


default search action
IEEE Transactions on Network and Service Management, Volume 5
Volume 5, Number 1, March 2008
- Manoj K. Agarwal, Gautam Kar, Ruchi Mahindru, Anindya Neogi, Anca Sailer:

Performance problem prediction in transaction-based e-business systems. 1-10 - Fabio Ricciato, Eduard Hasenleithner, Peter Romirer-Maierhofer:

Traffic analysis at short time-scales: an empirical case study from a 3G cellular network. 11-21 - Jing Fu, Peter Sjödin, Gunnar Karlsson:

Loop-free updates of forwarding tables. 22-35 - Yongning Tang, Ehab Al-Shaer, Raouf Boutaba:

Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks. 36-49 - Ariffin Datuk Yahaya, Tobias Harks, Tatsuya Suda:

iREX: efficient automation architecture for the deployment of inter-domain QoS policy. 50-64
Volume 5, Number 2, June 2008
- Nancy Samaan, Ahmed Karmouch:

Network anomaly diagnosis via statistical analysis and evidential reasoning. 65-77 - Shivani Deshpande, Marina Thottan, Biplab Sikdar

:
An online scheme for the isolation of BGP misconfiguration errors. 78-90 - Eray Gençay, Carsten Sinz, Wolfgang Küchlin, Thorsten Schäfer:

SANchk: SQL-based SAN configuration checking. 91-104 - Mohamed Battisha, Adel Elmaghraby

, Hanafy Meleis, Satya Samineni:
Adaptive tracking of network behavioral signals for real time forensic analysis of service quality degradation. 105-117 - Akshat Verma, Upendra Sharma, Rohit Jain, Koustuv Dasgupta:

Compass: optimizing the migration cost vs. application performance tradeoff. 118-131
Volume 5, Number 3, September 2008
- Selvamuthu Dharmaraja

, Vaneeta Jindal, Upkar Varshney:
Reliability and Survivability Analysis for UMTS Networks: An Analytical Approach. 132-142 - Antonio Capone

, Jocelyne Elias, Fabio Martignon:
Models and Algorithms for the Design of Service Overlay Networks. 143-156 - Xue Liu, Jin Heo, Lui Sha, Xiaoyun Zhu:

Queueing-Model-Based Adaptive Control of Multi-Tiered Web Applications. 157-167 - Tapan Kumar Nayak, Anindya Neogi, Ravi Kothari:

Visualization and Analysis of System Monitoring Data using Multi-resolution Context Information. 168-177 - Jacques Philippe Sauvé, Rodrigo Santos, Rodrigo Rebouças, Antão Moura, Claudio Bartolini:

Change Priority Determination in IT Service Management Based on Risk Exposure. 178-187
Volume 5, Number 4, December 2008
- Vincenzo Eramo

, Marco Listanti
, Antonio Cianfrani
:
Design and evaluation of a new multi-path incremental routing algorithm on software routers. 188-203 - Emanuel P. Freire, Artur Ziviani

, Ronaldo M. Salles
:
Detecting VoIP calls hidden in web traffic. 204-214 - Grigorios Zachariadis, Javier A. Barria:

Dynamic pricing and resource allocation using revenue management for multiservice networks. 215-226 - Ghassan Misherghi, Lihua Yuan, Zhendong Su

, Chen-Nee Chuah
, Hao Chen
:
A general framework for benchmarking firewall optimization techniques. 227-238 - Péter Rácz, Burkhard Stiller:

IP flow accounting application for diameter. 239-246

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














