


default search action
CNSM 2011: Paris, France
- 7th International Conference on Network and Service Management, CNSM 2011, Paris, France, October 24-28, 2011. IEEE 2011, ISBN 978-1-4577-1588-4

- Giovane Cesar Moreira Moura, Ramin Sadre, Aiko Pras:

Internet Bad Neighborhoods: The spam case. 1-8 - Jianwen Chen, Rhonda Childress, Iain Mcintosh, George Africa, Arthur Sitaramayya:

A service management architecture component model. 1-4 - Jim Zw Li, C. Murray Woodside, John W. Chinneck, Marin Litoiu:

CloudOpt: Multi-goal optimization of application deployments across a cloud. 1-9 - HyunYong Lee, Akihiro Nakao:

Peer-assisted network operator-friendly P2P traffic control technique. 1-9 - Themistoklis Bourdenas, David Wood, Petros Zerfos, Flávio Bergamaschi, Morris Sloman:

Self-adaptive routing in multi-hop sensor networks. 1-9 - Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Thomas Staub, Torsten Braun:

TARWIS - A testbed management architecture for wireless sensor network testbeds. 1-4 - Richard Combes, Zwi Altman, Eitan Altman:

Self-organizing relays in LTE networks: Queuing analysis and algorithms. 1-8 - Jakub Dolezal, Lukas Kencl:

A unifying architecture for easy development, deployment and management of voice-driven mobile applications. 1-5 - Omid Mola, Michael A. Bauer:

Collaborative policy-based autonomic management: In a hierarchical model. 1-5 - Adriano Fiorese, Paulo Simões, Fernando Boavida:

An approach to peer selection in service overlays. 1-4 - Shengzhi Zhang, Haishan Wu, Wenjie Wang, Bo Yang, Peng Liu, Athanasios V. Vasilakos:

Distributed workload and response time management for web applications. 1-9 - Patrick Maillé, Bruno Tuffin:

Adword auction bidding strategies of budget-limited advertisers on competing search engines. 1-7 - Sin-Seok Seo, Young J. Won, James Won-Ki Hong:

Witnessing Distributed Denial-of-Service traffic from an attacker's network. 1-7 - Sujun Cheng, Zhendong Cheng, Zhongzhi Luan, Depei Qian:

NEPnet: A scalable monitoring system for anomaly detection of network service. 1-5 - Lu Cheng, Qi Zhang, Raouf Boutaba:

Mitigating the negative impact of preemption on heterogeneous MapReduce workloads. 1-9 - Bradley Simmons, Hamoun Ghanbari, Marin Litoiu, Gabriel Iszlai:

Managing a SaaS application in the cloud using PaaS policy sets and a strategy-tree. 1-5 - Yuanqiang Huang, Zhongzhi Luan, Rong He, Depei Qian:

Operator placement with QoS constraints for distributed stream processing. 1-7 - Yu-Jen Hsu, Chih-Yih Wang, Zi-Wen Wang:

A remote water sensing system with optical fiber networks. 1-5 - Haesung Hwang, Shingo Ata, Masayuki Murata:

Realization of name lookup table in routers towards content-centric networks. 1-5 - Sebastian Hagen, Alfons Kemper:

A performance and usability comparison of automated planners for IT change planning. 1-9 - Shohei Kamamura, Yuki Koizumi, Takashi Miyamura, Shin'ichi Arakawa, Kohei Shiomoto, Masayuki Murata:

Control and visualization system for managed self-organization network. 1-4 - Bo Yang, Hendrik F. Hamann, Jeffrey O. Kephart, Stephan Barabasi:

Hotspot diagnosis on logical level. 1-5 - Sourav Dutta, Akshat Verma:

Service deactivation aware placement and defragmentation in enterprise clouds. 1-9 - Yuqian Song, John Keeney, Owen Conlan, Philip Perry, Adriana Hava:

An ontology-driven approach to support wireless network monitoring for home area networks. 1-7 - Dimosthenis Pediaditakis, Naranker Dulay:

Verifying home network bandwidth sharing plans. 1-9 - George Athanasiou, Kostas Tsagkaris, Panagiotis Vlacheas, Panagiotis Demestichas:

Introducing energy-awareness in Traffic Engineering for Future Networks. 1-4 - Masanori Miyazawa, Kosuke Nishimura:

Scalable root cause analysis assisted by classified alarm information model based algorithm. 1-4 - Carmen Mas Machuca, Sandro Kraus, Koen Casier:

Fault management and service provisioning process model of next generation access networks. 1-6 - Charbel El Kaed, Yves Denneulin, François-Gaël Ottogalli:

Dynamic service adaptation for plug and play device interoperability. 1-9 - Bart Van Brabant, Wouter Joosen:

Integrated management of network and security devices in IT infrastructures. 1-5 - Michael Kretzschmar, Mario Golling:

Functional components for a Security Manager within future Inter-Cloud environments. 1-5 - Ulrich Herberg, Robert G. Cole, Jiazi Yi:

Performance analysis of SNMP in OLSRv2-routed MANETs. 1-5 - Chang-Shing Perng, Rong N. Chang, Tao Tao, Edward So, Mihwa Choi, Hidayatullah Shaikh:

Universal economic analysis for IT transformation. 1-4 - Stuart Clayman, Richard G. Clegg, Lefteris Mamatas, George Pavlou, Alex Galis:

Monitoring, aggregation and filtering for efficient management of virtual networks. 1-7 - Tiago Cruz, Paulo Simões, João Rodrigues, Edmundo Monteiro, Fernando Bastos:

Outsourced management of home and SOHO Windows desktops. 1-7 - Pejman Salehi, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe:

AMF configurations: Checking for service protection using heuristics. 1-8 - Robert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman:

Policy refinement: Decomposition and operationalization for dynamic domains. 1-9 - Panagiotis Vlacheas, Evangelos D. Thomatos, Kostas Tsagkaris, Panagiotis Demestichas:

Autonomic downlink inter-cell interference coordination in LTE Self-Organizing Networks. 1-5 - Claudio Bartolini, Cesare Stefanelli, Davide Targa, Mauro Tortonesi:

A web-based what-if scenario analysis tool for performance improvement of IT support organizations. 1-5 - Martín Barrère, Remi Badonnel, Olivier Festor:

Supporting vulnerability awareness in autonomic networks and systems with OVAL. 1-8 - Velmurugan Ayyadurai, Klaus Moessner, Rahim Tafazolli:

Multihop cellular network optimization using genetic algorithms. 1-5 - Rerngvit Yanggratoke, Fetahi Wuhib, Rolf Stadler:

Gossip-based resource allocation for green computing in large clouds. 1-9 - Daphné Tuncer, Marinos Charalambides, George Pavlou, Ning Wang:

Towards decentralized and adaptive network resource management. 1-6 - Dan Gunter, Ewa Deelman, Taghrid Samak, Christopher X. Brooks, Monte Goode, Gideon Juve, Gaurang Mehta, Priscilla Moraes, Fabio Silva, D. Martin Swany, Karan Vahi:

Online workflow management and performance analysis with Stampede. 1-10 - Amir S. Kalbasi, Diwakar Krishnamurthy, Jerry Rolia, Michael Richter:

MODE: Mix Driven On-line Resource Demand Estimation. 1-9 - Eduardo M. D. Marques, Jose J. F. Sousa, Paulo Nazareno Maia Sampaio:

Modeling and simulation of DiffServ scenarios with the NSDL framework. 1-4 - Lúcia Martins, Nuno Ferreira, José M. F. Craveirinha:

A bi-criteria algorithm for multipoint-to-multipoint virtual connections in transport networks. 1-5 - José A. Lozano, Alfonso Castro, Beatriz Fuentes, Juan Manuel González, Alvaro Rodríguez:

Adaptive QoE measurement on videostreaming IP services. 1-4 - Haydn Mearns, John Leaney, Artem Parakhine, John K. Debenham, Dominique Verchère:

An autonomic open marketplace for service management and resilience. 1-5 - Anas Youssef, Diwakar Krishnamurthy:

A trace-based service level planning framework for enterprise application clouds. 1-5 - Bin Zhang, Ehab Al-Shaer:

On synthesizing distributed firewall configurations considering risk, usability and cost constraints. 1-8 - Siun-Chuon Mau, Akshay Vashist, Alexander Poylisher, Ritu Chadha, Cho-Yu Jason Chiang:

Criticality avoidance: A new paradigm for congestion control based on science of phase transition. 1-6 - Jan Groenendijk, Yangcheng Huang, Liam Fallon:

Adaptive terminal reporting for scalable service quality monitoring in large networks. 1-5 - Krunoslav Ivesic, Maja Matijasevic, Lea Skorin-Kapov:

Simulation based evaluation of dynamic resource allocation for adaptive multimedia services. 1-4 - Xiaojie Wang, Lanlan Rui, Peng Yu, Xingyu Chen:

Research on Home NodeB Gateway load balancing mechanism. 1-5 - Soumia Kessal, Noëmie Simoni:

QoS based service provisioning in NGN/NGS context. 1-5 - Carlos Alberto Kamienski, Ramide Dantas, Ernani Azevedo, Cyrus Dias, Djamel Sadok, Börje Ohlman:

Unleashing the power of policies for service-oriented computing. 1-5 - Jérôme François, Radu State, Thomas Engel, Olivier Festor:

Enforcing security with behavioral fingerprinting. 1-9 - Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:

SMURFEN: A system framework for rule sharing collaborative intrusion detection. 1-6 - Giuseppe Papuzzo, Giandomenico Spezzano:

Autonomic management of workflows on hybrid Grid-Cloud infrastructure. 1-4 - Ya-Shian Wang, Chin-Ping Chuang, Kuan-Hsiung Liang, Been-Hwang Liao, Shou-Yi Cheng:

Automated service provisioning and management for integrated femtocell/Wi-Fi and cellular networks. 1-5 - Maïssa Mbaye, Hicham Khalife, Francine Krief:

Reasoning services for security and energy management in wireless sensor networks. 1-5 - K. Salah, Raed Al-Shaikh, Mohamad Sindi:

Towards green computing using diskless high performance clusters. 1-4 - Yanjie Ren, Yan Qiao, Xuesong Qiu, Shun-an Wu:

Scalable deterministic end-to-end probing and analytical method for overlay network monitoring. 1-5 - Shun-an Wu, Qiao Yan, Xuesong Qiu, Yanjie Ren:

A probe prediction approach to overlay network monitoring. 1-5 - Oriol Sallent, Jordi Pérez-Romero, Juan Sanchez-Gonzalez, Ramón Agustí, Miguel Ángel Díaz-Guerra, David Henche, Daniel Paul:

Automatic detection of sub-optimal performance in UMTS networks based on drive-test measurements. 1-4 - Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti:

Towards self-adaptive management frameworks: The case of aggregated information monitoring. 1-5 - Yoann Maurel, Philippe Lalanda, Ada Diaconescu:

Towards introspectable, adaptable and extensible autonomic managers. 1-5 - Jean Tajer, Ali Makke, Osman Salem, Ahmed Mehaoua:

A comparison between divergence measures for network anomaly detection. 1-5 - Johan Mazel, Pedro Casas, Yann Labit, Philippe Owezarski:

Sub-Space clustering, Inter-Clustering Results Association & anomaly correlation for unsupervised network anomaly detection. 1-8 - Michael Gerhards, Sascha Skorupa, Volker Sander, P. Pfeiffer, Adam Belloum:

Towards a security framework for a WS-HumanTask processor. 1-5 - Weverton Luis da Costa Cordeiro, Flavio Roberto Santos, Gustavo Huff Mauch, Marinho P. Barcellos, Luciano Paschoal Gaspary:

Securing P2P systems from Sybil attacks through adaptive identity management. 1-6 - Thomas Bourgeau:

Monitoring network topology dynamism of large-scale traceroute-based measurements. 1-5 - Hiroshi Otsuka, Hanan Lutfiyya:

Using strategy trees in change management in clouds. 1-9 - David Kidston, Li Li, Walee Al Mamun, Hanan Lutfiyya:

Cross-layer cluster-based data dissemination for failure detection in MANETs. 1-7 - Steven Davy, Joan Serrat, Antonio Astorga, Brendan Jennings, Javier Rubio-Loyola:

Policy-assisted planning and deployment of virtual networks. 1-8 - Urlan Barros, Mathieu Bouet, Aldri Luiz dos Santos, Michele Nogueira:

Assessing RoQ attacks on MANETs over aware and unaware TPC techniques. 1-5 - Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Winnie Cheng, David Loewenstern, Larisa Shwartz, Nikos Anerousis:

Performance management and quantitative modeling of IT service processes using mashup patterns. 1-9 - Suzanne McIntosh, Jeffrey O. Kephart, Jonathan Lenchner, B. Yang, Metin Feridun, Michael Nidd, Axel Tanner, I. Barabasi:

Semi-automated data center hotspot diagnosis. 1-7 - Yixin Diao, Aliza Heching:

Staffing optimization in complex service delivery systems. 1-9 - Rajarshi Das, Srinivas Yarlanki, Hendrik F. Hamann, Jeffrey O. Kephart, Vanessa López:

A unified approach to coordinated energy-management in data centers. 1-5 - Luca Deri, Ellie Chou, Zach Cherian, Kedar Karmarkar, Mike Patterson:

Increasing data center network visibility with cisco NetFlow-Lite. 1-6 - Akeo Masuda, Akinori Isogai, Takashi Miyamura, Kohei Shiomoto, Atsushi Hiramatsu:

Application-defined control of virtual networks over IP-optical networks. 1-6 - Omar El Ferkouss, Ilyas Snaiki, Omar Mounaouar, Hamza Dahmouni, Racha Ben Ali, Yves Lemieux, Omar Cherkaoui:

A 100Gig network processor platform for openflow. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














