


default search action
CNSM 2010: Niagara Falls, Canada
- Proceedings of the 6th International Conference on Network and Service Management, CNSM 2010, Niagara Falls, Canada, October 25-29, 2010. IEEE 2010, ISBN 978-1-4244-8910-7

- Fetahi Wuhib, Rolf Stadler, Mike Spreitzer:

Gossip-based resource management for cloud environments. 1-8 - Zhenhuan Gong, Xiaohui Gu, John Wilkes:

PRESS: PRedictive Elastic ReSource Scaling for cloud systems. 9-16 - Fumio Machida, Masahiro Kawato, Yoshiharu Maeno:

Renovating legacy distributed systems using virtual appliance with dependency graph. 17-24 - Luís Armando Bianchin, Juliano Araújo Wickboldt

, Lisandro Zambenedetti Granville
, Luciano Paschoal Gaspary, Claudio Bartolini, Maher Rahmouni:
Similarity metric for risk assessment in IT change plans. 25-32 - Sebastian Hagen, Alfons Kemper:

Facing the unpredictable: Automated adaption of IT change plans for unpredictable management domains. 33-40 - Claudio Bartolini, Phil Day:

Where have all the tickets gone? 41-47 - Mohamed Nassar

, Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Risk management in VoIP infrastructures using support vector machines. 48-55 - Shaonan Wang, Radu State, Mohamed Ourdane, Thomas Engel:

RiskRank: Security risk ranking for IP flow records. 56-63 - Frédéric Beck, Olivier Festor, Isabelle Chrisment, Ralph E. Droms:

Automated and secure IPv6 configuration in enterprise networks. 64-71 - Robert Craven, Jorge Lobo

, Emil C. Lupu
, Alessandra Russo
, Morris Sloman
:
Decomposition techniques for policy refinement. 72-79 - Srdjan Marinovic, Kevin P. Twidle, Naranker Dulay, Morris Sloman

:
Teleo-Reactive policies for managing human-centric pervasive services. 80-87 - Marwan Cheaito, Romain Laborde, François Barrère, Abdelmalek Benzekri:

A deployment framework for self-contained policies. 88-95 - Daniel Gmach, Jerry Rolia, Cullen E. Bash

, Yuan Chen, Tom Christian, Amip Shah, Ratnesh K. Sharma, Zhikui Wang:
Capacity planning and power management to exploit sustainable energy. 96-103 - Daisuke Arai, Kiyohito Yoshihara:

ECO-friendly distributed routing protocol for reducing network energy consumption. 104-111 - Yukun Li, Zhipeng Gao, Yang Yang, Zhili Guan, Xingyu Chen, Xuesong Qiu:

A cluster-based negotiation model for task allocation in Wireless Sensor Network. 112-117 - Ludmila Cherkasova, Alex Zhang, Xiaozhou Li:

DP+IP = design of efficient backup scheduling. 118-125 - Sebastian Herden, André Zwanziger, Philip Robinson:

Declarative application deployment and change management. 126-133 - Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:

Dependency-aware fault diagnosis with metric-correlation models in enterprise software systems. 134-141 - Thomas Reidemeister, Miao Jiang, Paul A. S. Ward:

An extensible framework for repair-driven monitoring. 142-149 - Angelo Sapello, Adarsh S. Sethi, Marian H. Nodine, Ritu Chadha:

Application of time series analysis to fault management in MANETs. 150-157 - Carol J. Fung, Jie Zhang, Raouf Boutaba:

Effective acquaintance management for Collaborative Intrusion Detection Networks. 158-165 - Konstantin Pussep, Sebastian Kaune, Osama Abboud, Christian Huff, Ralf Steinmetz

:
On energy-awareness for peer-assisted streaming with set-top boxes. 166-173 - Sven Graupner, Daniel Gmach:

Integration of a Power/Workload Control System into IT management architecture. 174-181 - Tiago Cruz

, Paulo Simões
, Fernando Bastos, Edmundo Monteiro
:
Integration of PXE-based desktop solutions into broadband access networks. 182-189 - Christos Tranoris

, Spyros G. Denazis
:
Federation Computing: A pragmatic approach for the Future Internet. 190-197 - Amelie Medem Kuatse, Renata Teixeira, Nick Feamster, Mickael Meulle:

Joint analysis of network incidents and intradomain routing changes. 198-205 - Charles Miers

, Marcos A. Simplício Jr.
, Walter Goya, Tereza Cristina M. B. Carvalho
, Victor Souza:
An architecture for P2P locality in managed networks using hierarchical trackers. 206-213 - Rodolfo W. L. Coutinho

, Vitor L. Coelho
, João Crisóstomo Weyl Albuquerque Costa, Glaucio H. S. Carvalho:
Optimal policy for Joint Call Admission Control in next generation wireless networks. 214-217 - Rimao Huang, Xuesong Qiu, Lin-li Ye:

Probability-based fault detection in wireless sensor networks. 218-221 - Andrew J. Mayer, Xi Jiang, Stephen McCarron, Hsin-Ping Chang:

Policy exchange information model in support of cross-domain management. 222-225 - Kevin Feeney, Rob Brennan

, Simon N. Foley
:
A trust model for capability delegation in federated policy systems. 226-229 - Thorsten Höllrigl

, Holger Kühner, Jochen Dinger, Hannes Hartenstein:
User-Controlled Automated Identity Delegation. 230-233 - Amy Fedyk, Michael Atighetchi, Partha P. Pal

:
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance. 234-237 - Josep Oriol Fitó, Mario Macías, Jordi Guitart

:
Toward business-driven risk management for Cloud computing. 238-241 - Robert Koch, Gabi Dreo Rodosek:

User identification in encrypted network communications. 246-249 - Suleiman Y. Yerima, Gerard P. Parr

, Cathryn Peoples, Sally I. McClean
, Philip J. Morrow:
A framework for context-driven end-to-end QoS control in Converged Networks. 250-253 - Steven Latré, Wim Van de Meerssche, Stijn Melis, Dimitri Papadimitriou, Filip De Turck

, Piet Demeester:
Automated management of network experiments and user behaviour emulation on large scale testbed facilities. 254-257 - Delei Weng, Michael A. Bauer:

Using policies to drive autonomic management of virtual systems. 258-261 - Scott D. Stoller:

Trust management for Web Services. 262-265 - Ya-Shian Wang, Kuan-Hsiung Liang, Hey-Chyi Young, Shou-Yi Cheng, Mei-Chun Chen, Ya-Ping Huang:

Quality-assured provisioning of IPTV services in Ethernet-based broadband networks. 266-269 - Pilar Holgado, Jorge E. López de Vergara

, Víctor A. Villagrá
, Ivan Sanz, Antonio Amaya:
Sharing information about security alerts using semantic web technologies. 270-273 - Shohei Kamamura, Takashi Miyamura

, Kohei Shiomoto
:
IP fast reroute control using centralized control plane architecture. 274-277 - Ke Liu, Xuesong Qiu, Zhipeng Gao, Xingyu Chen, Shuying Chang, Yuan Pang:

An Iterative Information-Theoretic approach to estimate traffic matrix. 278-281 - Takashi Miyamura

, Shohei Kamamura, Kohei Shiomoto
:
Policy-based resource management in virtual network environment. 282-285 - Chyi-Ren Dow, Pa Hsuan, Yu-Hong Lee, Yi-Tung Lee, Ching-Yin Huang:

An efficient data circulation and discovery scheme in VANETs using public transportation systems. 286-289 - Ulrich Herberg, Thomas H. Clausen

, Robert G. Cole:
MANET network management and performance monitoring for NHDP and OLSRv2. 290-293 - Xiaoxing Yu, Jing Feng:

Approaches to nodes choosing protocol model for collaborative MIMO cellular networks. 294-297 - Likun Yu, Lu Cheng, Yan Qiao, Yiguo Yuan, Xingyu Chen:

An efficient active probing approach based on the combination of online and offline strategies. 298-301 - Shuying Chang, Xuesong Qiu, Zhipeng Gao, Ke Liu, Feng Qi:

A flow-based anomaly detection method using sketch and combinations of traffic features. 302-305 - Jan Schaefer, Markus Schmid, Andreas Textor, Marcus Thoss, Reinhold Kröger, Andreas Roth:

Performance-aware design and optimization of enterprise applications. 306-309 - Riyad Alshammari, Nur Zincir-Heywood

:
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype. 310-313 - Ludi Akue, Emmanuel Lavinal, Michelle Sibilla:

Towards a validation framework for dynamic reconfiguration. 314-317 - Nikolaos Leontiou, Dimitrios Dechouniotis

, Spyros G. Denazis
:
Adaptive admission control of distributed cloud services. 318-321 - Ayse Morali, Emmanuele Zambon

, Sandro Etalle, Roel J. Wieringa:
CRAC: Confidentiality risk assessment and IT-infrastructure comparison. 322-325 - Kenji Hori, Kiyohito Yoshihara:

Pinpointing patch impact test targets using kernel tracing. 326-329 - Yoshihiko Kanaumi, Shuichi Saito, Eiji Kawai:

Toward large-scale programmable networks: Lessons learned through the operation and management of a wide-area OpenFlow-based network. 330-333 - Zhengping Wu, Yuanyao Liu:

Dynamic policy conflict analysis for collaborative web services. 338-341 - Zhengping Wu, Mu Yuan:

User-preference-based service selection using fuzzy logic. 342-345 - Anders Gunnar, Mikael Johansson:

Cautious weight tuning for link-state routing. 346-349 - Muhammad Shoaib Siddiqui, Choong Seon Hong

, Young-Cheol Bang:
Virtual platform support for QoS management in IMS based multiple provider networks. 350-353 - Mario Macías, Josep Oriol Fitó, Jordi Guitart

:
Rule-based SLA management for revenue maximisation in Cloud Computing Markets. 354-357 - Kensuke Fukuda:

Difficulties of identifying application type in backbone traffic. 358-361 - Lekometsa Mokhesi, Antoine B. Bagula

:
Personalised handoff decision for seamless roaming in next generation of wireless networks. 362-365 - Evangelos Haleplidis, Christos Tranoris

, Spyros G. Denazis
, Odysseas G. Koufopavlou:
Adopting software engineering practices to network processor devices introducing the Domain Specific Modeling paradigm to the ForCES Framework. 366-369 - Lei Shi, Alan Davy

, David Muldowney, Steven Davy
, Edzard Höfig, Xiaoming Fu
:
Intrinsic monitoring within an IPv6 network: mapping node information to network paths. 370-373 - Cormac Mullaly, Brian Lee

, Dawid Czesak:
Real time distributed monitoring of services over IP. 374-377 - Miguel Lopes, António Costa

, Bruno Dias
:
Towards automatic and independent internet services configuration. 378-381 - Seppo Heikkinen, Santeri Siltala:

Identity-bound accounting. 382-385 - Javier Carmona-Murillo

, José Luis González Sánchez, Francisco J. Rodríguez-Pérez:
Performance evaluation of an architecture for localized IP mobility management. 386-387 - Carlos Raniery Paula dos Santos, Rafael Santos Bezerra, João Marcelo Ceron, Lisandro Zambenedetti Granville

, Liane Margarida Rockenbach Tarouco
:
Botnet master detection using a mashup-based approach. 390-393 - Luiz F. Bittencourt

, Carlos R. Senna
, Edmundo R. M. Madeira
:
Scheduling service workflows for cost optimization in hybrid clouds. 394-397 - Spyridon V. Gogouvitis

, Kleopatra Konstanteli, George Kousiouris, Gregory Katsaros, Dimosthenis Kyriazis
, Theodora A. Varvarigou:
A Service Oriented Architecture for achieving QoSaware Workflow Management in Virtualized Environments. 398-401 - David Loewenstern, Melissa J. Buco, Yixin Diao, Heiko Ludwig, Christopher Ward:

Dispatch tooling for global service delivery. 402-405 - Owen Conlan

, John Keeney, Cormac Hampson, Fionán Peter Williams:
Towards non-expert users monitoring networks and services through semantically enhanced visualizations. 406-409 - Roberto Baldoni, Roberto Beraldi, Giorgia Lodi, Marco Platania, Leonardo Querzoni

:
Moving core services to the edge in NGNs for reducing managed infrastructure size. 410-413 - Samir Ghamri-Doudane, Laurent Ciavaglia:

Domain-wide scheduling of OSPF graceful restarts for maintenance purposes. 414-417 - Heiko Ludwig, Kamal Bhattacharya

, Rick Sheftic, Michael Nidd, Michael Moser, Andreas Kind:
Aligning infrastructure and business processes using watermarks. 418-421 - Dineshbalu Balakrishnan, Amiya Nayak

:
Adaptive context monitoring in heterogeneous environments. 422-425 - Jacob Leverich, Vanish Talwar, Parthasarathy Ranganathan, Christos Kozyrakis:

Evaluating impact of manageability features on device performance. 426-430 - Abul Bashar

, Gerard Parr
, Sally I. McClean
, Bryan W. Scotney, Detlef D. Nauck:
Machine learning based Call Admission Control approaches: A comparative study. 431-434 - Prasad Calyam, Lakshmi Kumarasamy, Füsun Özgüner:

Semantic scheduling of active measurements for meeting network monitoring objectives. 435-438 - Yun Li, Ruifeng Zhang, Chonggang Wang, Ali Daneshmand, Xiaohu You:

A distributed relay selection algorithm for cognitive radio ad-hoc networks. 439-442 - Denílson Cursino Oliveira, Raimir Holanda Filho:

An automated roll-back plan to IT change management tool. 443-446 - Kazuhiko Kinoshita

, Naosuke Yokoe, Yusuke Hirota, Hideki Tode, Koso Murakami:
A network service platform providing stable QoS based on dynamic allocation of distributed components. 447-450 - Risto Vaarandi

, Karlis Podins:
Network IDS alert classification with frequent itemset mining and data clustering. 451-456 - Helber Wagner da Silva, Raimir Holanda

, Aldri Luiz dos Santos
, Michele Nogueira Lima
:
A framework for self-configuration on WMNs aware of performance and security issues. 457-462 - Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy:

Game theory driven monitoring of spatial-aggregated IP-Flow records. 463-468 - Daniel Migault, Cedric Girard

, Maryline Laurent
:
A performance view on DNSSEC migration. 469-474 - Ignacio Silva-Lepe, Isabelle Rouvellou, Rahul P. Akolkar, Arun Iyengar:

Cross-domain service management for enabling domain autonomy in a federated SOA. 475-480 - Adriano Fiorese

, Paulo Simões
, Fernando Boavida
:
An aggregation scheme for the optimisation of service search in Peer-to-Peer overlays. 481-486 - Fernando Matos, Alexandre Matos, Paulo Simões

, Edmundo Monteiro
:
A service composition approach for inter-domain provisioning. 487-492 - Alfonso Castro, Beatriz Fuentes, José A. Lozano, Begona Costales, Víctor A. Villagrá

:
Multi-domain fault management architecture based on a shared ontology-based knowledge plane. 493-498 - Letong Sun, Xia Yin, Zhiliang Wang, Yang Xiang, Jianping Wu:

A neutral layered mapping system with two-stage cache for a scalable Internet. 499-504 - Ning Wang, Binbin Dong:

Fast failure recovery for reliable multicast-based content delivery. 505-510 - Araz Jahaniaval, Dalia Fayek, Ryan Brown:

Distortion optimization in enriched video traces for End-to-End video quality enhancement. 511-516 - Hui Wang, Hyeok-soo Choi, Nazim Agoulmine, M. Jamal Deen

, James Won-Ki Hong:
Information-based sensor tasking wireless body area networks in U-health systems. 517-522 - Muthoni Masinde

, Antoine B. Bagula
, Victor Ndegwa:
MobiGrid: A middleware for integrating mobile phone and grid computing. 523-526 - Jin Xiao, Jae Yoon Chung, Jian Li, Raouf Boutaba, James Won-Ki Hong:

Near optimal demand-side energy management under real-time demand-response pricing. 527-532

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














