Abstract is missing.
- Towards self-adaptive management frameworks: The case of aggregated information monitoringRafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti. 1-5 [doi]
- Sub-Space clustering, Inter-Clustering Results Association & anomaly correlation for unsupervised network anomaly detectionJohan Mazel, Pedro Casas, Yann Labit, Philippe Owezarski. 1-8 [doi]
- Supporting vulnerability awareness in autonomic networks and systems with OVALMartín Barrère, Remi Badonnel, Olivier Festor. 1-8 [doi]
- Autonomic downlink inter-cell interference coordination in LTE Self-Organizing NetworksPanagiotis Vlacheas, Evangelos Thomatos, Kostas Tsagkaris, Panagiotis Demestichas. 1-5 [doi]
- Operator placement with QoS constraints for distributed stream processingYuanqiang Huang, Zhongzhi Luan, Rong He, Depei Qian. 1-7 [doi]
- Automatic detection of sub-optimal performance in UMTS networks based on drive-test measurementsOriol Sallent, Jordi Pérez-Romero, Juan Sanchez-Gonzalez, Ramón Agustí, Miguel Ángel Díaz-Guerra, David Henche, Daniel Paul. 1-4 [doi]
- SMURFEN: A system framework for rule sharing collaborative intrusion detectionCarol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar. 1-6 [doi]
- TARWIS - A testbed management architecture for wireless sensor network testbedsPhilipp Hurni, Markus Anwander, Gerald Wagenknecht, Thomas Staub, Torsten Braun. 1-4 [doi]
- Hotspot diagnosis on logical levelBo Yang 0013, Hendrik F. Hamann, Jeffrey O. Kephart, Stephan Barabasi. 1-5 [doi]
- Dynamic service adaptation for plug and play device interoperabilityCharbel El Kaed, Yves Denneulin, François-Gaël Ottogalli. 1-9 [doi]
- Criticality avoidance: A new paradigm for congestion control based on science of phase transitionSiun-Chuon Mau, Akshay Vashist, Alexander Poylisher, Ritu Chadha, Cho-Yu Jason Chiang. 1-6 [doi]
- Collaborative policy-based autonomic management: In a hierarchical modelOmid Mola, Michael A. Bauer. 1-5 [doi]
- Securing P2P systems from Sybil attacks through adaptive identity managementWeverton Luis da Costa Cordeiro, Flavio Roberto Santos, Gustavo Huff Mauch, Marinho P. Barcellos, Luciano Paschoal Gaspary. 1-6 [doi]
- On synthesizing distributed firewall configurations considering risk, usability and cost constraintsBin Zhang 0007, Ehab Al-Shaer. 1-8 [doi]
- Fault management and service provisioning process model of next generation access networksCarmen Mas Machuca, Sandro Kraus, Koen Casier. 1-6 [doi]
- Verifying home network bandwidth sharing plansDimosthenis Pediaditakis, Naranker Dulay. 1-9 [doi]
- Towards green computing using diskless high performance clustersK. Salah, R. Al-Shaikh, M. Sindi. 1-4 [doi]
- Universal economic analysis for IT transformationChang-Shing Perng, Rong N. Chang, Tao Tao, Edward So, Mihwa Choi, Hidayatullah Shaikh. 1-4 [doi]
- Staffing optimization in complex service delivery systemsYixin Diao, Aliza Heching. 1-9 [doi]
- Internet Bad Neighborhoods: The spam caseGiovane Cesar Moreira Moura, Ramin Sadre, Aiko Pras. 1-8 [doi]
- Performance analysis of SNMP in OLSRv2-routed MANETsUlrich Herberg, Robert G. Cole, Jiazi Yi. 1-5 [doi]
- Unleashing the power of policies for service-oriented computingCarlos Alberto Kamienski, Ramide Dantas, Ernani Azevedo, Cyrus Dias, Djamel Sadok, Börje Ohlman. 1-5 [doi]
- MODE: Mix Driven On-line Resource Demand EstimationAmir Kalbasi, Diwakar Krishnamurthy, Jerry Rolia, Michael Richter. 1-9 [doi]
- A comparison between divergence measures for network anomaly detectionJean Tajer, Ali Makke, Osman Salem, Ahmed Mehaoua. 1-5 [doi]
- Performance management and quantitative modeling of IT service processes using mashup patternsCarlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Winnie Cheng, David Loewenstern, Larisa Shwartz, Nikos Anerousis. 1-9 [doi]
- Online workflow management and performance analysis with StampedeDan Gunter, Ewa Deelman, Taghrid Samak, Christopher X. Brooks, Monte Goode, Gideon Juve, Gaurang Mehta, Priscilla Moraes, Fabio Silva, D. Martin Swany, Karan Vahi. 1-10 [doi]
- CloudOpt: Multi-goal optimization of application deployments across a cloudJim Zw Li, C. Murray Woodside, John W. Chinneck, Marin Litoiu. 1-9 [doi]
- Enforcing security with behavioral fingerprintingJérôme François, Radu State, Thomas Engel, Olivier Festor. 1-9 [doi]
- Realization of name lookup table in routers towards content-centric networksHaesung Hwang, Shingo Ata, Masayuki Murata. 1-5 [doi]
- A 100Gig network processor platform for openflowOmar El Ferkouss, Ilyas Snaiki, Omar Mounaouar, Hamza Dahmouni, Racha Ben Ali, Yves Lemieux, Omar Cherkaoui. 1-4 [doi]
- Gossip-based resource allocation for green computing in large cloudsRerngvit Yanggratoke, Fetahi Wuhib, Rolf Stadler. 1-9 [doi]
- Outsourced management of home and SOHO Windows desktopsTiago Cruz, Paulo Simões, João Rodrigues, Edmundo Monteiro, Fernando Bastos. 1-7 [doi]
- A unifying architecture for easy development, deployment and management of voice-driven mobile applicationsJakub Dolezal, Lukas Kencl. 1-5 [doi]
- Monitoring, aggregation and filtering for efficient management of virtual networksStuart Clayman, Richard G. Clegg, Lefteris Mamatas, George Pavlou, Alex Galis. 1-7 [doi]
- Semi-automated data center hotspot diagnosisSuzanne McIntosh, Jeffrey O. Kephart, Jonathan Lenchner, B. Yang, Metin Feridun, M. Nidd, Axel Tanner, I. Barabasi. 1-7 [doi]
- Assessing RoQ attacks on MANETs over aware and unaware TPC techniquesUrlan Barros, Mathieu Bouet, Aldri Luiz dos Santos, Michele Nogueira. 1-5 [doi]
- Simulation based evaluation of dynamic resource allocation for adaptive multimedia servicesKrunoslav Ivesic, Maja Matijasevic, Lea Skorin-Kapov. 1-4 [doi]
- Self-organizing relays in LTE networks: Queuing analysis and algorithmsRichard Combes, Zwi Altman, Eitan Altman. 1-8 [doi]
- NEPnet: A scalable monitoring system for anomaly detection of network serviceSujun Cheng, Zhendong Cheng, Zhongzhi Luan, Depei Qian. 1-5 [doi]
- A trace-based service level planning framework for enterprise application cloudsAnas Youssef, Diwakar Krishnamurthy. 1-5 [doi]
- Research on Home NodeB Gateway load balancing mechanismXiaojie Wang, Lanlan Rui, Peng Yu, Xingyu Chen. 1-5 [doi]
- Adaptive terminal reporting for scalable service quality monitoring in large networksJan Groenendijk, Yangcheng Huang, Liam Fallon. 1-5 [doi]
- A unified approach to coordinated energy-management in data centersRajarshi Das, Srinivas Yarlanki, Hendrik F. Hamann, Jeffrey O. Kephart, Vanessa Lopez. 1-5 [doi]
- QoS based service provisioning in NGN/NGS contextSoumia Kessal, Noëmie Simoni. 1-5 [doi]
- A service management architecture component modelJianwen Chen, Rhonda Childress, Iain Mcintosh, George Africa, Arthur Sitaramayya. 1-4 [doi]
- Adaptive QoE measurement on videostreaming IP servicesJosé A. Lozano, Alfonso Castro, Beatriz Fuentes, Juan Manuel González, Alvaro Rodríguez. 1-4 [doi]
- Policy-assisted planning and deployment of virtual networksSteven Davy, Joan Serrat, Antonio Astorga, Brendan Jennings, Javier Rubio-Loyola. 1-8 [doi]
- Towards decentralized and adaptive network resource managementDaphné Tuncer, Marinos Charalambides, George Pavlou, Ning Wang. 1-6 [doi]
- Monitoring network topology dynamism of large-scale traceroute-based measurementsThomas Bourgeau. 1-5 [doi]
- A probe prediction approach to overlay network monitoringShun-an Wu, Qiao Yan, Xuesong Qiu, Yanjie Ren. 1-5 [doi]
- Service deactivation aware placement and defragmentation in enterprise cloudsSourav Dutta, Akshat Verma. 1-9 [doi]
- Reasoning services for security and energy management in wireless sensor networksMaiSsa Mbaye, Hicham Khalife, Francine Krief. 1-5 [doi]
- An autonomic open marketplace for service management and resilienceHaydn Mearns, John Leaney, Artem Parakhine, John K. Debenham, Dominique Verchère. 1-5 [doi]
- Self-adaptive routing in multi-hop sensor networksThemistoklis Bourdenas, David Wood, Petros Zerfos, Flávio Bergamaschi, Morris Sloman. 1-9 [doi]
- A web-based what-if scenario analysis tool for performance improvement of IT support organizationsClaudio Bartolini, Cesare Stefanelli, Davide Targa, Mauro Tortonesi. 1-5 [doi]
- Multihop cellular network optimization using genetic algorithmsVelmurugan Ayyadurai, Klaus Moessner, Rahim Tafazolli. 1-5 [doi]
- Mitigating the negative impact of preemption on heterogeneous MapReduce workloadsLu Cheng, Qi Zhang, Raouf Boutaba. 1-9 [doi]
- Increasing data center network visibility with cisco NetFlow-LiteLuca Deri, Ellie Chou, Zach Cherian, Kedar Karmarkar, Mike Patterson. 1-6 [doi]
- Functional components for a Security Manager within future Inter-Cloud environmentsMichael Kretzschmar, Mario Golling. 1-5 [doi]
- Peer-assisted network operator-friendly P2P traffic control techniqueHyunYong Lee, Akihiro Nakao. 1-9 [doi]
- A performance and usability comparison of automated planners for IT change planningSebastian Hagen, Alfons Kemper. 1-9 [doi]
- Using strategy trees in change management in cloudsHiroshi Otsuka, Hanan Lutfiyya. 1-9 [doi]
- Managing a SaaS application in the cloud using PaaS policy sets and a strategy-treeBradley Simmons, Hamoun Ghanbari, Marin Litoiu, Gabriel Iszlai. 1-5 [doi]
- Scalable root cause analysis assisted by classified alarm information model based algorithmMasanori Miyazawa, Kosuke Nishimura. 1-4 [doi]
- A bi-criteria algorithm for multipoint-to-multipoint virtual connections in transport networksLúcia Martins, Nuno Ferreira, José M. F. Craveirinha. 1-5 [doi]
- An approach to peer selection in service overlaysAdriano Fiorese, Paulo Simões, Fernando Boavida. 1-4 [doi]
- Automated service provisioning and management for integrated femtocell/Wi-Fi and cellular networksYa-Shian Wang, Chin-Ping Chuang, Kuan-Hsiung Liang, Been-Hwang Liao, Shou-Yi Cheng. 1-5 [doi]
- Introducing energy-awareness in Traffic Engineering for Future NetworksGeorge Athanasiou, Kostas Tsagkaris, Panagiotis Vlacheas, Panagiotis Demestichas. 1-4 [doi]
- Cross-layer cluster-based data dissemination for failure detection in MANETsDavid Kidston, Li Li 0009, Walee Al Mamun, Hanan Lutfiyya. 1-7 [doi]
- Policy refinement: Decomposition and operationalization for dynamic domainsRobert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman. 1-9 [doi]
- An ontology-driven approach to support wireless network monitoring for home area networksYuqian Song, John Keeney, Owen Conlan, Philip Perry, Adriana Hava. 1-7 [doi]
- Integrated management of network and security devices in IT infrastructuresBart Van Brabant, Wouter Joosen. 1-5 [doi]
- Modeling and simulation of DiffServ scenarios with the NSDL frameworkEduardo M. D. Marques, Jose J. F. Sousa, Paulo Nazareno Maia Sampaio. 1-4 [doi]
- Towards a security framework for a WS-HumanTask processorMichael Gerhards, Sascha Skorupa, Volker Sander, P. Pfeiffer, Adam Belloum. 1-5 [doi]
- AMF configurations: Checking for service protection using heuristicsPejman Salehi, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe. 1-8 [doi]
- A remote water sensing system with optical fiber networksYu-Jen Hsu, Chih-Yih Wang, Zi-Wen Wang. 1-5 [doi]
- Autonomic management of workflows on hybrid Grid-Cloud infrastructureGiuseppe Papuzzo, Giandomenico Spezzano. 1-4 [doi]
- Scalable deterministic end-to-end probing and analytical method for overlay network monitoringYanjie Ren, Yan Qiao, Xuesong Qiu, Shun-an Wu. 1-5 [doi]
- Towards introspectable, adaptable and extensible autonomic managersYoann Maurel, Philippe Lalanda, Ada Diaconescu. 1-5 [doi]
- Control and visualization system for managed self-organization networkShohei Kamamura, Yuki Koizumi, Takashi Miyamura, Shin'ichi Arakawa, Kohei Shiomoto, Masayuki Murata. 1-4 [doi]
- Application-defined control of virtual networks over IP-optical networksAkeo Masuda, Akinori Isogai, Takashi Miyamura, Kohei Shiomoto, Atsushi Hiramatsu. 1-6 [doi]
- Witnessing Distributed Denial-of-Service traffic from an attacker's networkSin-Seok Seo, Young J. Won, James Won-Ki Hong. 1-7 [doi]
- Adword auction bidding strategies of budget-limited advertisers on competing search enginesPatrick Maillé, Bruno Tuffin. 1-7 [doi]
- Distributed workload and response time management for web applicationsShengzhi Zhang, Haishan Wu, Wenjie Wang, Bo Yang 0013, Peng Liu 0005, Athanasios V. Vasilakos. 1-9 [doi]