


default search action
12th CNSM 2016: Montreal, QC, Canada
- 12th International Conference on Network and Service Management, CNSM 2016, Montreal, QC, Canada, October 31 - Nov. 4, 2016. IEEE 2016, ISBN 978-3-901882-85-2

- Rashid Mijumbi, Sidhant Hasija, Steven Davy

, Alan Davy
, Brendan Jennings
, Raouf Boutaba:
A connectionist approach to dynamic resource management for virtualised network functions. 1-9 - Andreas Blenk

, Patrick Kalmbach, Patrick van der Smagt
, Wolfgang Kellerer
:
Boost online virtual network embedding: Using neural networks for admission control. 10-18 - Nashid Shahriar, Reaz Ahmed, Aimal Khan, Shihabur Rahman Chowdhury

, Raouf Boutaba, Jeebak Mitra:
ReNoVatE: Recovery from node failure in virtual network embedding. 19-27 - Roberto Riggio

, Davit Harutyunyan
, Abbas Bradai, Slawomir Kuklinski
, Toufik Ahmed
:
SWAN: Base-band units placement over reconfigurable wireless front-hauls. 28-36 - Swati Roy, David L. Applegate, Zihui Ge, Ajay Mahimkar, Shomik Pathak, Sarat C. Puthenpura:

Quantifying the service performance impact of self-organizing network actions. 37-45 - Tsvetko Tsvetkov, Janne Ali-Tolppa, Henning Sanneck, Georg Carle:

A Steiner tree-based verification approach for handling topology changes in self-organizing networks. 46-54 - Jalil Moraney, Danny Raz:

Efficient detection of flow anomalies with limited monitoring resources. 55-63 - Sebastian Abt, Harald Baier:

Correlating network events and transferring labels in the presence of IP address anonymisation. 64-72 - Yasaman Amannejad, Diwakar Krishnamurthy, Behrouz Homayoun Far:

Predicting Web service response time percentiles. 73-81 - Niels Bouten, Maxim Claeys, Bert Van Poecke, Steven Latré, Filip De Turck:

Dynamic server selection strategy for multi-server HTTP adaptive streaming services. 82-90 - Patrick Poullie, Stephan Mannhart, Burkhard Stiller:

Virtual machine priority adaption to enforce fairness among cloud users. 91-99 - Maxim Claeys, Niels Bouten, Danny De Vleeschauwer

, Koen De Schepper
, Werner Van Leekwijck, Steven Latré, Filip De Turck:
Deadline-aware TCP congestion control for video streaming services. 100-108 - Christopher Metter, Michael Seufert

, Florian Wamser, Thomas Zinner, Phuoc Tran-Gia:
Analytic model for SDN controller traffic and switch table occupancy. 109-117 - Jeremias Blendin, Daniel Herrmann, Matthias Wichtlhuber, Matthias Gunkel, Felix Wissel, David Hausheer

:
Enabling efficient multi-layer repair in elastic optical networks by gradually superimposing SDN. 118-126 - Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment:

Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. 127-135 - Nasim Beigi Mohammadi, Cornel Barna, Mark Shtern, Hamzeh Khazaei

, Marin Litoiu
:
CAAMP: Completely automated DDoS attack mitigation platform in hybrid clouds. 136-143 - José Jair Santanna, Ricardo de Oliveira Schmidt, Daphné Tuncer, Joey de Vries, Lisandro Zambenedetti Granville

, Aiko Pras:
Booter blacklist: Unveiling DDoS-for-hire websites. 144-152 - Long Qu, Chadi Assi, Khaled B. Shaban

, Maurice Khabbaz
:
Reliability-aware service provisioning in NFV-enabled enterprise datacenter networks. 153-159 - Bahman Rashidi, Carol J. Fung:

CoFence: A collaborative DDoS defence using network function virtualization. 160-166 - Arup Raton Roy, Shihabur Rahman Chowdhury

, Md. Faizul Bari, Reaz Ahmed, Raouf Boutaba:
Emulating an infrastructure with EASE. 167-173 - Jawad Manzoor

, Idilio Drago
, Ramin Sadre:
The curious case of parallel connections in HTTP/2. 174-180 - Steffie Jacob Eravuchira, Vaibhav Bajpai

, Jürgen Schönwälder
, Sam Crawford:
Measuring web similarity from dual-stacked hosts. 181-187 - Ajay Mahimkar:

Detecting and diagnosing performance impact of smartphone software upgrades. 188-194 - Tomás Cejka

, Václav Bartos
, Marek Svepes, Zdenek Rosa, Hana Kubátová:
NEMEA: A framework for network traffic analysis. 195-201 - Majid Ghaderi, Mohammad Naghibi:

Self-optimizing energy management in heterogeneous cellular networks. 202-208 - Roberto Doriguzzi Corin

, Pedro A. Aranda-Gutiérrez
, Elisa Rojas, Holger Karl, Elio Salvadori
:
Reusability of software-defined networking applications: A runtime, multi-controller approach. 209-215 - Ankita Atrey, Hendrik Moens, Gregory van Seghbroeck

, Bruno Volckaert, Filip De Turck:
BRAHMA: An intelligent framework for automated scaling of streaming and deadline-critical workflows. 216-222 - Mohammed Noraden Alsaleh, Ghaith Husari, Ehab Al-Shaer:

Optimizing the RoI of cyber risk mitigation. 223-227 - Gabriela F. Ciocarlie, Cherita Corbett, Eric Yeh, Christopher Connolly, Henning Sanneck, Muhammad Naseer ul Islam, Borislava Gajic, Szabolcs Nováczki

, Kimmo Hätönen:
Diagnosis cloud: Sharing knowledge across cellular networks. 228-232 - Stephen S. Mwanje, Janne Ali-Tolppa:

Fluid capacity for energy saving management in multi-layer ultra-dense 4G/5G cellular networks. 233-237 - Marcos Dias de Assunção, Laurent Lefèvre, François Rossigneux:

On the impact of advance reservations for energy-aware provisioning of bare-metal cloud resources. 238-242 - Joseph Wahba, Hazem M. Soliman, Hadi Bannazadeh, Alberto Leon-Garcia:

Graph-based diagnosis in software-defined infrastructure. 243-247 - Zhiming Shen, Christopher C. Young, Sai Zeng, Karin Murthy, Kun Bai:

Identifying resources for cloud garbage collection. 248-252 - Stefano Petrangeli, Patrick Van Staey, Maxim Claeys, Tim Wauters, Filip De Turck:

Energy-aware quality adaptation for mobile video streaming. 253-257 - Roland van Rijswijk-Deij

, Mattijs Jonker, Anna Sperotto
:
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC. 258-262 - Vaneet Aggarwal

, Ajay Mahimkar, Hongyao Ma, Zemin Zhang, Shuchin Aeron, Walter Willinger:
Inferring smartphone service quality using tensor methods. 263-267 - Sinem Güven, Karin Murthy:

Understanding the role of change in incident prevention. 268-271 - Samy Zemmouri, Shahin Vakilinia, Mohamed Cheriet:

Let's adapt to network change: Towards energy saving with rate adaptation in SDN. 272-276 - Meryem Elbaham, Kim Khoa Nguyen, Mohamed Cheriet:

A traffic visualization framework for monitoring large-scale inter-datacenter network. 277-281 - Arnamoy Bhattacharyya, Harsh V. P. Singh, Seyed Ali Jokar Jandaghi, Cristiana Amza:

Online characterization of buggy applications running on the cloud. 282-286 - Jonghwan Hyun, Youngjoon Won, David Sang-Chul Nahm, James Won-Ki Hong:

Measuring auto switch between Wi-Fi and mobile data networks in an urban area. 287-291 - Zdenek Rosa, Tomás Cejka

, Martin Zádník, Viktor Pus:
Building a feedback loop to capture evidence of network incidents. 292-296 - Christian A. Hammerschmidt, Samuel Marchal

, Radu State, Sicco Verwer:
Behavioral clustering of non-stationary IP flow record data. 297-301 - Shashwat Jain, Manish Khandelwal, Ashutosh Katkar, Joseph Nygate:

Applying big data technologies to manage QoS in an SDN. 302-306 - Rohit Abhishek, Shuai Zhao, Sejun Song, Baek-Young Choi

, Henry Zhu, Deep Medhi:
BuDDI: Bug detection, debugging, and isolation middlebox for software-defined network controllers. 307-311 - Pouya Yasrebi, Hadi Bannazadeh, Alberto Leon-Garcia:

Enhanced real time content delivery using vCPE and NFV service chaining. 312-317 - Amina Boubendir, Emmanuel Bertin, Noemie Simoni:

On-demand, dynamic and at-the-edge VNF deployment model application to Web Real-Time Communications. 318-323 - Mahboobeh Zangiabady

, Christian Aguilar-Fuster, Javier Rubio-Loyola:
A virtual network migration approach and analysis for enhanced online virtual network embedding. 324-329 - Lingxia Liao, Victor C. M. Leung:

LLDP based link latency monitoring in software defined networks. 330-335 - Huu-Nghi Nguyen, Thomas Begin, Anthony Busson, Isabelle Guérin Lassous:

Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networks. 336-341 - Runxin Wang, Simone Mangiante

, Alan Davy
, Lei Shi, Brendan Jennings
:
QoS-aware multipathing in datacenters using effective bandwidth estimation and SDN. 342-347 - Tejas Subramanya, Roberto Riggio

, Tinku Rasheed:
Intent-based mobile backhauling for 5G networks. 348-352 - Yoonseon Han, Jian Li, Doan Hoang, Jae-Hyoung Yoo, James Won-Ki Hong:

An intent-based network virtualization platform for SDN. 353-358 - Abdulaziz M. Ghaleb, Tarek Khalifa

, Khaled Bashir Shaban
:
Enhancing the performance of post-failure restoration schemes in multi-tenant networks. 359-362 - Gladys Diaz

, Noemie Simoni:
Network service description for virtual network deployment: A constraints based OVF extension proposal. 363-366 - Shahin Vakilinia, Mohamed Cheriet, Jananjoy Rajkumar:

Dynamic resource allocation of smart home workloads in the cloud. 367-370 - Earl McCune:

Power proportional computing for "Green" servers. 371-376 - Puyuan Zhao, Peng Yu, Chenchen Ji, Lei Feng, Wenjing Li:

A routing optimization method based on risk prediction for communication services in smart grid. 377-382 - Thomas Dandres

, Réjean Samson, Reza Farrahi Moghaddam, Kim Khoa Nguyen, Mohamed Cheriet, Yves Lemieux:
The green sustainable telco cloud: Minimizing greenhouse gas emissions of server load migrations between distributed data centres. 383-387 - Angela Burton, Tapan Parikh, Shannon Mascarenhas, Jue Zhang, Jonathan Voris, N. Sertac Artan, Wenjia Li:

Driver identification and authentication with active behavior modeling. 388-393 - Yihang Cheng, Yuanyuan Qiao, Jie Yang:

An improved Markov method for prediction of user mobility. 394-399 - Vernon K. Cody Bumgardner

, Victor W. Marek, Caylin D. Hickey
:
Cresco: A distributed agent-based edge computing framework. 400-405 - Ana Carolina Riekstin, Thomas Dandres

, Kim Khoa Nguyen, Réjean Samson, Mohamed Cheriet:
Monitoring and measurement system for green operation of geographically distributed ICT services. 406-411 - Leonard Nonde, Ahmed Q. Lawey

, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani
:
Energy efficient cloud networks. 412-417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














