


default search action
Journal of Network and Systems Management, Volume 28
Volume 28, Number 1, January 2020
- Lei-Lei Shi, Lu Liu

, Yan Wu, Liang Jiang, Ayodeji Ayorinde:
Event Detection and Multi-source Propagation for Online Social Network Management. 1-20 - Bingchun Wang, Zhirui Zhang, Xiaogang Qi, Lifang Liu:

Identify Critical Nodes in Network Cascading Failure Based on Data Analysis. 21-34 - Peiying Zhang

, Haisheng Li
, Yongjing Ni, Faming Gong, Mengnan Li, Fuyan Wang:
Security Aware Virtual Network Embedding Algorithm Using Information Entropy TOPSIS. 35-57 - Christos Chousidis

, Ioana Piscia, Zhengwen Huang:
A Modified IEEE 802.11 MAC for Optimizing Broadcasting in Wireless Audio Networks. 58-80 - Shahin Vakilinia, Halima Elbiaze:

Latency Control of ICN Enabled 5G Networks. 81-107 - Abbas Ehsanfar

, Paul T. Grogan:
Mechanism Design for Exchanging Resources in Federated Networks. 108-132 - Tom De Schepper

, Steven Latré, Jeroen Famaey
:
Scalable Load Balancing and Flow Management in Dynamic Heterogeneous Wireless Networks. 133-159 - Carlos Augusto S. Cunha:

Building Autonomic Elements from Video-Streaming Servers. 160-192 - Acknowledgment to Reviewers. 193-195

Volume 28, Number 2, April 2020
- Pieter-Jan Maenhaut

, Bruno Volckaert, Veerle Ongenae, Filip De Turck
:
Resource Management in a Containerized Cloud: Status and Challenges. 197-246 - Saadullah Kalwar

, Kwan-Wu Chin
, Zhenhui Yuan:
Downlink Throughput Maximization in Multi-UAVs Networks Using Discrete Optimization. 247-270 - Abbas Ehsanfar

, Paul T. Grogan:
Auction-Based Algorithms for Routing and Task Scheduling in Federated Networks. 271-297 - Dima Mansour

, Haidar Osman, Christian F. Tschudin:
Load Balancing in the Presence of Services in Named-Data Networking. 298-339 - Rafael Montero

, Fernando Agraz, Albert Pagès
, Salvatore Spadaro:
Enabling Multi-segment 5G Service Provisioning and Maintenance through Network Slicing. 340-366 - Wael Sellami

, Hatem Hadj Kacem
, Ahmed Hadj Kacem:
Dynamic Provisioning of Service Composition in a Multi-Tenant SaaS Environment. 367-397 - P. L. Lekshmy, M. Abdul Rahiman:

Hybrid Approach to Speed-Up the Privacy Preserving Kernel K-means Clustering and its Application in Social Distributed Environment. 398-422 - Yoshiaki Kitaguchi

, Woojin Seok, Jiun-Long Huang, Hongtaek Ju, Yen-Wen Chen, Kiyohito Yoshihara:
Management in a Cyber-Physical World: A Report on APNOMS 2019. 423-431
Volume 28, Number 3, July 2020
- Abbas Bradai, Mubashir Husain Rehmani

, Israat Haque
, Michele Nogueira, Syed Hashim Raza Bukhari:
Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for a Hyperconnected World: Challenges, Applications, and Major Advancements. 433-435 - Tahira Mahboob

, Young Rok Jung, Min Young Chung
:
Dynamic VNF Placement to Manage User Traffic Flow in Software-Defined Wireless Networks. 436-456 - Hamza Ben Ammar, Yassine Hadjadj-Aoul:

A GRASP-Based Approach for Dynamic Cache Resources Placement in Future Networks. 457-477 - Abdellah Kaci, Abderrezak Rachedi:

Toward a Machine Learning and Software Defined Network Approaches to Manage Miners' Reputation in Blockchain. 478-501 - Mahboobeh Zangiabady, Alberto Garcia-Robledo

, Christian Aguilar-Fuster, Javier Rubio-Loyola:
A Holistic Framework for Virtual Network Migration to Enhance Embedding Ratios in Network Virtualization Environments. 502-552 - Ali El Kamel

, Habib Youssef:
Improving Switch-to-Controller Assignment with Load Balancing in Multi-controller Software Defined WAN (SD-WAN). 553-575 - Luis M. Contreras, Luca Cominardi, Jorge Martín-Pérez, Carlos J. Bernardos

:
Applicability of SDN and NFV Techniques for a Virtualization-Based Roaming Solution. 576-604 - Fahad Nife

, Zbigniew Kotulski
:
Application-Aware Firewall Mechanism for Software Defined Networks. 605-626 - Asma Chiha, Marlies Van der Wee, Didier Colle, Sofie Verbrugge:

Network Slicing Cost Allocation Model. 627-659 - Luca Cominardi, Sergio Gonzalez-Diaz

, Antonio de la Oliva
, Carlos J. Bernardos
:
Adaptive Telemetry for Software-Defined Mobile Networks. 660-692 - Wassim Sellil Atoui

, Nour Assy, Walid Gaaloul
, Imen Grida Ben Yahia:
Configurable Deployment Descriptor Model in NFV. 693-718
Volume 28, Number 4, October 2020
- Luciano Paschoal Gaspary:

Future of Network and Service Operations and Management: Trends, Developments, and Directions. 719-720 - Alexander Clemm, Mohamed Faten Zhani

, Raouf Boutaba:
Network Management 2030: Operations and Control of Network 2030 Services. 721-750 - Mohamed Faten Zhani

, Hesham Elbakoury:
FlexNGIA: A Flexible Internet Architecture for the Next-Generation Tactile Internet. 751-795 - Maria Torres Vega

, Christos Liaskos
, Sergi Abadal
, Evangelos Papapetrou, Akshay Jain
, Belkacem Mouhouche, Gökhan Kalem, Salih Ergüt, Marian Mach
, Tomas Sabol
, Albert Cabellos-Aparicio, Christoph Grimm, Filip De Turck
, Jeroen Famaey
:
Immersive Interconnected Virtual and Augmented Reality: A 5G and IoT Perspective. 796-826 - Duc C. Le, Nur Zincir-Heywood

:
A Frontier: Dependable, Reliable and Secure Machine Learning for Network/System Management. 827-849 - Estefanía Coronado

, Abin Thomas
, Roberto Riggio
:
Adaptive ML-Based Frame Length Optimisation in Enterprise SD-WLANs. 850-881 - Cristian Hesselman, Paola Grosso

, Ralph Holz
, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter
, Anna Sperotto, Roland van Rijswijk-Deij
, Giovane C. M. Moura, Aiko Pras, Cees de Laat:
A Responsible Internet to Increase Trust in the Digital World. 882-922 - Rohit Abhishek, David Tipper

, Deep Medhi
:
Network Virtualization and Survivability of 5G Networks. 923-952 - Bruno Rodrigues

, Eder J. Scheid
, Christian Killer, Muriel Figueredo Franco
, Burkhard Stiller:
Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks. 953-989 - Isam Mashhour Al Jawarneh

, Paolo Bellavista
, Antonio Corradi
, Luca Foschini
, Rebecca Montanari:
Big Spatial Data Management for the Internet of Things: A Survey. 990-1035 - Ireneusz Olszewski

:
Modified Dual-Path Allocation Algorithm in Elastic Optical Networks. 1036-1054 - Anuja Tayal, Neha Sharma, Neminath Hubballi

, Maitreya Natu:
Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks. 1055-1084 - Anuja Tayal, Neha Sharma, Neminath Hubballi

, Maitreya Natu:
Correction to: Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks. 1085 - Sepideh Adabi

, Vida Esmaeili:
A New Multi-Agent Hybrid Marketplace for Cloud Resource Allocation. 1086-1135 - Sahar Boulkaboul, Djamel Djenouri:

DFIOT: Data Fusion for Internet of Things. 1136-1160 - Leandro Ordoñez-Ante

, Gregory van Seghbroeck
, Tim Wauters, Bruno Volckaert, Filip De Turck
:
A Workload-Driven Approach for View Selection in Large Dimensional Datasets. 1161-1186 - Tom De Schepper, Patrick Bosch, Jakob Struye, Carlos Donato, Jeroen Famaey

, Steven Latré:
ORCHESTRA: Supercharging Wireless Backhaul Networks Through Multi-technology Management. 1187-1227 - Lúcio Henrik A. Reis, Luiz Claudio Schara Magalhães, Dianne S. V. Medeiros, Diogo M. F. Mattos

:
An Unsupervised Approach to Infer Quality of Service for Large-Scale Wireless Networking. 1228-1247 - Seyyed Yasser Hashemi

, Fereidoon Shams Aliee:
Fuzzy, Dynamic and Trust Based Routing Protocol for IoT. 1248-1278 - Parisa Rafiee

, Ghasem Mirjalily:
Distributed Network Coding-Aware Routing Protocol Incorporating Fuzzy-Logic-Based Forwarders in Wireless Ad hoc Networks. 1279-1315 - Atul Tripathi, Isha Pathak, Deo Prakash Vidyarthi

:
Modified Dragonfly Algorithm for Optimal Virtual Machine Placement in Cloud Computing. 1316-1342 - Mohammad Alhisnawi

, Mahmood Ahmadi
:
Detecting and Mitigating DDoS Attack in Named Data Networking. 1343-1365 - Basheer Al-Duwairi

, Eslam Al-Quraan, Yazeed AbdelQader:
ISDSDN: Mitigating SYN Flood Attacks in Software Defined Networks. 1366-1390 - Rafael Xavier

, Lisandro Zambenedetti Granville
, Filip De Turck
, Bruno Volckaert:
Preemptive Resource Provisioning for Container-Based Audio/Video Encrypted Collaboration Applications. 1391-1426 - Shankar K. Ghosh

, Sasthi C. Ghosh
:
Analyzing Handover Performances of Mobility Management Protocols in Ultra-dense Networks. 1427-1452 - Veljko Pejovic

:
Towards a Holistic Net Neutrality Violation Detection System: A Case Study of Slovenia. 1453-1481 - Steven van Rossem

, Wouter Tavernier, Didier Colle, Mario Pickavet, Piet Demeester:
Optimized Sampling Strategies to Model the Performance of Virtualized Network Functions. 1482-1521 - Ammar Rafiq

, Muhammad Faisal Hayat:
Bandwidth Utilization and Management Algorithms (BUMAs) for NG-EPON. 1522-1546 - Michal Rzepka

, Piotr Borylo
, Artur Lason
, Andrzej Szymanski
:
PARD: Hybrid Proactive and Reactive Method Eliminating Flow Setup Latency in SDN. 1547-1574 - Paolo Bellavista

, Alessandro Dolci, Carlo Giannelli
, Dmitrij David Padalino Montenero:
SDN-Based Traffic Management Middleware for Spontaneous WMNs. 1575-1609 - Claudio Calcaterra, Alessio Carmenini

, Andrea Marotta
, Ubaldo Bucci, Dajana Cassioli:
MaxHadoop: An Efficient Scalable Emulation Tool to Test SDN Protocols in Emulated Hadoop Environments. 1610-1638 - Mehdi Hosseinzadeh

, Hawkar Kamaran Hama, Marwan Yassin Ghafour, Mohammad Masdari, Omed Hassan Ahmed, Hemn Khezri:
Service Selection Using Multi-criteria Decision Making: A Comprehensive Overview. 1639-1693 - Xinjun Pei

, Shengwei Tian, Long Yu
, Huanhuan Wang, Yongfang Peng:
A Two-Stream Network Based on Capsule Networks and Sliced Recurrent Neural Networks for DGA Botnet Detection. 1694-1721 - Michal Aibin

, Krzysztof Walkowiak
:
Monte Carlo Tree Search with Last-Good-Reply Policy for Cognitive Optimization of Cloud-Ready Optical Networks. 1722-1744 - Regis Francisco Teles Martins, Rodolfo da Silva Villaça

, Fábio Luciano Verdi
:
BitMatrix: A Multipurpose Sketch for Monitoring of Multi-tenant Networks. 1745-1774 - Jitendra Kumar

, Ashutosh Kumar Singh:
Decomposition Based Cloud Resource Demand Prediction Using Extreme Learning Machines. 1775-1793 - Masoud Khosravi Farmad, Abbas Ghaemi Bafghi:

Bayesian Decision Network-Based Security Risk Management Framework. 1794-1819 - Matheus Pereira Libório

, Petr Ekel
, Renata de Mello Lyrio
, Patrícia Bernardes
, Gustavo Luís Soares
, Thiago Melo Machado-Coelho
:
Expand or Oversize? Planning Internet Access Network in a Demand Growth Scenario. 1820-1838 - Rúbens de Souza Matos Júnior

, Jamilson Dantas, Eltton Araujo, Paulo R. M. Maciel:
Bottleneck Detection in Cloud Computing Performance and Dependability: Sensitivity Rankings for Hierarchical Models. 1839-1871 - Jawad Manzoor

, Llorenç Cerdà-Alabern, Ramin Sadre, Idilio Drago
:
On the Performance of QUIC over Wireless Mesh Networks. 1872-1901

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














