behavior based discoveryArun Kumar, Himanshu Chauhan, D. Janaki Ram. 671-674 [doi]
- Estimating the number of active flows from sampled packetsGuang Cheng. 675-678 [doi]
- Advance bandwidth scheduling with minimal impact on immediate reservations in high-performance networksQishi Wu, Poonam Dharam. 679-682 [doi]
- Systemic risks/benefits of selfish network operations & management in dynamic environmentVladimir Marbukh. 683-686 [doi]
- Cross-community approach for efficient information retrieval in social networkingYasuhiro Sato, Hirona Shimokawa, Shingo Ata, Ikuo Oka. 687-690 [doi]
- Patch management automation for enterprise cloudHai Huang, Salman Baset, Chunqiang Tang, Ashu Gupta, K. N. Madhu Sudhan, Fazal Feroze, Rajesh Garg, Sumithra Ravichandran. 691-705 [doi]
- Network-based synchronizing control of a practical microgridChanghee Cho, Jin-Hong Jeon, Jong-Yul Kim, Soonman Kwon, Sungshin Kim. 706-720 [doi]
- A novel mechanism for rapid provisioning virtual machines of cloud servicesChun-Hao Liao, Chi-Sheng Wu, Hey-Chyi Young, Kuo-Hua Chang, Hsien-Hui Huang, Chia-Ching Hsu, Kuan-Hsiung Liang. 721-735 [doi]
- Privileged identity management in enterprise service-hosting environmentsKumar Bhaskaran, Milton Hernandez, Jim Laredo, Laura Luan, Yaoping Ruan, Maja Vukovic, Paul Driscoll, Daniel Miller, Alan Skinner, Girish Verma, Prema Vivekanandan, Leanne Chen, Gregory Gaskill. 736-749 [doi]
- Integrated user activity monitoring for regulatory servicesMattias Marder, Kumar Bhaskaran, Milton Hernandez, Jim Laredo, Daniela Rosu, Yaoping Ruan, Paul Driscoll, Alan Skinner. 750-763 [doi]
- IDEAL-TRAFFIC: A self-adaptive management framework for building monitoring applications with support to network topology changesSaul Emanuel Delabrida, Ricardo Augusto Rabelo Oliveira, Alvaro R. Pereira. 764-779 [doi]
- Test environment for QoS testing of VoIP over LTEAlmudena Díaz, Pedro Merino, Francisco Javier Rivas. 780-794 [doi]
- Change Risk Expert: Leveraging advanced classification and risk management techniques for systematic change failure reductionSinem Güven, Catalin Mihai Barbu, Dirk Husemann, Dorothea Wiesmann. 795-809 [doi]
- Hierarchical resource model-driven performance analysis with dynamic data controlMasanori Miyazawa. 810-822 [doi]
- A service optimization model on convergent network-based service delivery platformJun-Ping Wang, Qi Liang Zhu, Van Ma. 823-837 [doi]
- Share and visualize your data using the perfSONAR NC frameworkArne Øslebø. 838-852 [doi]
- Automating the generation, deployment and application of charging schemes for composed communications servicesLei Xu 0004, Brendan Jennings. 853-859 [doi]
- A hybrid approach to operating system discovery based on diagnosis theoryFrançois Gagnon, Babak Esfandiari. 860-865 [doi]
- Integrated detection of anomalous behavior of computer infrastructuresFederico Maggi, Stefano Zanero. 866-871 [doi]
- Autonomic Quality of Experience management of multimedia networksSteven Latré, Filip De Turck. 872-879 [doi]
- Rethinking network management: Models, data-mining and self-learningStefan Wallin, Christer Åhlund, Johan Nordlander. 880-886 [doi]
- Topology management for mission critical networks: Applying supply and demand to manage public safety networksDaniel Câmara, Christian Bonnet, Fethi Filali. 887-892 [doi]
- Performance problems diagnosis in cloud computing systems by mining request trace logsHaibo Mi, Huaimin Wang, Gang Yin, Hua Cai, Qi Zhou, Tingtao Sun. 893-899 [doi]
- Deadline-based workload management for MapReduce environments: Pieces of the performance puzzleAbhishek Verma, Ludmila Cherkasova, Vijay S. Kumar, Roy H. Campbell. 900-905 [doi]
- Workflow scheduling for SaaS / PaaS cloud providers considering two SLA levelsThiago A. L. Genez, Luiz F. Bittencourt, Edmundo R. M. Madeira. 906-912 [doi]
- Dynamic prioritization of transactions using threshold-pricesChristian Markl, Thomas Setzer. 913-918 [doi]
- Improving network services resilience through automatic service node configuration generationMiguel Lopes, Antonio Costa, Bruno Dias. 919-925 [doi]
- A state-based availability model to shared mesh protection in MPLS-TP networks with preemption supportEdgard Jamhour, Manoel Camillo Penna. 926-932 [doi]
- A replication component for resilient OpenFlow-based networkingPaulo Fonseca, Ricardo Bennesby, Edjard Mota, Alexandre Passito. 933-939 [doi]
- A novel crash-tolerant data gathering in wireless sensor networks Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar. 940-946 [doi]
- Supervisory control as pattern for integrated IT managementSven Graupner, Daniel Gmach. 947-952 [doi]
- A cloud-based solution for the performance improvement of IT support organizationsClaudio Bartolini, Cesare Stefanelli, Davide Targa, Mauro Tortonesi. 953-960 [doi]
- A learning feature engineering method for task assignmentDavid Loewenstern, Florian Pinel, Larisa Shwartz, Maira Gatti, Ricardo Herrmann, Victor Cavalcante. 961-967 [doi]
- Adaptive weighted scheme for improving mobile sensor node connectivity in IEEE 802.15.4 networksMin-Chieh Yu, Jenq-Shiou Leu. 968-973 [doi]
- Performance assessment of cluster load balancing routing methods for triple play services in Wireless Mesh NetworksVinicius C. M. Borges, Erik Dimitrov, Marilia Curado, Edmundo Monteiro. 974-980 [doi]
- Towards network invariant fault diagnosis in MANETs via statistical modeling: The global strength of local weak decisionsAkshay Vashist, Rauf Izmailov, Kyriakos Manousakis, Ritu Chadha, C. Jason Chiang, Constantin Serban, Syeed E. Ali. 981-987 [doi]
- DNSSM: A large scale passive DNS security monitoring frameworkSamuel Marchal, Jérôme François, Cynthia Wagner, Radu State, Alexandre Dulaunoy, Thomas Engel, Olivier Festor. 988-993 [doi]
- On stochastic risk ordering of network services for proactive security managementMohamed Amezziane, Ehab Al-Shaer, Muhammad Qasim Ali. 994-1000 [doi]
- SDBF: Smart DNS brute-forcerCynthia Wagner, Jérôme François, Radu State, Thomas Engel, Gérard Wagener, Alexandre Dulaunoy. 1001-1007 [doi]
- Intelligent network management using graph differential anomaly visualizationQi Liao, Aaron Striegel. 1008-1014 [doi]
- Management of network design through molecular assemblySami J. Habib, Paulvanna Nayaki Marimuthu. 1015-1021 [doi]
- Gossip-based signaling dissemination extension for next steps in signalingMauro Femminella, Roberto Francescangeli, Gianluca Reali, Henning Schulzrinne. 1022-1028 [doi]
- Enabling open-source high speed network monitoring on NetFPGAGianni Antichi, Stefano Giordano, David J. Miller 0005, Andrew W. Moore. 1029-1035 [doi]
- Should users be entitled to use and control the devices of their choice on networks?Scott Jordan, Gwen Shaffer. 1036-1041 [doi]
- An integrated architecture for multi-homed vehicle-to-infrastructure communicationsHamada Alshaer, Thierry Ernst, Arnaud de La Fortelle. 1042-1047 [doi]
- A configuration service for home networksDimosthenis Pediaditakis, Anandha Gopalan, Naranker Dulay, Morris Sloman. 1048-1053 [doi]
- Self-management of mobile clouds in advanced wireless networksEbrahim Karami, Savo Glisic. 1054-1060 [doi]
- The impact of network performance on perceived video quality in H.264/AVCArum Kwon, Jin Xiao, Sin-Seok Seo, James Won-Ki Hong, Raouf Boutaba. 1061-1067 [doi]
- iTrack: Correlating user activity with system dataVijay Mann, Anilkumar Vishnoi. 1068-1074 [doi]
- Automated classifier generation for application-level mobile traffic identificationYeongrak Choi, Jae Yoon Chung, Byungchul Park, James Won-Ki Hong. 1075-1081 [doi]
- New models for long-term Internet traffic forecasting using artificial neural networks and flow based informationMarcio L. F. Miguel, Manoel Camillo Penna, Júlio C. Nievola, Marcelo Eduardo Pellenz. 1082-1088 [doi]
- CARMA: Complete autonomous responsible management agents for telecommunications and inter-cloud servicesHaydn Mearns, John Leaney, Artem Parakhine, John K. Debenham, Dominique Verchère. 1089-1095 [doi]
- ENM: A service oriented architecture for ontology-driven network management in heterogeneous network infrastructuresSaber Zrelli, Atsushi Ishida, Nobuo Okabe, Fumio Teraoka. 1096-1103 [doi]
- Autonomic fault management based on cognitive control loopsSung-Su Kim, Sin-Seok Seo, Joon-Myung Kang, James Won-Ki Hong. 1104-1110 [doi]
- ValidMaker: A tool for managing device configurations using logical constraintsSylvain Hallé, Eric Lunaud Ngoupe, Gaetan Nijdam, Omar Cherkaoui, Petko Valtchev, Roger Villemaire. 1111-1118 [doi]
- Efficient message-passing and autonomic management architecture for NGNsAndreas Louca, Andreas Mauthe, Alberto E. Schaeffer Filho. 1119-1126 [doi]
- Network path advising service for the future InternetXiongqi Wu, James Griffioen. 1127-1134 [doi]
- Deployment and operation of wide-area hybrid OpenFlow networksYoshihiko Kanaumi, Shuichi Saito, Eiji Kawai, Shuji Ishii, Kazumasa Kobayashi, Shinji Shimojo. 1135-1142 [doi]
- A proposal management of the legacy network environment using OpenFlow control planeFernando N. N. Farias, Joao J. Salvatti, Eduardo Cerqueira, Antonio Jorge Gomes Abelém. 1143-1150 [doi]
- Signature maintenance for Internet application traffic identification using header signaturesSung Ho Yoon, Jun-Sang Park, Myung-Sup Kim. 1151-1158 [doi]
- SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementationXuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi. 1159-1166 [doi]
- QoS-aware Network Operating System for software defined networking with Generalized OpenFlowsKwangtae Jeong, Jinwook Kim, Young-Tak Kim. 1167-1174 [doi]
- Graph clustering based provisioning algorithm for virtual network embeddingTae-Ho Lee, Shahnaza Tursunova, Taesang Choi. 1175-1178 [doi]
- Autonomies in policy based network managementMuhammad Shoaib Siddiqui, Choong Seon Hong, Mi-Jung Choi. 1179-1182 [doi]
- A multi-agent architecture for autonomic management of virtual networksMilton A. Soares, Edmundo R. M. Madeira. 1183-1186 [doi]
- A non-repudiation scheme for user postings based on BAC in Mesh networksYatao Yang, Burkhard Stiller. 1187-1190 [doi]
- Using BPEL workflow processing for cross-layer orchestrations in IP-over-optical networks: A proof of conceptMohit Chamania, Edip Demirbilek, Admela Jukan, Xavier Masip-Bruin, Marcelo Yannuzzi. 1191-1194 [doi]
- Design of an autonomous software platform for future symbiotic service managementTim De Pauw, Nelson Matthys, Bruno Volckaert, Veerle Ongenae, Sam Michiels, Filip De Turck. 1195-1198 [doi]
- Self-organizing decentralized wireless management through social-based metricsLucas Guardalben, Tomé Gomes, Paulo Salvador, Susana Sargento. 1199-1202 [doi]
- Design and evaluation of an architecture for future smart grid service provisioningMatthias Strobbe, Tom Verschueren, Kevin Mets, Stijn Melis, Chris Develder, Filip De Turck, Thierry Pollet, Stijn Van de Veire. 1203-1206 [doi]
- Protocol-level reconfigurations for infusion of resilience in distributed network servicesKaliappa Ravindran, Mohammad Rabby. 1207-1213 [doi]
- Performance analysis of Bayesian Networks-based distributed Call Admission Control for NGNAbul Bashar, Gerard Parr, Sally I. McClean, Bryan W. Scotney, Detlef Nauck. 1214-1220 [doi]
- DISco: A distributed information store for network challenges and their outcomeSylvain Martin, Laurent Chiarello, Guy Leduc. 1221-1226 [doi]
- Scalable integrated performance analysis of multi-gigabit networksEzra Kissel, Ahmed El-Hassany, Guilherme Fernandes, D. Martin Swany, Dan Gunter, Taghrid Samak, Jennifer M. Schopf. 1227-1233 [doi]
- Correspondence pattern attribute selection for consumption of federated data sourcesBrian Walshe, Rob Brennan, Declan O'Sullivan. 1234-1240 [doi]
- An SLA-driven framework for dynamic multimedia content delivery federationsJeroen Famaey, Steven Latré, Tim Wauters, Filip De Turck. 1241-1247 [doi]
- An autonomic delivery framework for HTTP Adaptive Streaming in multicast-enabled multimedia access networksNiels Bouten, Steven Latré, Wim Van de Meerssche, Koen De Schepper, Bart De Vleeschauwer, Werner Van Leekwijck, Filip De Turck. 1248-1253 [doi]
- Scalable analysis of network measurements with Hadoop and PigTaghrid Samak, Dan Gunter, Valerie Hendrix. 1254-1259 [doi]
- The design of an instrumentation system for federated and virtualized network testbedsJames Griffioen, Zongming Fei, Hussamuddin Nasir, Xiongqi Wu, Jeremy Reed, Charles Carpenter. 1260-1267 [doi]
- Towards a semantic virtualization of configurationsSylvain Hallé, Omar Cherkaoui, Petko Valtchev. 1268-1271 [doi]
- Parameters and challenges for Virtual Network embedding in the Future InternetDavid Stezenbach, Matthias Hartmann, Kurt Tutschku. 1272-1278 [doi]
- Obfuscatory obscanturism: Making workload traces of commercially-sensitive systems safe to releaseCharles Reiss, John Wilkes, Joseph L. Hellerstein. 1279-1286 [doi]
- Workload characterization and prediction in the cloud: A multiple time series approachArijit Khan, Xifeng Yan, Shu Tao, Nikos Anerousis. 1287-1294 [doi]
- Developing and managing customizable Software as a Service using feature model conversionHendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck. 1295-1302 [doi]
- Monitoring and detecting abnormal behavior in mobile cloud infrastructureTaehyun Kim, Yeongrak Choi, Seunghee Han, Jae Yoon Chung, Jonghwan Hyun, Jian Li, James Won-Ki Hong. 1303-1310 [doi]
- Automatic generation of platforms in cloud computingHelder Pereira Borges, José Neuman de Souza, Bruno Schulze, Antonio Roberto Mury. 1311-1318 [doi]
- Kagemusha: A guest-transparent Mobile IPv6 mechanism for wide-area live VM migrationTakahiro Hirofuchi, Hidemoto Nakada, Satoshi Itoh, Satoshi Sekiguchi. 1319-1326 [doi]
- Integrated and autonomic cloud resource scalingMasum Z. Hasan, Edgar Magana, Alexander Clemm, Lew Tucker, Sree Lakshmi D. Gudreddi. 1327-1334 [doi]
- A business-driven framework for evaluating cloud computingKunwadee Sripanidkulchai, Suleeporn Sujichantararat. 1335-1342 [doi]
- Designing pilot for operational innovation in IT service deliveryGenady Grabarnik, Yefim Haim Michlin, Larisa Shwartz. 1343-1351 [doi]
- SUITS: How to make a global IT service provider sustainable?Parijat Dube, Genady Grabarnik, Larisa Shwartz. 1352-1359 [doi]
- E-tourism: Understanding users' intention to adopt Podcasting in tourismShuchih Ernest Chang, Yu-Teng Jacky Jang, Chu-Ken Robert Chiu. 1360-1363 [doi]
- An approach to consolidate and optimize monitoring solutionsChristian Richter, Thomas Schaaf. 1364-1367 [doi]
- Implications of modified waterfall model to the roles and education of health IT professionalsChunming Gao, Guy C. Hembroff. 1368-1369 [doi]
- A distributed, multi-staged, high-throughput middleware for relational databasesRafael de Paula Herrera, Alan Salvany Felinto. 1370-1373 [doi]
- Bussiness-driven automatic IT change management based on machine learningHaochen Li, Zhiqiang Zhan. 1374-1377 [doi]
- Data mining for supporting IT managementCan Bozdogan, A. Nur Zincir-Heywood. 1378-1385 [doi]
- Risk assessment and optimal proactive measure selection for IT service continuity managementQuan Guo, Zhiqiang Zhan, Teng Wang, Xiaodong Zhao. 1386-1391 [doi]
- Potential benefits and challenges of closed-loop optimization processes for IT support organizationsClaudio Bartolini, Cesare Stefanelli, Mauro Tortonesi. 1392-1398 [doi]
- Seamless integration of wireless access, free space optical, and fiber-based backbone networksStamatios V. Kartalopoulos. 1399-1402 [doi]