


default search action
CNSM 2013: Zurich, Switzerland
- Proceedings of the 9th International Conference on Network and Service Management, CNSM 2013, Zurich, Switzerland, October 14-18, 2013. IEEE Computer Society 2013, ISBN 978-3-901882-53-1

9th International Conference on Network and Service Management (CNSM 2013)
Resource Management I
- Hendrik Moens, Filip De Turck:

A scalable approach for structuring large-scale hierarchical cloud management systems. 1-8 - David Breitgand

, Amir Epstein, Alex Glikson, Assaf Israel, Danny Raz:
Network aware virtual machine and image placement in a cloud. 9-17 - Md. Faizul Bari, Arup Raton Roy, Shihabur Rahman Chowdhury

, Qi Zhang, Mohamed Faten Zhani
, Reaz Ahmed, Raouf Boutaba:
Dynamic Controller Provisioning in Software Defined Networks. 18-25
Performance Management
- Daphné Tuncer, Marinos Charalambides

, Raul Landa, George Pavlou:
More control over network resources: An ISP caching perspective. 26-33 - Lúcia Martins

, Joao Lopes, José M. F. Craveirinha
, João C. N. Clímaco, Ricardo Cadime, Catarina Monica:
Network performance improvement through evaluation of bicriteria routing methods in transport networks. 34-41 - Marcelo Caggiani Luizelli, Leonardo Richter Bays

, Luciana Salete Buriol, Marinho P. Barcellos, Luciano Paschoal Gaspary:
Characterizing the impact of network substrate topologies on virtual network embedding. 42-50
Resource Management II
- Saeed Al-Haj, Ehab Al-Shaer:

A formal approach for virtual machine migration planning. 51-58 - Jasmina Bogojeska

, David Lanyi, Ioana Giurgiu, George Stark, Dorothea Wiesmann:
Classifying server behavior and predicting impact of modernization actions. 59-66 - Mauro Andreolini

, Michele Colajanni
, Marcello Pietri
, Stefania Tosi:
Real-time adaptive algorithm for resource monitoring. 67-74
Quality Management
- Valentin Radu

, Lito Kriara, Mahesh K. Marina:
Pazl: A mobile crowdsensing based indoor WiFi monitoring system. 75-83 - Marco Aurélio Stelmar Netto, Marcos D. Assunção

, Silvia Bianchi:
Leveraging attention scarcity to improve the overall user experience of Cloud services. 84-91 - Assaf Rappaport, Danny Raz:

Update aware replica placement. 92-99
Poster Session
- Prasad Calyam, Shweta Kulkarni, Alex Berryman, Kunpeng Zhu, Mukundan Sridharan, Rajiv Ramnath, Gordon Springer:

OnTimeSecure: Secure middleware for federated Network Performance Monitoring. 100-104 - Stefan Hommes

, Frank Hermann, Radu State, Thomas Engel:
Automated source code extension for debugging of OpenFlow based networks. 105-108 - Sean Rooney, Luis Garcés-Erice

:
Guaranteeing consistency between large replicated writable disk images. 109-113 - Jan Groenendijk, Yangcheng Huang:

Optimizing crowd based monitoring in large scale mobile networks. 114-117 - Surasak Sanguanpong, Kasom Koht-Arsa:

A design and implementation of dual-stack aware authentication system for enterprise captive portal. 118-121 - Kevin Phemius, Mathieu Bouet

:
Monitoring latency with OpenFlow. 122-125 - Anne Bouillard, Aurore Junier, Benoit Ronot:

Impact of rare alarms on event correlation. 126-129 - Vaibhav Bajpai

, Jürgen Schönwälder
:
Measuring TCP connection establishment times of dual-stacked web services. 130-133 - Sebastian Seeber, Anuj Sehgal, Björn Stelte, Gabi Dreo Rodosek, Jürgen Schönwälder

:
Towards a trust computing architecture for RPL in Cyber Physical Systems. 134-137 - Martin Johnsson, Brendan Jennings

:
Gravitational networks: Self-organizing network topologies into hierarchically structured domains. 138-142 - Liang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik:

Identifying missed monitoring alerts based on unstructured incident tickets. 143-146 - Julius Rückert, Osama Abboud, Martin Kluge, David Hausheer

:
Volume is not enough: SVC-aware server allocation for peer-assisted streaming. 147-151 - Ricardo de Oliveira Schmidt, Ramin Sadre, Anna Sperotto

, Aiko Pras:
Lightweight link dimensioning using sFlow sampling. 152-155 - Herry Herry, Paul Anderson, Michael Rovatsos:

Choreographing configuration changes. 156-160 - Fen Zhou, Jiayi Liu, Gwendal Simon

, Raouf Boutaba:
Joint optimization for the delivery of multiple video channels in Telco-CDN. 161-165 - Michael Tighe, Gastón Keller, Michael A. Bauer, Hanan Lutfiyya:

A distributed approach to dynamic VM management. 166-170 - Gabriela F. Ciocarlie, Ulf Lindqvist

, Szabolcs Nováczki
, Henning Sanneck:
Detecting anomalies in cellular networks using an ensemble method. 171-174 - Denis Carvin, Guillaume Kremer, Philippe Owezarski, Pascal Berthou

:
Assessment and event based analysis of dynamic wireless networks. 175-179 - Marcio Barbosa de Carvalho, Rafael Pereira Esteves, Guilherme da Cunha Rodrigues

, Lisandro Zambenedetti Granville
, Liane Margarida Rockenbach Tarouco
:
A cloud monitoring framework for self-configured monitoring slices based on multiple tools. 180-184 - Yixin Diao, Linh Lam, Larisa Shwartz, David M. Northcutt:

SLA impact modeling for service engagement. 185-188 - Ritu Chadha, Alexander Poylisher, Constantin Serban:

Reliability estimation in mobile ad hoc networks. 189-192 - Peng Yu

, Wenjing Li, Yulin Su, Xuesong Qiu:
Dynamic multi-stage Energy-Saving Management mechanism based on Base Station cooperation. 193-197 - Lu Guan, Ying Wang, Wenjing Li, Congxian Yan:

Efficient probing method for active diagnosis in large scale network. 198-202
Wireless Sensor Networks
- Hamid Al-Hamadi, Ing-Ray Chen:

Adaptive network management for countering selective capture in wireless sensor networks. 203-210 - Corinna Schmitt, Andre Freitag, Georg Carle:

CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networks. 211-218 - Björn Stelte, Gabi Dreo Rodosek:

Thwarting attacks on ZigBee - Removal of the KillerBee stinger. 219-226
Security Management
- Rick Hofstede, Václav Bartos

, Anna Sperotto
, Aiko Pras:
Towards real-time intrusion detection for NetFlow and IPFIX. 227-234 - Martín Barrère

, Gaetan Hurel, Remi Badonnel, Olivier Festor:
A probabilistic cost-efficient approach for mobile security assessment. 235-242 - Matteo Maria Casalino, Romuald Thion:

Refactoring multi-layered access control policies through (De)composition. 243-250
Monitoring
- Misbah Uddin, Rolf Stadler, Alexander Clemm:

Scalable matching and ranking for network search. 251-259 - Giorgos Dimopoulos

, Pere Barlet-Ros
, Josep Sanjuàs-Cuxart:
Analysis of YouTube user experience from passive measurements. 260-267 - Abdelkader Lahmadi, Alexandre Boeglin, Olivier Festor:

Efficient distributed monitoring in 6LoWPAN networks. 268-276
Inter-Domain Quality-of-Service
- Lise Rodier, David Auger, Johanne Cohen, Hélia Pouyllau:

SLA learning from past failures, a Multi-Armed Bandit approach. 277-283 - Xavier Misseri, Jean-Louis Rougier, Stefano Moretti:

Auction-type framework for selling inter-domain paths. 284-291 - François Durand, Fabien Mathieu, Ludovic Noirie:

On the manipulability of voting systems: application to multi-operator networks. 292-297
Charging Strategies for Content Delivery and Internet Access
- Andreas Sackl

, Patrick Zwickl, Peter Reichl:
The trouble with choice: An empirical study to investigate the influence of charging strategies and content selection on QoE. 298-303 - Maurizio Naldi

, Giuseppe D'Acquisto:
When free riding is the best choice: The case of network charges for content providers. 304-309 - Vladimir Fux, Patrick Maillé

:
Incentivizing efficient load repartition in heterogeneous wireless networks with selfish delay-sensitive users. 310-316
7th International DMTF Academic Alliance Workshop on Systems and Virtualization Management - Standards and the Cloud (SVM)
SESSION 2
- Ali Nikzad, Ferhat Khendek

, Maria Toeroe:
OpenSAF and VMware from the perspective of high availability. 324-331 - Seyed Saeid Masoumzadeh, Helmut Hlavacs:

Integrating VM selection criteria in distributed dynamic VM consolidation using Fuzzy Q-Learning. 332-338 - Ludi Akue, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla:

Integrating an online configuration checker with existing management systems: Application to CIM/WBEM environments. 339-344
SESSION 3
- Fabian Meyer, Reinhold Kröger, Ralf Heidger, Morris Milekovic:

An approach for knowledge-based IT management of air traffic control systems. 345-349 - Xiaolin Wang, Yingwei Luo, Zhenlin Wang:

Who decides migration? A migration lock mechanism for virtual machines. 350-354
SESSION 4
- Vitalian A. Danciu, Alexander Knapp:

Adapting applications to exploit virtualization management knowledge. 355-363 - Michael Tighe, Gastón Keller, Jamil Shamy, Michael A. Bauer, Hanan Lutfiyya:

Towards an improved data centre simulation with DCSim. 364-372
Workshop on Social-aware Economic Traffic Management for Overlay and Cloud Applications (SETM 2013)
Video Delivery
- Kaliappa Ravindran:

Multi-source cooperative adaptation for QoE-aware video multicast rate-control. 373-381 - Danny De Vleeschauwer

, Chris Hawinkel, Yannick Le Louédec:
Determining leaders and clusters in video consumption. 382-385 - Manos Dramitinos, Nan Zhang, Miroslaw Kantor, José Costa-Requena, Ioanna Papafili:

Video delivery over next generation cellular networks. 386-393
Network Traffic Management
- Roman Lapacz, Blazej Pietrzak:

Networking solutions in the federation of clouds. 394-397 - Zbigniew Duliñski, Rafal Stankiewicz

:
Dynamic traffic management mechanism for active optimization of ISP costs. 398-401
User Involved Approaches
- Michael Seufert

, Valentin Burger, Tobias Hoßfeld
:
HORST - Home router sharing based on trust. 402-405 - Matthias Wichtlhuber, Peter Heise, Bjorn Scheurich, David Hausheer

:
Reciprocity with virtual nodes: Supporting mobile peers in Peer-to-Peer content distribution. 406-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














