The SCEAS System
Navigation Menu

Conferences in DBLP

Integrated Network Management (im)
2009 (conf/im/2009)


  1. Configuring resource managers using model fuzzing: A case study of the .NET thread pool. [Citation Graph (, )][DBLP]


  2. Business-impact analysis and simulation of critical incidents in IT service management. [Citation Graph (, )][DBLP]


  3. A universal method for composing business transaction models using logs. [Citation Graph (, )][DBLP]


  4. Probabilistic decentralized network management. [Citation Graph (, )][DBLP]


  5. Robust and scalable trust management for collaborative intrusion detection. [Citation Graph (, )][DBLP]


  6. A rule-based distributed system for self-optimization of constrained devices. [Citation Graph (, )][DBLP]


  7. Policy control management for Web Services. [Citation Graph (, )][DBLP]


  8. Predictive routing of contexts in an overlay network. [Citation Graph (, )][DBLP]


  9. Planning-based configuration and management of distributed systems. [Citation Graph (, )][DBLP]


  10. Service management architecture and system capacity design for PhoneFactorTM - A two-factor authentication service. [Citation Graph (, )][DBLP]


  11. Autonomic service hosting for large-scale distributed MOVE-services. [Citation Graph (, )][DBLP]


  12. A systematic and practical approach to generating policies from service level objectives. [Citation Graph (, )][DBLP]


  13. CHANGEMINER: A solution for discovering IT change templates from past execution traces. [Citation Graph (, )][DBLP]


  14. DACS scheme as next generation Policy-based network management scheme. [Citation Graph (, )][DBLP]


  15. A new approach for multi-sink environments in WSNs. [Citation Graph (, )][DBLP]


  16. Towards an information model for ITIL and ISO/IEC 20000 processes. [Citation Graph (, )][DBLP]


  17. Rapid Service Creation Environment for service delivery platform based on service templates. [Citation Graph (, )][DBLP]


  18. Designing stand-by gateway for managing a waste of networked home-device power. [Citation Graph (, )][DBLP]


  19. Rate-based SIP flow management for SLA satisfaction. [Citation Graph (, )][DBLP]


  20. A generic end-to-end monitoring architecture for multimedia services. [Citation Graph (, )][DBLP]


  21. Secure interworking & roaming of WiMAX with 3G and Wi-Fi. [Citation Graph (, )][DBLP]


  22. Four questions that determine whether traffic management is reasonable. [Citation Graph (, )][DBLP]


  23. Real-time root cause analysis in OSS for a multilayer and multi-domain network using a hierarchical circuit model and scanning algorithm. [Citation Graph (, )][DBLP]


  24. Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure. [Citation Graph (, )][DBLP]


  25. Probabilistic fault diagnosis for IT services in noisy and dynamic environments. [Citation Graph (, )][DBLP]


  26. Session resumption for the secure shell protocol. [Citation Graph (, )][DBLP]


  27. PCE-based hierarchical segment restoration. [Citation Graph (, )][DBLP]


  28. SecSip: A stateful firewall for SIP-based networks. [Citation Graph (, )][DBLP]


  29. Using argumentation logic for firewall configuration management. [Citation Graph (, )][DBLP]


  30. Evaluating WS-security and XACML in web services-based network management. [Citation Graph (, )][DBLP]


  31. Performance management via adaptive thresholds with separate control of false positive and false negative errors. [Citation Graph (, )][DBLP]


  32. Optimizing correlation structure of event services considering time and capacity constraints. [Citation Graph (, )][DBLP]


  33. Fault detection in IP-based process control networks using data mining. [Citation Graph (, )][DBLP]


  34. A user-centric network management framework for high-density Wireless LANs. [Citation Graph (, )][DBLP]


  35. MeshMan: A management framework for wireless mesh networks. [Citation Graph (, )][DBLP]


  36. A scalable PBNM framework for MANET management. [Citation Graph (, )][DBLP]


  37. Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies. [Citation Graph (, )][DBLP]


  38. Monitoring of SLA compliances for Hosted Streaming Services. [Citation Graph (, )][DBLP]


  39. Gossiping for threshold detection. [Citation Graph (, )][DBLP]


  40. Monitoring and counter-profiling for Voice over IP networks and services. [Citation Graph (, )][DBLP]


  41. Event handling in clean-slate Future Internet management. [Citation Graph (, )][DBLP]


  42. Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructure. [Citation Graph (, )][DBLP]


  43. Investigating the role of a transmission initiator in private peering arrangements. [Citation Graph (, )][DBLP]


  44. Framework to achieve multi-domain service management. [Citation Graph (, )][DBLP]


  45. Analysing Joost peer to peer IPTV protocol. [Citation Graph (, )][DBLP]


  46. Problem classification method to enhance the ITIL incident and problem. [Citation Graph (, )][DBLP]


  47. How much management is management enough? Providing monitoring processes with online adaptation and learning capability. [Citation Graph (, )][DBLP]


  48. Application-specific packet capturing using kernel probes. [Citation Graph (, )][DBLP]


  49. RESERVOIR: Management technologies and requirements for next generation Service Oriented Infrastructures. [Citation Graph (, )][DBLP]


  50. Collaborative content caching algorithms in mobile ad hoc networks environment. [Citation Graph (, )][DBLP]


  51. A policy based security management architecture for sensor networks. [Citation Graph (, )][DBLP]


  52. Managing responsiveness of virtual desktops using passive monitoring. [Citation Graph (, )][DBLP]


  53. Shares and utilities based power consolidation in virtualized server environments. [Citation Graph (, )][DBLP]


  54. iMark: An identity management framework for network virtualization environment. [Citation Graph (, )][DBLP]


  55. Enabling high-speed and extensible real-time communications monitoring. [Citation Graph (, )][DBLP]


  56. Monitoring the impact of P2P users on a broadband operator's network. [Citation Graph (, )][DBLP]


  57. Controlling performance trade-offs in adaptive network monitoring. [Citation Graph (, )][DBLP]


  58. Computing histograms of local variables for real-time monitoring using aggregation trees. [Citation Graph (, )][DBLP]


  59. Heteroscedastic models to track relationships between management metrics. [Citation Graph (, )][DBLP]


  60. SIPFIX: A scheme for distributed SIP monitoring. [Citation Graph (, )][DBLP]


  61. Embedded system management using WBEM. [Citation Graph (, )][DBLP]


  62. Control information description model and processing mechanism in the trustworthy and controllable network. [Citation Graph (, )][DBLP]


  63. Supporting communities in programmable grid networks: gTBN. [Citation Graph (, )][DBLP]


  64. A latency-aware algorithm for dynamic service placement in large-scale overlays. [Citation Graph (, )][DBLP]


  65. ITU-T RACF implementation for application-driven QoS control in MPLS networks. [Citation Graph (, )][DBLP]


  66. Management of SOA based NGN service exposure, service discovery and service composition. [Citation Graph (, )][DBLP]


  67. Using heuristics to improve service portfolio selection in P2P grids. [Citation Graph (, )][DBLP]


  68. A solution to support risk analysis on IT Change Management. [Citation Graph (, )][DBLP]


  69. Defensive configuration with game theory. [Citation Graph (, )][DBLP]


  70. Algorithms for SLA composition to provide inter-domain services. [Citation Graph (, )][DBLP]


  71. On Semantic and Compliance of SNMP MIBs in IP/MPLS routers. [Citation Graph (, )][DBLP]


  72. Monitoring probabilistic SLAs in Web service orchestrations. [Citation Graph (, )][DBLP]


  73. Queuing model based end-to-end performance evaluation for MPLS Virtual Private Networks. [Citation Graph (, )][DBLP]


  74. Enhanced cognitive resource management for QoS-guaranteed service provisioning in home/office network. [Citation Graph (, )][DBLP]


  75. End to end session based bearer control for IP multimedia subsystems. [Citation Graph (, )][DBLP]


  76. Performance of distributed reservation control in wavelength-routed all-optical WDM networks with Adaptive Alternate Routing. [Citation Graph (, )][DBLP]


  77. Techniques for better alias resolution in Internet topology discovery. [Citation Graph (, )][DBLP]


  78. On the feasibility of static analysis for BGP convergence. [Citation Graph (, )][DBLP]


  79. Architectural principles and elements of in-network management. [Citation Graph (, )][DBLP]


  80. An evaluation of network management protocols. [Citation Graph (, )][DBLP]


  81. Adaptive management of connections to meet availability guarantees in SLAs. [Citation Graph (, )][DBLP]


  82. A management scheme of SRLG-disjoint protection path. [Citation Graph (, )][DBLP]


  83. Experiences in using MUWS for scalable distributed monitoring. [Citation Graph (, )][DBLP]


  84. Towards an optimized model of incident ticket correlation. [Citation Graph (, )][DBLP]


  85. Self-management of hybrid networks: Can we trust netflow data? [Citation Graph (, )][DBLP]


  86. Analyzing end-to-end network reachability. [Citation Graph (, )][DBLP]


  87. Applying quorum role in network management. [Citation Graph (, )][DBLP]


  88. Security management with scalable distributed IP traceback. [Citation Graph (, )][DBLP]


  89. Survivable keying for wireless ad hoc networks. [Citation Graph (, )][DBLP]


  90. EJB-based implementation of L1VPN NMS controlled by each customer. [Citation Graph (, )][DBLP]


  91. DeskBench: Flexible virtual desktop benchmarking toolkit. [Citation Graph (, )][DBLP]


  92. Memory overbooking and dynamic control of Xen virtual machines in consolidated environments. [Citation Graph (, )][DBLP]


  93. Refined failure remediation for IT change management systems. [Citation Graph (, )][DBLP]


  94. Mobile service-oriented content delivery in wireless mesh networks. [Citation Graph (, )][DBLP]


  95. An efficient spectrum management mechanism for cognitive radio networks. [Citation Graph (, )][DBLP]


  96. Building end-to-end management analytics for enterprise data centers. [Citation Graph (, )][DBLP]


  97. SURFmap: A network monitoring tool based on the Google Maps API. [Citation Graph (, )][DBLP]


  98. Auto-connectivity and security setup for access network elements. [Citation Graph (, )][DBLP]


  99. Introducing process-oriented IT service management at an academic computing center: An interim report. [Citation Graph (, )][DBLP]


  100. Multi-tenant solution for IT service management: A quantitative study of benefits. [Citation Graph (, )][DBLP]


  101. Best practices for deploying a CMDB in large-scale environments. [Citation Graph (, )][DBLP]


  102. Modeling remote desktop systems in utility environments with application to QoS management. [Citation Graph (, )][DBLP]


  103. A model based approach to autonomic management of virtual networks. [Citation Graph (, )][DBLP]


  104. Web-based administration of grid credentials for identity and authority delegation. [Citation Graph (, )][DBLP]


  105. Adaptive real-time monitoring for large-scale networked systems. [Citation Graph (, )][DBLP]


  106. Policy-based self-management of wireless ad hoc networks. [Citation Graph (, )][DBLP]


  107. STACO - An accounting configuration architecture for multi-service mobile networks. [Citation Graph (, )][DBLP]


  108. Adaptive response system for distributed denial-of-service attacks. [Citation Graph (, )][DBLP]


  109. Performance of network and service monitoring frameworks. [Citation Graph (, )][DBLP]


  110. On harnessing information models and ontologies for policy conflict analysis. [Citation Graph (, )][DBLP]


  111. An approach to measurement based Quality of Service control for communications networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002