Abstract is missing.
- Live datastore transformation for optimizing big data applications in cloud environmentsThomas Vanhove, Gregory van Seghbroeck, Tim Wauters, Filip De Turck. 1-8 [doi]
- DNA: An SDN framework for distributed network analyticsAlexander Clemm, Mouli Chandramouli, Sailesh Krishnamurthy. 9-17 [doi]
- DREAMS: Dynamic resource allocation for MapReduce with data skewZhihong Liu, Qi Zhang, Mohamed Faten Zhani, Raouf Boutaba, Yaping Liu, Zhenghu Gong. 18-26 [doi]
- A data annotation architecture for semantic applications in virtualized wireless sensor networksImran Khan, Rifat Jafrin, Fatima Zahra Errounda, Roch H. Glitho, Noël Crespi, Monique Morrow, Paul A. Polakos. 27-35 [doi]
- A batch approach for a survivable virtual network embedding based on Monte-Carlo Tree SearchOussama Soualah, Ilhem Fajjari, Nadjib Aitsaadi, Abdelhamid Mellouk. 36-43 [doi]
- Toward service selection game in a heterogeneous market cloud computingCuong T. Do, Nguyen H. Tran, Dai Hoang Tran, Chuan Pham, Md. Golam Rabiul Alam, Choong Seon Hong. 44-52 [doi]
- QoS-aware bidding strategies for VM spot instances: A reinforcement learning approach applied to periodic long running jobsMarco Abundo, Valerio Di Valerio, Valeria Cardellini, Francesco Lo Presti. 53-61 [doi]
- A framework for the 3-D cloud monitoring based on data stream generation and analysisDario Bruneo, Francesco Longo, Clarissa Cassales Marquezan. 62-70 [doi]
- Predictor: Providing fine-grained management and predictability in multi-tenant datacenter networksDaniel S. Marcon, Marinho P. Barcellos. 71-79 [doi]
- EnforSDN: Network policies enforcement with SDNYaniv Ben-Itzhak, Katherine Barabash, Rami Cohen, Anna Levin, Eran Raichstein. 80-88 [doi]
- Towards making network function virtualization a cloud computing serviceWindhya Rankothge, Jiefei Ma, Franck Le, Alessandra Russo, Jorge Lobo. 89-97 [doi]
- Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functionsMarcelo Caggiani Luizelli, Leonardo Richter Bays, Luciana Salete Buriol, Marinho P. Barcellos, Luciano Paschoal Gaspary. 98-106 [doi]
- Testing a community network testbed control systemBart Braem, Jeroen Avonts, Chris Blondia, Steven Latré. 107-112 [doi]
- HELM: Conflict-free active measurement scheduling for shared network resource managementMiao Zhang, D. Martin Swany, Adithya Yavanamanda, Ezra Kissel. 113-121 [doi]
- Evaluating SNMP, NETCONF, and RESTful web services for router virtualization managementPaulo Roberto da Paz Ferraz Santos, Rafael Pereira Esteves, Lisandro Zambenedetti Granville. 122-130 [doi]
- A learning-based algorithm for improved bandwidth-awareness of adaptive streaming clientsJeroen van der Hooft, Stefano Petrangeli, Maxim Claeys, Jeroen Famaey, Filip De Turck. 131-138 [doi]
- Rate, power and carrier-sense threshold coordinated management for high-density IEEE 802.11 networksMatias Richart, Jorge Visca, Javier Baliosian. 139-146 [doi]
- FSM-based Wi-Fi power estimation method for smart devicesJian Li, Jin Xiao, James Won-Ki Hong, Raouf Boutaba. 147-155 [doi]
- DiSCA: A distributed scheduling for convergecast in multichannel wireless sensor networksRidha Soua, Pascale Minet, Erwan Livolant. 156-164 [doi]
- Capitalizing on SDN-based SCADA systems: An anti-eavesdropping case-studyEduardo Germano da Silva, Luis Augusto Dias Knob, Juliano Araujo Wickboldt, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho. 165-173 [doi]
- How to adapt: SVC-based quality adaptation for hybrid peercasting systemsMatthias Wichtlhuber, Julius Rückert, David Winter, David Hausheer. 174-182 [doi]
- Algorithms for advance bandwidth reservation in media production networksMaryam Barshan, Hendrik Moens, Jeroen Famaey, Filip De Turck. 183-190 [doi]
- Beacon-less video streaming management for VANETs based on QoE and link-qualityCarlos Quadros, Eduardo Cerqueira, Aldri Luiz dos Santos, Jae-Han Lim, Mario Gerla. 191-198 [doi]
- CCNrel: Leveraging relations among objects to improve the performance of CCNRodolfo Stoffel Antunes, Matheus B. Lehmann, Rodrigo B. Mansilha, Christian Esteve Rothenberg, Luciano Paschoal Gaspary, Marinho P. Barcellos. 199-206 [doi]
- Interactive monitoring, visualization, and configuration of OpenFlow-based SDNPedro Heleno Isolani, Juliano Araujo Wickboldt, Cristiano Bonato Both, Juergen Rochol, Lisandro Zambenedetti Granville. 207-215 [doi]
- Policy authoring for software-defined networking managementCristian Cleder Machado, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho. 216-224 [doi]
- A fast method of verifying network routing with back-trace header space analysisToshio Tonouchi, Satoshi Yamazaki, Yutaka Yakuwa, Nobuyuki Tomizawa. 225-233 [doi]
- Sparsifying network topologies for application guidanceMichael Scharf, Gordon T. Wilfong, Lisa Zhang. 234-242 [doi]
- Booters - An analysis of DDoS-as-a-service attacksJosé Jair Santanna, Roland van Rijswijk-Deij, Rick Hofstede, Anna Sperotto, Mark Wierbosch, Lisandro Zambenedetti Granville, Aiko Pras. 243-251 [doi]
- An optimal statistical test for robust detection against interest flooding attacks in CCNTan Nguyen, Rémi Cogranne, Guillaume Doyen. 252-260 [doi]
- How to exchange security events? Overview and evaluation of formats and protocolsJessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier. 261-269 [doi]
- Unveiling flat traffic on the Internet: An SSH attack case studyMattijs Jonker, Rick Hofstede, Anna Sperotto, Aiko Pras. 270-278 [doi]
- Early network failure detection system by analyzing Twitter dataKei Takeshita, Masahiro Yokota, Ken Nishimatsu. 279-286 [doi]
- Resolution recommendation for event tickets in service managementWubai Zhou, Liang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik. 287-295 [doi]
- Dude, ask the experts!: Android resource access permission recommendation with RecDroidBahman Rashidi, Carol J. Fung, Tam Vu. 296-304 [doi]
- Latent trait analysis for risk management of complex information technology projectsTsuyoshi Idé, Sinem Guven, Ee-Ea Jan, Sergey Makogon, Alejandro Venegas. 305-312 [doi]
- QoS-based cloud resources partitioning aware networked edge datacentersAbdallah Jarray, Javier Salazar, Ahmed Karmouch, Jocelyne Elias, Ahmed Mehaoua. 313-320 [doi]
- Towards efficient on-demand VM provisioning: Study of VM runtime I/O access patterns to shared image contentAndrzej Kochut, Alexei Karve, Bogdan Nicolae. 321-329 [doi]
- Dynamic management of applications with constraints in virtualized data centresGastón Keller, Hanan Lutfiyya. 330-338 [doi]
- Do you know how to configure your enterprise relational database to reduce incidents?Ioana Giurgiu, Adela-Diana Almasi, Dorothea Wiesmann. 339-347 [doi]
- A graph coloring approach for scheduling undo actions in self-organizing networksTsvetko Tsvetkov, Henning Sanneck, Georg Carle. 348-356 [doi]
- STS: Space-time scheduling for coordinating self-organization network functions in LTEStephen S. Mwanje, Andreas Mitschele-Thiel. 357-362 [doi]
- Automatic network configuration with dynamic churn predictionAndri Lareida, Thomas Bocek, Maxat Pernebayev, Burkhard Stiller. 363-370 [doi]
- Disaster-prediction based virtual network mapping against multiple regional failuresXiao Liu, Ying Wang, Ailing Xiao, Xuesong Qiu, Wenjing Li. 371-378 [doi]
- Rethinking virtual private networks in the software-defined eraGabriele Lospoto, Massimo Rimondini, Benedetto Gabriele Vignoli, Giuseppe Di Battista. 379-387 [doi]
- Ethanol: Software defined networking for 802.11 Wireless NetworksHenrique Moura, Gabriel V. C. Bessa, Marcos Augusto M. Vieira, Daniel F. Macedo. 388-396 [doi]
- HyperFlex: An SDN virtualization architecture with flexible hypervisor function allocationAndreas Blenk, Arsany Basta, Wolfgang Kellerer. 397-405 [doi]
- Dynamic capacity management and traffic steering in enterprise passive optical networksAhmed Amokrane, Jin Xiao, Jinho Hwang, Nikos Anerousis. 406-413 [doi]
- Predicting real-time service-level metrics from device statisticsRerngvit Yanggratoke, Jawwad Ahmed, John Ardelius, Christofer Flinta, Andreas Johnsson, Daniel Gillblad, Rolf Stadler. 414-422 [doi]
- Detecting performance interference in cloud-based web servicesYasaman Amannejad, Diwakar Krishnamurthy, Behrouz Homayoun Far. 423-431 [doi]
- Inside booters: An analysis on operational databasesJosé Jair Santanna, Romain Durban, Anna Sperotto, Aiko Pras. 432-440 [doi]
- An Ontology-Based Information Extraction System for bridging the configuration gap in hybrid SDN environmentsA. Martinez, Marcelo Yannuzzi, Jorge E. López de Vergara, René Serral-Gracià, Wilson Ramírez. 441-449 [doi]
- Poisson shot-noise process based flow-level traffic matrix generation for data center networksYoonseon Han, Jae-Hyoung Yoo, James Won-Ki Hong. 450-457 [doi]
- Iterative-tuning support vector machine for network traffic classificationYang Hong, Changcheng Huang, Biswajit Nandy, Nabil Seddigh. 458-466 [doi]
- Divide and conquer: Partitioning OSPF networks with SDNMarcel Caria, Tamal Das, Admela Jukan. 467-474 [doi]
- Multiple classes of service provisioning with bandwidth and delay guarantees in dynamic circuit networkTananun Orawiwattanakul, Hideki Otsuki, Eiji Kawai, Shinji Shimojo. 475-483 [doi]
- Data-centric service-oriented management of thingsMarc-Oliver Pahl. 484-490 [doi]
- Enhancing Twitter spam accounts discovery using cross-account pattern miningIoana-Alexandra Bara, Carol J. Fung, Thang Dinh. 491-496 [doi]
- Heterogeneous cloud systems monitoring using semantic and linked data technologiesAlessandro Portosa, M. Mustafa Rafique, Spyros Kotoulas, Luca Foschini, Antonio Corradi. 497-503 [doi]
- Ontology integration for advanced manufacturing collaboration in cloud platformsShravya Ramisetty, Prasad Calyam, Joe Cecil, Amit Rama Akula, Ronny Bazan Antequera, Ray Leto. 504-510 [doi]
- Optimizing capacity allocation for big data applications in cloud datacentersSebastiano Spicuglia, Lydia Y. Chen, Robert Birke, Walter Binder. 511-517 [doi]
- A high performance VoLTE traffic classification method using HTCondorJonghwan Hyun, Jian Li, Chaetae Im, Jae-Hyoung Yoo, James Won-Ki Hong. 518-524 [doi]
- A load balancing method in downlink LTE network based on load vector minimizationFanqin Zhou, Lei Feng, Peng Yu, Wenjing Li. 525-530 [doi]
- Temporal load balancing of time-driven machine type communications in mobile core networksGo Hasegawa, Takanori Iwai, Naoki Wakamiya. 531-537 [doi]
- Topology-aware based energy-saving mechanism in wireless cellular networksNan Xiang, Wenjing Li, Lei Feng, Fanqin Zhou, Peng Yu. 538-544 [doi]
- Cross-layer management of distributed applications on multi-cloudsAntonis Papaioannou, Damianos Metallidis, Kostas Magoutis. 552-558 [doi]
- Modeling and pricing cloud service elasticity for geographically distributed applicationsBassem Wanis, Nancy Samaan, Ahmed Karmouch. 559-565 [doi]
- Software defined wireless access for a two-tier cloud systemSina Monfared, Hadi Bannazadeh, Alberto Leon-Garcia. 566-571 [doi]
- Catching the response time tail in the cloudSebastiano Spicuglia, Mathias Björkqvist, Lydia Y. Chen, Walter Binder. 572-577 [doi]
- Towards cloud-based compositions of security functions for mobile devicesGaetan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor. 578-584 [doi]
- Introducing wireless access programmability using software-defined infrastructureThomas Lin, Hadi Bannazadeh, Alberto Leon-Garcia. 585-591 [doi]
- Lifetime maximizing clustering structure using archimedes' spiral based deployment in WSNsSubir Halder, Amrita Ghosal. 592-598 [doi]
- URL forwarding for NAT traversalMd. Ahsan Raza, Reaz Ahmed, Raouf Boutaba. 599-605 [doi]
- Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of ThingsChristian Cervantes, Diego Poplade, Michele Nogueira, Aldri Santos. 606-611 [doi]
- Control-plane slicing methods in multi-tenant software defined networksChristos Argyropoulos, Spyridon Mastorakis, Kostas Giotis, Georgios Androulidakis, Dimitrios Kalogeras, Vasilis Maglaris. 612-618 [doi]
- Establishing PDCA cycles for agile network management in SDN/NFV infrastructureKotaro Shibata, Hiroki Nakayama, Tsunemasa Hayashi, Shingo Ata. 619-625 [doi]
- Interference management in software-defined mobile networksRoberto Riggio, Mahesh K. Marina, Tinku Rasheed. 626-632 [doi]
- The limits of architectural abstraction in network function virtualizationBalázs Németh, Xavier Simonart, Neal Oliver, Wim Lamotte. 633-639 [doi]
- vNMF: Distributed fault detection using clustering approach for network function virtualizationMasanori Miyazawa, Michiaki Hayashi, Rolf Stadler. 640-645 [doi]
- Adaptive boolean network tomography for link failure detectionMasaki Mukamoto, Takahiro Matsuda, Shinsuke Hara, Kenichi Takizawa, Fumie Ono, Ryu Miura. 646-651 [doi]
- Fault detection for cloud computing systems with correlation analysisTao Wang, Wenbo Zhang, Jun Wei, Hua Zhong. 652-658 [doi]
- A fault-tolerant and energy-aware mechanism for cluster-based routing algorithm of WSNsMaryam Hezaveh, Zahra Shirmohammadi, Nezam Rohbani, Seyed Ghassem Miremadi. 659-664 [doi]
- Management architecture against hardware failures in an optical packet and circuit integrated networkTakaya Miyazawa, Hideaki Furukawa, Tatsuya Torita, Masaru Sugawara, Manabu Kinugasa, Emiko Yashima, Hiroaki Harai. 665-671 [doi]
- Differentiated pacing on multiple paths to improve one-way delay estimationsMatthieu Coudron, Stefano Secci, Guy Pujolle. 672-678 [doi]
- An adaptable storage slicing algorithm for content delivery networksAndré Moreira, Ernani Azevedo, Judith Kelner, Djamel Sadok, Arthur C. Callado, Victor Souza. 679-685 [doi]
- Kaleidoscope: Real-time content delivery in software defined infrastructuresQi Zhang, Sai Qian Zhang, Jieyu Lin, Hadi Bannazadeh, Alberto Leon-Garcia. 686-692 [doi]
- Analyzing strategies to effectively detect changes in content delivery networksAndré Moreira, Moisés Rodrigues, Ernani Azevedo, Djamel Sadok, Arthur C. Callado, Victor Souza. 693-699 [doi]
- Improving flow completion time for short flows in datacenter networksSijo Joy, Amiya Nayak. 700-705 [doi]
- An intelligent two-agent self-configuration approach for radio resource managementKevin Collados, Juan-Luis Gorricho, Joan Serrat, Hu Zheng, Ke Xu. 706-712 [doi]
- Distributed decision engine - An information management architecture for autonomie wireless networkingMarkus Luoto, Teemu Rautio, Tiia Ojanperä, Jukka Mäkelä. 713-719 [doi]
- Towards flexible, scalable and autonomic virtual tenant slicesMohamed Fekih Ahmed, Chamseddine Talhi, Mohamed Cheriet. 720-726 [doi]
- On re-assembling self-managed componentsPedro Rodrigues, Jeff Kramer, Emil C. Lupu. 727-733 [doi]
- Intelligent timeout master: Dynamic timeout for SDN-based data centersHuikang Zhu, Hongbo Fan, Xuan Luo, Yaohui Jin. 734-737 [doi]
- Towards NFV-based multimedia deliveryNiels Bouten, Jeroen Famaey, Rashid Mijumbi, Bram Naudts, Joan Serrat, Steven Latré, Filip De Turck. 738-741 [doi]
- Monitoring and measurement in software-defined infrastructureJieyu Lin, Rajsimman Ravichandiran, Hadi Bannazadeh, Alberto Leon-Garcia. 742-745 [doi]
- Federating heterogeneous network virtualization platforms by slice exchange pointToshiaki Tarui, Yasusi Kanada, Michiaki Hayashi, Akihiro Nakao. 746-749 [doi]
- MILPFlow: A toolset for integration of computational modelling and deployment of data paths for SDNLucio A. Rocha, Fábio L. Verdi. 750-753 [doi]
- Hybrid SDN architecture to integrate with legacy control and management plane: An experiences-based studyTao Feng, Jun Bi, Peiyao Xiao, Xiuli Zheng. 754-757 [doi]
- An inter-domain multi-path flow transfer mechanism based on SDN and multi-domain collaborationLu You, Li Wei, Luo Junzhou, Jiang Jian, Xia Nu. 758-761 [doi]
- Investigating unique flow marking for tracing back DDoS attacksVahid Aghaei Foroushani, A. Nur Zincir-Heywood. 762-765 [doi]
- Continuously delivering your networkSteffen Gebert, Christian Schwartz, Thomas Zinner, Phuoc Tran-Gia. 766-769 [doi]
- Model-driven networking: A novel approach for SDN applications developmentFelipe A. Lopes, Marcelo Santos, Robson Fidalgo, Stenio Fernandes. 770-773 [doi]
- Measuring robustness of SDN control layersYury Jimenez, Juan Antonio Cordero, Cristina Cervello-Pastor. 774-777 [doi]
- Security function virtualization in software defined infrastructurePouya Yasrebi, Sina Monfared, Hadi Bannazadeh, Alberto Leon-Garcia. 778-781 [doi]
- ViNO: SDN overlay to allow seamless migration across heterogeneous infrastructureSpandan Bemby, Hongbin Lu, Khashayar Hossein Zadeh, Hadi Bannazadeh, Alberto Leon-Garcia. 782-785 [doi]
- Collaborative cloud-based management of home networksBilhanan Silverajan, Juha-Pekka Luoma, Markku Vajaranta, Riku Itapuro. 786-789 [doi]
- LIDAR-based virtual environment study for disaster response scenariosGiang Bui, Prasad Calyam, Brittany Morago, Ronny Bazan Antequera, Trung Nguyen, Ye Duan. 790-793 [doi]
- Automated business application discoveryMichael Nidd, Kun Bai, Jinho Hwang, Maja Vukovic, Michael Tacci. 794-797 [doi]
- Particle swarm optimization based multi-domain virtual network embeddingKailing Guo, Ying Wang, Xuesong Qiu, Wenjing Li, Ailing Xiao. 798-801 [doi]
- Fault diagnosis based on evidences screening in virtual networkHao Wang, Ying Wang, Xuesong Qiu, Wenjing Li, Ailing Xiao. 802-805 [doi]
- Quality of service on services selection using anycast techniques: A convergence analysisLucas Junqueira Adami, Júlio Cezar Estrella, Stephan Reiff-Marganiec, Rafael Mira De Oliveira Libardi. 806-809 [doi]
- KVM virtualization impact on active round-trip time measurementsRamide Dantas, Djamel Sadok, Christofer Flinta, Andreas Johnsson. 810-813 [doi]
- Off-peak energy-wise link reconfiguration for virtualized network environmentEbrahim Ghazisaeedi, Changcheng Huang, James Yan. 814-817 [doi]
- Optimal placement of sequentially ordered virtual security appliances in the cloudAlireza Shameli Sendi, Yosr Jarraya, Mohamed Fekih Ahmed, Makan Pourzandi, Chamseddine Talhi, Mohamed Cheriet. 818-821 [doi]
- Exploring continuous optimization solutions for business-driven IT management problemsMauro Tortonesi. 822-825 [doi]
- Business-driven configuration of IT services in public and hybrid clouds based on performance forecastingGenady Ya. Grabarnik, Mauro Tortonesi, Larisa Shwartz. 826-829 [doi]
- Cache replacement policy based on server distanceNoriaki Kamiyama, Yuusuke Nakano, Kohei Shiomoto. 830-833 [doi]
- Agent-based negotiation for shared QoS control in distributed cloud servicesKaliappa Nadar Ravindran, Waldin Stone, Arun Adiththan. 834-837 [doi]
- Admission control in YARN clusters based on dynamic resource reservationYi Yao, Jason Lin, Jiayin Wang, Ningfang Mi, Bo Sheng. 838-841 [doi]
- E-stream: Towards pattern centric network incident discovery and corrective action recommendation in telecommunication networksSebastian Robitzsch, Faisal Zaman, Zhiguo Qu, John Keeney, Sven van der Meer, Gabriel-Miro Muntean. 842-845 [doi]
- i-MagNet: A real-time intelligent framework for finding specific needles from needle stacksFaisal Zaman, Sebastian Robitzsch, Zhiguo Qu, John Keeney, Sven van der Meer, Gabriel-Miro Muntean. 846-849 [doi]
- AMSDL: A declarative language for adaptive monitoring controlMessaoud Aouadj, Thierry Desprats, Emmanuel Lavinal, Michelle Sibilla. 850-853 [doi]
- Sales pipeline win propensity prediction: A regression approachJunchi Yan, Min Gong, Changhua Sun, Jin Huang, Stephen M. Chu. 854-857 [doi]
- Using analytics to understand and control batch operations - A case studyMaitreya Natu, Vaishali P. Sadaphal. 858-861 [doi]
- A first look at HTTP(S) intrusion detection using NetFlow/IPFIXOlivier van der Toorn, Rick Hofstede, Mattijs Jonker, Anna Sperotto. 862-865 [doi]
- Scalable in-network rate monitoringPer Kreuger, Rebecca Steinert. 866-869 [doi]
- Probabilistic text analytics framework for information technology service desk ticketsEa-Ee Jan, Kuan-Yu Chen, Tsuyoshi Idé. 870-873 [doi]
- Analysis of the evolution of features in classification problems with concept drift: Application to spam detectionMarcia Henke, Eduardo Souto, Eulanda M. dos Santos. 874-877 [doi]
- Improving network security monitoring for industrial control systemsTiago Cruz, Jorge Barrigas, Jorge Proença, Antonio Graziano, Stefano Panzieri, Leonid Lev, Paulo Simões. 878-881 [doi]
- Functional Data Analysis: A step forward in Network ManagementDavid Muelas, Jorge E. López de Vergara, José R. Berrendero. 882-885 [doi]
- Urban data collectors: A pragmatic approach to leveraging urban sensingRostand Costa, Raphael Resende, Stenio Fernandes. 886-889 [doi]
- Measuring enterprise network usage pattern & deploying passive optical LANsYaoping Ruan, Nikos Anerousis, Mudhakar Srivatsa, Jin Xiao, R. Todd Christner, Luis Farrolas, John Short. 890-893 [doi]
- Design and evaluation of a DASH-compliant second screen video player for live events in mobile scenariosStefano Petrangeli, Niels Bouten, Emanuel Dejonghe, Jeroen Famaey, Philip Leroux, Filip De Turck. 894-897 [doi]
- Experiences from building an outdoor testbed for community wireless networksBart Braem, Chris Blondia, Steven Latré. 898-901 [doi]
- Design and development of a management solution for wireless mesh networks based on IEEE 802.11sMichael Rethfeldt, Peter Danielis, Guido Moritz, Bjorn Konieczek, Dirk Timmermann. 902-905 [doi]
- A collaborative approach for a source based detection of botcloudsBadis Hammi, Guillaume Doyen, Rida Khatoun. 906-909 [doi]
- Collaborative attack mitigation and response: A surveyJessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras. 910-913 [doi]
- Network economics approach to data offloading and resource partitioning in two-tier LTE HetNetsTai Manh Ho, Nguyen H. Tran, Long Bao Le, S. M. Ahsan Kazmi, Seung-Il Moon, Choong Seon Hong. 914-917 [doi]
- TinyPolicy: A distributed policy based management framework for Wireless Sensor NetworksNidal Qwasmi, Ramiro Liscano. 918-921 [doi]
- A cooperative file downloading scheme with genetic algorithmXing Zhang, Lanlan Rui. 922-925 [doi]
- An access point selection mechanism based on cooperation of access points and users movementRyo Hamamoto, Chisa Takano, Hiroyasu Obata, Kenji Ishida, Tutomu Murase. 926-929 [doi]
- The need of software development process for wireless sensor networks with cooperative nodesGian Ricardo Berkenbrock, Carla Diacui Medeiros Berkenbrock, Omir Correa Alves. 930-933 [doi]
- Greedy scheduling with feedback control for overloaded real-time systemsZhuo Cheng, Haitao Zhang, Yasuo Tan, Azman Osman Lim. 934-937 [doi]
- Autoconfiguration for faster WiFi community networksKelvert Ballantyne, Wahab Almuhtadi, Jordan Melzer. 938-941 [doi]
- Benefits brought by the use of OpenFlow/SDN on the AmLight intercontinental research and education networkJulio Ibarra, Jeronimo Bezerra, Heidi Morgan, Luis Fernandez Lopez, Donald A. Cox, Michael Stanton, Iara Machado, Eduardo Grizendi, Luis Fernandez Lopez. 942-947 [doi]
- GreenSDN: Bringing energy efficiency to an SDN emulation environmentBruno B. Rodrigues, Ana C. Riekstin, Guilherme C. Januario, Viviane T. Nascimento, Tereza Cristina M. B. Carvalho, Catalin Meirosu. 948-953 [doi]
- C-GEP: Adaptive network management with reconfigurable hardwarePeter Orosz, Tamas Tothfalusi, Pál Varga. 954-959 [doi]
- Framework of network service orchestrator for responsive service lifecycle managementKeisuke Kuroki, Masaki Fukushima, Michiaki Hayashi. 960-965 [doi]
- Experience of developing an openflow SDN prototype for managing IPTV networksChristina Thorpe, Cristian Olariu, Adriana Hava, Patrick McDonagh. 966-971 [doi]
- Real-time DDoS attack detection for Cisco IOS using NetFlowDaniel van der Steeg, Rick Hofstede, Anna Sperotto, Aiko Pras. 972-977 [doi]
- Load balanced telecommunication event consumption using poolsSajeevan Achuthan, Liam Fallon. 978-983 [doi]
- Automating the testing of RESTCONF agentsAlberto Gonzalez Prieto, Alfred Leung, Kevin Rockwell. 984-989 [doi]
- Efficiently bypassing SNI-based HTTPS filteringWazen M. Shbair, Thibault Cholez, Antoine Goichot, Isabelle Chrisment. 990-995 [doi]
- High-density network flow monitoringPetr Velan, Viktor Pus. 996-1001 [doi]
- Enterprise-scale cloud migration orchestratorJinho Hwang, Yun-Wu Huang, Maja Vukovic, Nikos Anerousis. 1002-1007 [doi]
- A scalable lightweight performance monitoring tool for storage clustersDaniel Bauer, Metin Feridun. 1008-1013 [doi]
- Spade: Decentralized orchestration of data movement and warehousing for physics experimentsSimon J. Patton, Taghrid Samak, Craig E. Tull, Cindy Mackenzie. 1014-1019 [doi]
- Deploying clouds in the Guifi community networkRoger Baig, Jim Dowling, Pau Escrich Garcia, Felix Freitag, Roc Messeguer, Agusti Moll, Leandro Navarro, Ermanno Pietrosemoli, Roger Pueyo Centelles, Vladimir Vlassov, Marco Zennaro. 1020-1025 [doi]
- A data-driven storage recommendation service for multitenant storage management environmentsYang Song, Ramani Routray, Rakesh Jain, Chung-Hao Tan. 1026-1040 [doi]
- Deploying the ICT architecture of a residential demand response pilotMatthias Strobbe, Koen Vanthournout, Tom Verschueren, Wim Cardinaels, Chris Develder. 1041-1046 [doi]
- Multi-dimensional sensor data aggregator for adaptive network management in M2M communicationsKenji Yoi, Hirozumi Yamaguchi, Akihito Hiromori, Akira Uchiyama, Teruo Higashino, Naohisa Yanagiya, Toshikazu Nakatani, Atsuo Tachibana, Teruyuki Hasegawa. 1047-1052 [doi]
- Supporting development and management of smart office applications: A DYAMAND case studyJelle Nelis, Heleen Vandaele, Matthias Strobbe, Arnoud Koning, Filip De Turck, Chris Develder. 1053-1058 [doi]
- Automatic extraction of POIs in smart cities: Big data processing in ParticipActAntonio Corradi, Giovanni Curatola, Luca Foschini, Raffaele Ianniello, Carlos Roberto De Rolt. 1059-1064 [doi]
- A location-aware architecture for heterogeneous building automation systemsLuca Mainetti, Vincenzo Mighali, Luigi Patrono. 1065-1070 [doi]
- Measurement-based network link dimensioningRicardo de Oliveira Schmidt, Hans van den Berg, Aiko Pras. 1071-1077 [doi]
- Resource allocation and management in Cloud ComputingAmir Nahir, Ariel Orda, Danny Raz. 1078-1084 [doi]
- Multihoming aware optimization mechanismBruno Sousa, Kostas Pentikousis, Marília Curado. 1085-1091 [doi]
- Limiting fake accounts in large-scale distributed systems through adaptive identity managementWeverton Luis da Costa Cordeiro, Luciano Paschoal Gaspary. 1092-1098 [doi]
- Self-managed resources in network virtualisation environmentsRashid Mijumbi, Joan Serrat, Juan-Luis Gorricho. 1099-1106 [doi]
- Application-Aware adaptive provisioning in virtualized networksRafael Pereira Esteves, Lisandro Zambenedetti Granville. 1107-1113 [doi]
- Enabling wireless cooperation in user provided networksVitor Guerra Rolla, Marília Curado. 1114-1121 [doi]
- Service level agreements-driven management of distributed applications in cloud computing environmentsAlexandru-Florian Antonescu, Torsten Braun. 1122-1128 [doi]
- A platform for the analysis and visualization of network flow data of android environmentsAbdelkader Lahmadi, Frédéric Beck, Eric Finickel, Olivier Festor. 1129-1130 [doi]
- Performant deployment of a virtualised network functions in a data center environment using resource aware schedulingMichael J. McGrath, Vincenzo Riccobene, Guiseppe Petralia, Georgios Xilouris, Michail-Alexandros Kourtis. 1131-1132 [doi]
- What's around me? Location analytics over Software-Defined WLANsRoberto Riggio, Iacopo Carreras, Erinda Jaupaj. 1133-1134 [doi]
- Network configuration with quality of service abstractions for SDN and legacy networksChristian Sieber, Andreas Blenk, David Hock, Marc Scheib, Thomas Hohn, Stefan Köhler, Wolfgang Kellerer. 1135-1136 [doi]
- Network troubleshooting with SDN-RADARTigran Avanesov, Gabriela Gheorghe, Maria Rita Palattella, Miroslaw Kantor, Ciprian P. Popoviciu, Thomas Engel. 1137-1138 [doi]
- Demonstration of an FPGA controller for guaranteed-rate optical packet switchingMaryam Rezaee, Ted H. Szymanski. 1139-1140 [doi]
- A platform for predicting real-time service-level metrics from device statisticsRerngvit Yanggratoke, Jawwad Ahmed, John Ardelius, Christofer Flinta, Andreas Johnsson, Daniel Gillblad, Rolf Stadler. 1141-1142 [doi]
- DNA: An SDN framework for Distributed Network Analytics (Demo Paper)Alexander Clemm, Mouli Chandramouli, Nitish Gupta, Robert Lerche, Ashwin Pankaj, Manjunath Patil, Ganesan Rajam, V. Anbalagan, Joe Zhang, Yifan Zhang. 1143-1144 [doi]
- Demo: A holistic energy-monitoring framework for the IT service delivery chainMatthias Wichtlhuber, Fabian Kaup, Robert Reinecke, Jeremias Blendin, David Hausheer. 1145-1146 [doi]
- Hardware accelerated flow measurement of 100 Gb ethernetViktor Pus, Petr Velan, Lukas Kekely, Jan Korenek, Pavel Minarík. 1147-1148 [doi]
- A demonstration of energy efficiency capabilities orchestration in networksAna C. Riekstin, Bruno B. Rodrigues, Guilherme C. Januario, Viviane T. Nascimento, Tereza Cristina M. B. Carvalho, Catalin Meirosu. 1149-1150 [doi]
- C-GEP: Platform demo for 100 Gbit/s network monitoringTamas Tothfalusi, Peter Orosz, Pál Varga. 1151-1152 [doi]
- Roles of DevOps tools in an automated, dynamic service creation architectureFelician Nemeth, Rebecca Steinert, Per Kreuger, Pontus Sköldström. 1153-1154 [doi]
- Making MPLS VPNs manageable through the adoption of SDNGabriele Lospoto, Massimo Rimondini, Benedetto Gabriele Vignoli, Giuseppe Di Battista. 1155-1156 [doi]
- SDN interactive manager: An OpenFlow-based SDN managerPedro Heleno Isolani, Juliano Araujo Wickboldt, Cristiano Bonato Both, Juergen Rochol, Lisandro Zambenedetti Granville. 1157-1158 [doi]
- Demonstration of carrier network failure detection by analyzing TwitterMasahiro Yokota, Kei Takeshita, Ken Nishimatsu. 1159-1160 [doi]
- The cloudy distribution in community network clouds in Guifi.netRoger Baig, Rodrigo Carbajales, Pau Escrich Garcia, Jorge L. Florit, Felix Freitag, Agusti Moll, Leandro Navarro, Ermanno Pietrosemoli, Roger Pueyo Centelles, Mennan Selimi, Vladimir Vlassov, Marco Zennaro. 1161-1162 [doi]
- HyperFlex: Demonstrating control-plane isolation for virtual software-defined networksArsany Basta, Andreas Blenk, Yu-Ting Lai, Wolfgang Kellerer. 1163-1164 [doi]
- Traffic engineering based on stochastic model predictive control for uncertain traffic changeTatsuya Otoshi, Yuichi Ohsita, Masayuki Murata, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto, Tomoaki Hashimoto. 1165-1170 [doi]
- Caching algorithm for content-oriented networks using prediction of popularity of contentsHiroki Nakayama, Shingo Ata, Ikuo Oka. 1171-1176 [doi]
- An FPGA controller for deterministic guaranteed-rate optical packet switchingTed H. Szymanski, Maryam Rezaee. 1177-1183 [doi]
- Energy efficient and latency aware TDM-PON for local customer internetworkingS. H. Shah Newaz, Alaelddin Fuad Yousif Mohammed, Gyu Myoung Lee, Jun Kyun Choi. 1184-1189 [doi]
- CloudAware: Towards context-adaptive mobile cloud computingGabriel Orsini, Dirk Bade, Winfried Lamersdorf. 1190-1195 [doi]
- Challenges for orchestration and instance selection of composite services in distributed edge cloudsPieter Simoens, Lander Van Herzeele, Frederik Vandeputte, Luc Vermoesen. 1196-1201 [doi]
- Software defined networking-based vehicular Adhoc Network with Fog ComputingNguyen B. Truong, Gyu Myoung Lee, Yacine Ghamri-Doudane. 1202-1207 [doi]
- Design and evaluation of a hierarchical multi-tenant data management framework for cloud applicationsPieter-Jan Maenhaut, Hendrik Moens, Veerle Ongenae, Filip De Turck. 1208-1213 [doi]
- Investigating the impact of network topology on the processing times of SDN controllersChristopher Metter, Steffen Gebert, Stanislav Lange, Thomas Zinner, Phuoc Tran-Gia, Michael Jarschel. 1214-1219 [doi]
- Virtual network functions orchestration in enterprise WLANsRoberto Riggio, Tinku Mohamed Rasheed, Rajesh Narayanan. 1220-1225 [doi]
- Representation of spectrum sensing experimentation functionality for federated management and controlCarolina Fortuna, Milorad Tosic, Mikolaj Chwalisz, Peter De Valck, Ingrid Moerman, Ivan Seskar. 1226-1229 [doi]
- A data model for management of network device configuration heterogeneityEric Lunaud Ngoupe, Sylvain Stoesel, Clement Parisot, Sylvain Hallé, Petko Valtchev, Omar Cherkaoui, Pierre Boucher. 1230-1233 [doi]
- A credential and encryption based access control solution for named data networkingBalkis Hamdane, Sihem Guemara El Fatmi. 1234-1237 [doi]
- Multihoming with locator/ID Separation Protocol: An experimental testbedSoroush Haeri, Rajvir Gill, Marilyn Hay, Toby Wong, Ljiljana Trajkovic. 1238-1241 [doi]
- Network-based dynamic prioritization of HTTP adaptive streams to avoid video freezesStefano Petrangeli, Tim Wauters, Rafael Huysegems, Tom Bostoen, Filip De Turck. 1242-1248 [doi]
- To each according to his needs: Dimensioning video buffer for specific user profiles and behaviorTobias Hoßfeld, Christian Moldovan, Christian Schwartz. 1249-1254 [doi]
- An objective multi-layer QoE Evaluation for TCP video streamingPeng Yu, Fan Liu, Yang Geng, Wenjing Li, Xuesong Qiu. 1255-1260 [doi]
- The cost of aggressive HTTP adaptive streaming: Quantifying YouTube's redundant trafficChristian Sieber, Andreas Blenk, Max Hinteregger, Wolfgang Kellerer. 1261-1267 [doi]
- Benchmarking in virtual desktops for end-to-end performance traceabilityTrung Nguyen, Prasad Calyam, Ronny Bazan Antequera. 1268-1273 [doi]
- Can context monitoring improve QoE? A case study of video flash crowds in the internet of servicesTobias Hoßfeld, Lea Skorin-Kapov, Yoram Haddad, Peter Pocta, Vasilios A. Siris, Andrej Zgank, Hugh Melvin. 1274-1277 [doi]
- Reduced reference image quality assessment via Boltzmann MachinesDecebal Constantin Mocanu, Georgios Exarchakos, Haitham Bou-Ammar, Antonio Liotta. 1278-1281 [doi]
- Towards estimating video QoE based on frame loss statistics of the video streamsPeter Orosz, Tamas Skopko, Pál Varga. 1282-1285 [doi]
- An improved anomaly detection in mobile networks by using incremental time-aware clusteringBorislava Gajic, Szabolcs Nováczki, Stephen S. Mwanje. 1286-1291 [doi]
- ADAMANT - An Anomaly Detection Algorithm for MAintenance and Network TroubleshootingEloy Martinez, Enda Fallon, Sheila Fallon, MingXue Wang. 1292-1297 [doi]
- Concurrent cooperative games for coordinating SON functions in cognitive cellular networksStephen S. Mwanje, Andreas Mitschele-Thiel. 1298-1303 [doi]
- Detecting DGA malware using NetFlowMartin Grill, Ivan Nikolaev, Veronica Valeros, Martin Rehák. 1304-1309 [doi]
- Automatic discovery of web servers hosting similar applicationsJan Kohout, Tomás Pevný. 1310-1315 [doi]
- Cognitive streaming on android devicesMaria Torres Vega, Decebal Constantin Mocanu, Rosario Barresi, Giancarlo Fortino, Antonio Liotta. 1316-1321 [doi]
- Denial-of-service attacks in OpenFlow SDN networksRajat Kandoi, Markku Antikainen. 1322-1326 [doi]
- A simulation model for analysis of attacks on the Bitcoin peer-to-peer networkTill Neudecker, Philipp Andelfinger, Hannes Hartenstein. 1327-1332 [doi]
- Bayesian inference based decision reliability under imperfect monitoringShameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua. 1333-1338 [doi]
- A game-theoretic model for defending against malicious users in RecDroidBahman Rashidi, Carol J. Fung. 1339-1344 [doi]
- Data remanence and digital forensic investigation for CUDA Graphics Processing UnitsXavier J. A. Bellekens, Greig Paul, James M. Irvine, Christos Tachtatzis, Robert C. Atkinson, Tony Kirkham, Craig Renfrew. 1345-1350 [doi]
- Multi-level VM replication based survivability for mission-critical cloud computingMing Zhao, Francois D'Ugard, Kevin A. Kwiat, Charles A. Kamhoua. 1351-1356 [doi]
- Spam intrusion detection in computer networks using intelligent techniquesPatricia Bellin Ribeiro, Luis Alexandre da Silva, Kelton Augusto Pontara da Costa. 1357-1360 [doi]
- TOPASE: Detection of brute force attacks used disciplined IPs from IDS logSatomi Honda, Yuki Unno, Koji Maruhashi, Masahiko Takenaka, Satoru Torii. 1361-1364 [doi]
- Fogging the cloud - Implementing and evaluating searchable encryption schemes in practiceManuel Koschuch, Michael Hombauer, Sigrid Schefer-Wenzl, Ulrich Habock, Stefan Hrdlicka. 1365-1368 [doi]
- A multi-level resilience framework for unified networked environmentsAngelos K. Marnerides, Akshay Bhandari, Hema Murthy, Andreas U. Mauthe. 1369-1372 [doi]
- Distributed security management for the IoTNico Lincke, Nicolai Kuntze, Carsten Rudolph. 1373-1376 [doi]
- BizMap: A framework for mapping business applications to IT infrastructureJoel W. Branch, Karin Murthy, Larisa Shwartz, Emi Olsson, Robert A. Larsen. 1377-1383 [doi]
- Calculation of COBIT metrics using a formal ontologyAndreas Textor, Kurt Geihs. 1384-1390 [doi]
- Service provider DevOps for large scale modern network servicesJuhoon Kim, Catalin Meirosu, Ioanna Papafili, Rebecca Steinert, Sachin Sharma, Fritz-Joachim Westphal, Mario Kind, Apoorv Shukla, Felician Németh, Antonio Manzalini. 1391-1397 [doi]
- ResearchOps: The case for DevOps in scientific applicationsMaximilien de Bayser, Leonardo G. Azevedo, Renato Cerqueira. 1398-1404 [doi]
- An organizational perspective on business driven IT managementTim Reimer. 1405-1408 [doi]
- Assessment method of operational procedure for runbook automationT. Yanase, M. Asaoka, S. Onodera, I. Namba. 1409-1423 [doi]
- A system dynamics model for managing service desk capacityGermano Fenner, Alberto S. Lima, José Neuman de Souza, Antão Moura, Rossana Andrade. 1424-1427 [doi]
- Modeling the use of spot instances for cost reduction in cloud computing adoption using a Petri net frameworkMaristella Ribas, C. G. Furtado, Giovanni Barroso, Alberto S. Lima, José Neuman de Souza, Antão Moura. 1428-1433 [doi]
- Service and contract composition: A model and a toolAntonella Longo, Marco Zappatore, Mario Alessandro Bochicchio. 1434-1440 [doi]