


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2009
- Mina Amin, Kin-Hon Ho, George Pavlou, Michael P. Howarth:
A Closed-Loop Control Traffic Engineering System for the Dynamic Load Balancing of Inter-AS Traffic. J. Netw. Syst. Manag. 17(4): 343-370 (2009) - Vasileios Baousis
, Miltiadis Kyriakakos, Stathes Hadjiefthymiades
, Lazaros F. Merakos
:
A Multiagent Platform for Ubiquitous Service Provision. J. Netw. Syst. Manag. 17(4): 371-396 (2009) - Niklas Blum, Thomas Magedanz, Florian Schreiner, Sebastian Wahle:
From IMS Management to SOA Based NGN Management. J. Netw. Syst. Manag. 17(1-2): 33-52 (2009) - Latifa Boursas, Heinz-Gerd Hegering, Wolfgang Hommel:
Standards and New Technology for Systems and Virtualization Management: A Report on SVM'08. J. Netw. Syst. Manag. 17(1-2): 99-104 (2009) - Suchismita Chinara, Santanu Kumar Rath
:
A Survey on One-Hop Clustering Algorithms in Mobile Ad Hoc Networks. J. Netw. Syst. Manag. 17(1-2): 183-207 (2009) - Aimilios Chourmouziadis, Marinos Charalambides
, George Pavlou:
On the Performance and Scalability of Web Services for Monitoring MPLS-based Networks. J. Netw. Syst. Manag. 17(1-2): 105-136 (2009) - Ramy Farha, Alberto Leon-Garcia:
Operations Research Methods for Autonomic Resource Management. J. Netw. Syst. Manag. 17(1-2): 157-182 (2009) - Emanuel P. Freire, Artur Ziviani
, Ronaldo Moreira Salles
:
On Metrics to Distinguish Skype Flows from HTTP Traffic. J. Netw. Syst. Manag. 17(1-2): 53-72 (2009) - James Won-Ki Hong, Luoming Meng, Young-Tak Kim, Hiroshi Uno, Shingo Ata, Yan Ma, Deokjai Choi:
Challenges for Next Generation Network Operations and Service Management: a Report on APNOMS 2008. J. Netw. Syst. Manag. 17(1-2): 91-98 (2009) - Mick Kerrigan, Adrian Mocan, Elena Simperl
, Dieter Fensel:
Modeling Semantic Web Services with the Web Service Modeling Toolkit. J. Netw. Syst. Manag. 17(3): 326-342 (2009) - Jae-Hoon Kim:
Design of Common Resource Management and Network Simulator in Heterogeneous Radio Access Network Environment. J. Netw. Syst. Manag. 17(1-2): 137-156 (2009) - Edmundo R. M. Madeira
, Bruno Schulze
:
Managing Networks and Services of the Future. J. Netw. Syst. Manag. 17(1-2): 1-4 (2009) - Filipe Marques, Jacques Philippe Sauvé, J. Antão B. Moura:
SLA Design and Service Provisioning for Outsourced Services. J. Netw. Syst. Manag. 17(1-2): 73-90 (2009) - Declan O'Sullivan
, John Strassner, Sven van der Meer
:
A Snapshot of Ontological Approaches for Network and Service Management. J. Netw. Syst. Manag. 17(3): 231-233 (2009) - Aiko Pras, Ramin Sadre, Anna Sperotto
, Tiago Fioreze, David Hausheer, Jürgen Schönwälder
:
Using NetFlow/IPFIX for Network Management. J. Netw. Syst. Manag. 17(4): 482-487 (2009) - Alberto Gonzalez Prieto, Rolf Stadler:
Adaptive Performance Management for SMS Systems. J. Netw. Syst. Manag. 17(4): 397-421 (2009) - Alvaro E. Prieto
, Adolfo Lozano Tello
:
Use of Ontologies as Representation Support of Workflows Oriented to Administrative Management. J. Netw. Syst. Manag. 17(3): 309-325 (2009) - Yasuhiro Sato, Shingo Ata, Ikuo Oka:
A Strategic Approach for Re-organizing the Internet Topology by Applying Social Behavior Dynamics. J. Netw. Syst. Manag. 17(1-2): 208-229 (2009) - Jacques Philippe Sauvé, Antão Moura, Filipe Marques:
Business-Driven Design of Infrastructures for IT Services. J. Netw. Syst. Manag. 17(4): 422-456 (2009) - John Strassner, Sven van der Meer
, Declan O'Sullivan
, Simon Dobson
:
The Use of Context-Aware Policies and Ontologies to Facilitate Business-Aware Network Management. J. Netw. Syst. Manag. 17(3): 255-284 (2009) - John Strassner, José Neuman de Souza
, Sven van der Meer
, Steven Davy
, Keara Barrett
, David Raymer, Srini Samudrala:
The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking. J. Netw. Syst. Manag. 17(1-2): 5-32 (2009) - Ha Manh Tran
, Christoph Lange
, Georgi Chulkov, Jürgen Schönwälder
, Michael Kohlhase
:
Applying Semantic Techniques to Search and Analyze Bug Tracking Data. J. Netw. Syst. Manag. 17(3): 285-308 (2009) - Jorge E. López de Vergara
, Antonio Guerrero, Víctor A. Villagrá
, Julio Berrocal:
Ontology-Based Network Management: Study Cases and Lessons Learned. J. Netw. Syst. Manag. 17(3): 234-254 (2009) - Stefan Wallin
:
Chasing a Definition of "Alarm". J. Netw. Syst. Manag. 17(4): 457-481 (2009)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-06-28 00:12 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
