


default search action
IEEE Transactions on Network and Service Management, Volume 9
Volume 9, Number 1, March 2012
- JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu:

Systematic Structural Testing of Firewall Policies. 1-11 - Khaled Salah

, Khalid Elbadawi, Raouf Boutaba:
Performance Modeling and Analysis of Network Firewalls. 12-21 - Ulrik Franke

:
Optimal IT Service Availability: Shorter Outages, or Fewer? 22-33 - Yongning Tang, Ehab Al-Shaer, Kaustubh R. Joshi:

Reasoning under Uncertainty for Overlay Fault Diagnosis. 34-47 - Guanyao Huang, Chia-Wei Chang, Chen-Nee Chuah

, Bill Lin:
Measurement-Aware Monitor Placement and Routing: A Joint Optimization Approach for Network-Wide Measurements. 48-59 - Hamada Alshaer

, Jaafar M. H. Elmirghani
:
Multilayer Dynamic Traffic Grooming with Constrained Differentiated Resilience in IP/MPLS-over-WDM Networks. 60-72 - Sourav Kumar Dandapat, Bivas Mitra, Romit Roy Choudhury, Niloy Ganguly

:
Smart Association Control in Wireless Mobile Environment Using Max-Flow. 73-86 - Tadeusz A. Wysocki, Abbas Jamalipour

:
An Economic Welfare Preserving Framework for Spot Pricing and Hedging of Spectrum Rights for Cognitive Radio. 87-99 - Mohamed F. Younis

, Osama Farrag, Bryan Althouse:
TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks. 100-113
Volume 9, Number 2, June 2012
- Abdelkader Lahmadi, Olivier Festor

:
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services. 114-127 - Anna Sperotto

, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras:
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study. 128-141 - José Luis García-Dorado

, Alessandro Finamore, Marco Mellia
, Michela Meo
, Maurizio M. Munafò:
Characterization of ISP Traffic: Trends, User Habits, and Access Technology Impact. 142-155 - Michele Nogueira

, Helber Silva, Aldri Luiz dos Santos
, Guy Pujolle:
A Security Management Architecture for Supporting Routing Services on WANETs. 156-168 - Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection. 169-183 - Péter Szilágyi, Szabolcs Nováczki

:
An Automatic Detection and Diagnosis Framework for Mobile Communication Systems. 184-197 - Ningfang Mi, Giuliano Casale

, Evgenia Smirni:
ASIdE: Using Autocorrelation-Based Size Estimation for Scheduling Bursty Workloads. 198-212 - Fetahi Wuhib, Rolf Stadler, Mike Spreitzer:

A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments. 213-225
Volume 9, Number 3, September 2012
- Yinan Li, Ing-Ray Chen:

Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding. 226-239 - Iyad A. Katib

, Deep Medhi:
IP/MPLS-over-OTN-over-DWDM Multilayer Networks: An Integrated Three-Layer Capacity Optimization Model, a Heuristic, and a Study. 240-253 - Antonio Cianfrani

, Vincenzo Eramo
, Marco Listanti
, Marco Polverini
, Athanasios V. Vasilakos
:
An OSPF-Integrated Routing Strategy for QoS-Aware Energy Saving in IP Backbone Networks. 254-267 - Chengchen Hu, Kai Chen

, Yan Chen, Bin Liu, Athanasios V. Vasilakos
:
A Measurement Study on Potential Inter-Domain Routing Diversity. 268-278 - Hamza Dahmouni

, André Girard, Mohamed Ouzineb, Brunilde Sansò:
The Impact of Jitter on Traffic Flow Optimization in Communication Networks. 279-292 - Glenn Robertson, Srihari Nelakuditi:

Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing. 293-305 - Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee

, Xingang Shi, Dah Ming Chiu, Yuan Yang:
A Unified Approach to Routing Protection in IP Networks. 306-319 - Carol J. Fung, Jie Zhang, Raouf Boutaba:

Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks. 320-332 - Yaping Zhu, Benjamin Helsley, Jennifer Rexford

, Aspi Siganporia, Sridhar Srinivasan:
LatLong: Diagnosing Wide-Area Latency Changes for CDNs. 333-345 - B. K. Pradeepa, Joy Kuri:

An Estimated Delay Based Association Policy for Web Browsing in a Multirate WLAN. 346-358 - Ioannis Papapanagiotou, Matthias Falkner, Michael Devetsikiotis:

Optimal Functionality Placement for Multiplay Service Provider Architectures. 359-372
Volume 9, Number 4, December 2012
- Qiang Duan, Yuhong Yan, Athanasios V. Vasilakos

:
A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing. 373-392 - Jun Li, Sharad Singhal, Ram Swaminathan, Alan H. Karp:

Managing Data Retention Policies at Scale. 393-406 - Felix Musau, Guojun Wang, Shui Yu

, Muhammad Bashir Abdullahi
:
Securing Recommendations in Grouped P2P E-Commerce Trust Model. 407-420 - Alberto Sampaio Lima, Jacques Philippe Sauvé, José Neuman de Souza:

Capturing the Quality and Business Value of IT Services Using a Business-Driven Model. 421-432 - Tristan Groleat, Hélia Pouyllau:

Distributed Learning Algorithms for Inter-NSP SLA Negotiation Management. 433-445 - Elliott Karpilovsky, Matthew Caesar

, Jennifer Rexford
, Aman Shaikh, Jacobus E. van der Merwe:
Practical Network-Wide Compression of IP Routing Tables. 446-458 - Taghrid Samak, Ehab Al-Shaer:

Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks. 459-472 - Yihua Zhu, Han-cheng Lu, Victor C. M. Leung

:
Access Point Buffer Management for Power Saving in IEEE 802.11 WLANs. 473-486 - Richard Combes, Zwi Altman, Eitan Altman:

Self-Organizing Relays: Dimensioning, Self-Optimization, and Learning. 487-500 - Bechir Hamdaoui, MohammadJavad NoroozOliaee, Kagan Tumer, Ammar Rayes:

Coordinating Secondary-User Behaviors for Inelastic Traffic Reward Maximization in Large-Scale \osa Networks. 501-513

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














