The SCEAS System
Navigation Menu

Conferences in DBLP

(noms)
2008 (conf/noms/2008)


  1. Peer-to-Peer networking: State of the art and research challenges. [Citation Graph (, )][DBLP]


  2. Designing, optimizing, and evaluating network security configuration. [Citation Graph (, )][DBLP]


  3. Enterprise mashups and Web 2.0 for management. [Citation Graph (, )][DBLP]


  4. Internet routing management. [Citation Graph (, )][DBLP]


  5. Autonomic networking: Theory and practice. [Citation Graph (, )][DBLP]


  6. Spectrum management in cognitive radio networks. [Citation Graph (, )][DBLP]


  7. Brazilian terrestrial digital TV system. [Citation Graph (, )][DBLP]


  8. Spectrum, network and operations management in cognitive radio networks. [Citation Graph (, )][DBLP]


  9. Distinguished experts panel. [Citation Graph (, )][DBLP]


  10. IT Service Management and Business-Driven IT Management. [Citation Graph (, )][DBLP]


  11. Device Instrumentation for performance monitoring and its application in service level management. [Citation Graph (, )][DBLP]


  12. From value chains to ecosystem: New opportunities for telecommunications and new challenges for managing networks and services. [Citation Graph (, )][DBLP]


  13. Optimizing software packages for application management. [Citation Graph (, )][DBLP]


  14. Utility-based placement of dynamic Web applications with fairness goals. [Citation Graph (, )][DBLP]


  15. Application domain independent policy conflict analysis using information models. [Citation Graph (, )][DBLP]


  16. Using machine learning for non-intrusive modeling and prediction of software aging. [Citation Graph (, )][DBLP]


  17. Alert prioritization in Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  18. CPU-based DoS attacks against SIP servers. [Citation Graph (, )][DBLP]


  19. Relieving hot spots in collaborative intrusion detection systems during worm outbreaks. [Citation Graph (, )][DBLP]


  20. Network domain entrypoint/path determination for DDoS attacks. [Citation Graph (, )][DBLP]


  21. A novel approach to bottleneck analysis in networks. [Citation Graph (, )][DBLP]


  22. Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control. [Citation Graph (, )][DBLP]


  23. Making IP traffic engineering robust to intra- and inter-AS transient link failures. [Citation Graph (, )][DBLP]


  24. Detecting Skype flows in Web traffic. [Citation Graph (, )][DBLP]


  25. Applying a model of configuration complexity to measure security impact on IT procedures. [Citation Graph (, )][DBLP]


  26. Towards malware inspired management frameworks. [Citation Graph (, )][DBLP]


  27. Dynamic inter-organizational cooperation setup in Circle-of-Trust environments. [Citation Graph (, )][DBLP]


  28. Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. [Citation Graph (, )][DBLP]


  29. Infrastructure sharing and shared operations for mobile network operators From a deployment and operations view. [Citation Graph (, )][DBLP]


  30. Secure route optimization for Mobile Network Node using secure address proxying. [Citation Graph (, )][DBLP]


  31. On utility models for access network selection in wireless heterogeneous networks. [Citation Graph (, )][DBLP]


  32. Neighbor cell relation list and measured cell identity management in LTE. [Citation Graph (, )][DBLP]


  33. Towards automated application signature generation for traffic identification. [Citation Graph (, )][DBLP]


  34. Network-wide inference of end-to-end path intersections. [Citation Graph (, )][DBLP]


  35. A queueing equivalent thresholding method for thinning traffic captures. [Citation Graph (, )][DBLP]


  36. Wire-speed application flow generation in hardware platform for multi-gigabit traffic monitoring. [Citation Graph (, )][DBLP]


  37. A state-space approach to SLA based management. [Citation Graph (, )][DBLP]


  38. Decision support for service transition management Enforce change scheduling by performing change risk and business impact analysis. [Citation Graph (, )][DBLP]


  39. Estimating business value of IT services through process complexity analysis. [Citation Graph (, )][DBLP]


  40. Analysis of application performance and its change via representative application signatures. [Citation Graph (, )][DBLP]


  41. Eigen space based method for detecting faulty nodes in large scale enterprise systems. [Citation Graph (, )][DBLP]


  42. A Framework for the establishment of inter-domain, on-demand VPNs. [Citation Graph (, )][DBLP]


  43. Fast similarity search in peer-to-peer networks. [Citation Graph (, )][DBLP]


  44. Optimizing request denial and latency in an agent-based VPN architecture. [Citation Graph (, )][DBLP]


  45. Characterization of IP flows eligible for lambda-connections in optical networks. [Citation Graph (, )][DBLP]


  46. Multi-layer network management system with dynamic control of MPLS/GMPLS LSPs based on IP flows. [Citation Graph (, )][DBLP]


  47. Supporting control plane-enabled transport networks within ITU-T Next Generation Network (NGN) architecture. [Citation Graph (, )][DBLP]


  48. Dynamic reconfiguration of logical topology for WDM networks under traffic changes. [Citation Graph (, )][DBLP]


  49. A self-organizing composition towards autonomic overlay networks. [Citation Graph (, )][DBLP]


  50. On the complexity of determining autonomic policy constrained behaviour. [Citation Graph (, )][DBLP]


  51. Analyzing security and energy tradeoffs in autonomic capacity management. [Citation Graph (, )][DBLP]


  52. A resource management framework for multi-tier service delivery in autonomic virtualized environments. [Citation Graph (, )][DBLP]


  53. A state machine approach for problem detection in large-scale distributed system. [Citation Graph (, )][DBLP]


  54. Efficient physical topology discovery for large OSPF networks. [Citation Graph (, )][DBLP]


  55. A strategic approach for re-organization of internet topology for improving both efficiency and attack tolerance. [Citation Graph (, )][DBLP]


  56. PathCrawler: Automatic harvesting web infra-structure. [Citation Graph (, )][DBLP]


  57. Enabling rollback support in IT change management systems. [Citation Graph (, )][DBLP]


  58. A template-based solution to support knowledge reuse in IT change design. [Citation Graph (, )][DBLP]


  59. ReCon: A tool to Recommend dynamic server Consolidation in multi-cluster data centers. [Citation Graph (, )][DBLP]


  60. ChargeView: An integrated tool for implementing chargeback in IT systems. [Citation Graph (, )][DBLP]


  61. CyberPlanner: A comprehensive toolkit for network service providers. [Citation Graph (, )][DBLP]


  62. Coordinated management of power usage and runtime performance. [Citation Graph (, )][DBLP]


  63. Data tagging architecture for system monitoring in dynamic environments. [Citation Graph (, )][DBLP]


  64. QoS and reputation-aware service selection. [Citation Graph (, )][DBLP]


  65. Monitoring scheduling for home gateways. [Citation Graph (, )][DBLP]


  66. LNMP- Management architecture for IPv6 based low-power wireless Personal Area Networks (6LoWPAN). [Citation Graph (, )][DBLP]


  67. Survival multipath routing for MANETs. [Citation Graph (, )][DBLP]


  68. Policy-based self-management of hybrid ad hoc networks for dynamic channel configuration. [Citation Graph (, )][DBLP]


  69. Tracking back the root cause of a path change in interdomain routing. [Citation Graph (, )][DBLP]


  70. Efficient method of collecting routing tables based on OSPF/iBGP monitoring. [Citation Graph (, )][DBLP]


  71. Relaxed multiple routing configurations for IP fast reroute. [Citation Graph (, )][DBLP]


  72. Detecting BGP anomalies with wavelet. [Citation Graph (, )][DBLP]


  73. Availability "weak point" analysis over an SOA deployment framework. [Citation Graph (, )][DBLP]


  74. Performance evaluation of the Flow-Aware Networking (FAN) architecture under Grid environment. [Citation Graph (, )][DBLP]


  75. Data-WISE: Efficient management of data-intensive workflows in scheduled grid environments. [Citation Graph (, )][DBLP]


  76. On the planning of a hybrid IT infrastructure. [Citation Graph (, )][DBLP]


  77. Integrating business performance management with IT management through impact analysis and provisioning. [Citation Graph (, )][DBLP]


  78. Orchestration of heterogeneous virtualized resources for end-to-end service control. [Citation Graph (, )][DBLP]


  79. Template based rapid service creation environment for service delivery platform. [Citation Graph (, )][DBLP]


  80. Common business process model for continuous SDP transformation. [Citation Graph (, )][DBLP]


  81. UTRAN O&M support system with statistical fault identification and customizable rule sets. [Citation Graph (, )][DBLP]


  82. WiMAX network performance monitoring & optimization. [Citation Graph (, )][DBLP]


  83. A monitoring tool for Wireless Multi-hop Mesh Networks. [Citation Graph (, )][DBLP]


  84. First steps towards an autonomic management system. [Citation Graph (, )][DBLP]


  85. Grid-enabling orbital analysis and computationally intensive applications for a growing set of diversified users. [Citation Graph (, )][DBLP]


  86. The SCRUB security data sharing infrastructure. [Citation Graph (, )][DBLP]


  87. JXTA PEER SNMP: An SNMP peer for inter-domain management. [Citation Graph (, )][DBLP]


  88. Feasibility validation of management capability for an Ethernet based access network using Ethernet OAM functionality. [Citation Graph (, )][DBLP]


  89. Evaluation on data modeling languages for NETCONF-based network management. [Citation Graph (, )][DBLP]


  90. Service capacity allocation and pricing. [Citation Graph (, )][DBLP]


  91. Automatic model-based service hosting environment migration. [Citation Graph (, )][DBLP]


  92. Assessing the Madeira NorthBound Interface. [Citation Graph (, )][DBLP]


  93. A model for heterogeneous networks management and performance evaluation. [Citation Graph (, )][DBLP]


  94. GARCH - non-linear time series model for traffic modeling and prediction. [Citation Graph (, )][DBLP]


  95. Fast recovery paths schema to improve reliability in IP networks. [Citation Graph (, )][DBLP]


  96. Improvement in resource reservations management within tunnels over all-IP mobile networks using IntServ6. [Citation Graph (, )][DBLP]


  97. MANKOP: A Knowledge Plane for wireless ad hoc networks. [Citation Graph (, )][DBLP]


  98. Routing with a bandwidth based algorithm in virtual call centres. [Citation Graph (, )][DBLP]


  99. Decomposition of IT service processes and alternative service identification using ontologies. [Citation Graph (, )][DBLP]


  100. A new methodology for RF failure detection in UMTS networks. [Citation Graph (, )][DBLP]


  101. Towards autonomic risk-aware security configuration. [Citation Graph (, )][DBLP]


  102. Dependency graph to improve notifications' semantic on anomaly detection. [Citation Graph (, )][DBLP]


  103. Privacy management service contacts as a new business opportunity for operators. [Citation Graph (, )][DBLP]


  104. Cost analysis of the service migration problem between communication platforms. [Citation Graph (, )][DBLP]


  105. Heuristics on link stability in ad hoc networks. [Citation Graph (, )][DBLP]


  106. Applying aspect oriented service control in IMS network. [Citation Graph (, )][DBLP]


  107. A model-driven configuration management methodology for testbed infrastructures. [Citation Graph (, )][DBLP]


  108. Dynamic pull-based load balancing for autonomic servers. [Citation Graph (, )][DBLP]


  109. Towards SLA-based optimal workload distribution in SANs. [Citation Graph (, )][DBLP]


  110. A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  111. Service continuity management through an E2E dynamic session in NGN. [Citation Graph (, )][DBLP]


  112. Bootstrapping device state in managed systems. [Citation Graph (, )][DBLP]


  113. A Bayesian knowledge engineering framework for service management. [Citation Graph (, )][DBLP]


  114. Design and implementation of a policy-based management framework for Ambient Networks: Choices and lessons learned. [Citation Graph (, )][DBLP]


  115. SRDP-Sign: a reliable multicast protocol for signaling. [Citation Graph (, )][DBLP]


  116. An incentive engineering mechanism for optimizing handoff decisions between cellular data networks and WLANs. [Citation Graph (, )][DBLP]


  117. Using trust for key distribution and route selection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  118. SIP network discovery by using SIP message probing. [Citation Graph (, )][DBLP]


  119. Real-time problem localization for synchronous transactions in HTTP-based composite enterprise applications. [Citation Graph (, )][DBLP]


  120. On the multi-scale behavior of packet size distribution in Internet backbone network. [Citation Graph (, )][DBLP]


  121. An open framework for federating integrated management model of distributed it environment. [Citation Graph (, )][DBLP]


  122. Towards integrating management interfaces. [Citation Graph (, )][DBLP]


  123. Load balancing scheme and implementation in multihoming mobile router. [Citation Graph (, )][DBLP]


  124. Asset-based requirement analysis in telecom Service Delivery Platform domain. [Citation Graph (, )][DBLP]


  125. Handover prediction strategy for 3G-WLAN overlay networks. [Citation Graph (, )][DBLP]


  126. SIP application composition framework based on business rules. [Citation Graph (, )][DBLP]


  127. Web services monitoring: An initial case study on the tools perspective. [Citation Graph (, )][DBLP]


  128. A comprehensive semantic-based resource allocation framework for workflow management systems. [Citation Graph (, )][DBLP]


  129. Distributed fault correlation scheme using a semantic publish/subscribe system. [Citation Graph (, )][DBLP]


  130. Manageability design for an autonomic management of semi-dynamic web service compositions. [Citation Graph (, )][DBLP]


  131. Harmonizing service and network provisioning for federative access in a mobile environment. [Citation Graph (, )][DBLP]


  132. Effective implementation of network composition for ambient networks. [Citation Graph (, )][DBLP]


  133. DYSWIS: An architecture for automated diagnosis of networks. [Citation Graph (, )][DBLP]


  134. Inter-domain QoS signaling under mobility. [Citation Graph (, )][DBLP]


  135. A model-based approach to adding autonomic capabilities to network fault management system. [Citation Graph (, )][DBLP]


  136. Improving distributed service management using Service Modeling Language (SML). [Citation Graph (, )][DBLP]


  137. Intrusion detection through artificial neural networks. [Citation Graph (, )][DBLP]


  138. A real-time flow monitor architecture encompassing on-demand monitoring functions. [Citation Graph (, )][DBLP]


  139. SPIRIT: Service for providing infrastructure recommendations for IT. [Citation Graph (, )][DBLP]


  140. Non-intrusive transaction monitoring using system logs. [Citation Graph (, )][DBLP]


  141. MANETs routing protocols evaluation in a scenario with high mobility MANET routing protocols performance and behavior. [Citation Graph (, )][DBLP]


  142. An investigation of visualization techniques forSNMP traffic traces. [Citation Graph (, )][DBLP]


  143. ALBA: An autonomic load balancing algorithm for IEEE 802.11 wireless networks. [Citation Graph (, )][DBLP]


  144. Using mixed integer programming to schedule it change requests. [Citation Graph (, )][DBLP]


  145. Reinforcement learning in policy-driven autonomic management. [Citation Graph (, )][DBLP]


  146. Policy-based dynamic provisioning in data centers based on SLAs, business rules and business objectives. [Citation Graph (, )][DBLP]


  147. An Internet traffic classification methodology based on statistical discriminators. [Citation Graph (, )][DBLP]


  148. A step towards understanding Joost IPTV. [Citation Graph (, )][DBLP]


  149. Host-aware routing in multicast overlay backbone. [Citation Graph (, )][DBLP]


  150. A scalable monitoring strategy for highly dynamic systems. [Citation Graph (, )][DBLP]


  151. Algorithm to automatically solve security policy conflicts among IP devices configurations. [Citation Graph (, )][DBLP]


  152. Provisioning IMS-based seamless triple play services over different access networks. [Citation Graph (, )][DBLP]


  153. A self-diagnosis approach for performance problem localization in component-based applications. [Citation Graph (, )][DBLP]


  154. A security management framework for sensor networks. [Citation Graph (, )][DBLP]


  155. Wavelength conversion architectures in OBS networks. [Citation Graph (, )][DBLP]


  156. An ontology for privacy policy management in ubiquitous environments. [Citation Graph (, )][DBLP]


  157. Kalinahia: Considering quality of service to design and execute distributed multimedia applications. [Citation Graph (, )][DBLP]


  158. Value network model for service ecosystem in business environment. [Citation Graph (, )][DBLP]


  159. Home/office intranet resource management for QoS-guaranteed realtime stream service provisioning on IEEE 802.11e WLAN. [Citation Graph (, )][DBLP]


  160. Towards a flexible security management solution for dynamic MANETs. [Citation Graph (, )][DBLP]


  161. Improving QoS guarantees through implicit AC. [Citation Graph (, )][DBLP]


  162. Improving user experience and resource management in wireless communications. [Citation Graph (, )][DBLP]


  163. Adapt-RDM - A bandwidth management algorithm suitable for DiffServ services aware traffic engineering. [Citation Graph (, )][DBLP]


  164. Information integration techniques to automate incident management. [Citation Graph (, )][DBLP]


  165. Grid resource management with tightly coupled WBEM/CIM local management. [Citation Graph (, )][DBLP]


  166. An improved GPS scheduling discipline based on multifractal traffic characteristics. [Citation Graph (, )][DBLP]


  167. Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. [Citation Graph (, )][DBLP]


  168. Fostering the simulation-based evaluation of management architectures over multi-hop topologies. [Citation Graph (, )][DBLP]


  169. Enforcing security in mobile RFID networks multilateral approaches and solutions. [Citation Graph (, )][DBLP]


  170. Policy and role based mobile RFID user privacy data management system. [Citation Graph (, )][DBLP]


  171. Policy-based self-healing for radio access networks. [Citation Graph (, )][DBLP]


  172. An attribute aggregation architecture with trust-based evaluation for access control. [Citation Graph (, )][DBLP]


  173. Towards an efficient implementation of traceback mechanisms in autonomous systems. [Citation Graph (, )][DBLP]


  174. High performance distributed Denial-of-Service resilient web cluster architecture. [Citation Graph (, )][DBLP]


  175. HyperBone: A scalable overlay network based on a virtual hypercube. [Citation Graph (, )][DBLP]


  176. Model-based management of security services in complex network environments. [Citation Graph (, )][DBLP]


  177. Self-tuning network support for MANETs. [Citation Graph (, )][DBLP]


  178. Unsupervised learning algorithms for intrusion detection. [Citation Graph (, )][DBLP]


  179. Transmission power control techniques for MAC protocols in wireless sensor networks. [Citation Graph (, )][DBLP]


  180. Application of adaptive probing for fault diagnosis in computer networks. [Citation Graph (, )][DBLP]


  181. A 2-tier architecture to support real-time communication in CSMA-based networks. [Citation Graph (, )][DBLP]


  182. Integrating cfengine and scli: Managing network devices like host systems. [Citation Graph (, )][DBLP]


  183. Mining event logs with SLCT and LogHound. [Citation Graph (, )][DBLP]


  184. SGNET: Implementation insights. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002