


Остановите войну!
for scientists:


default search action
NOMS 2016: Istanbul, Turkey
- Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery Paula dos Santos:
2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016. IEEE 2016, ISBN 978-1-5090-0223-8 - Roberto di Lallo
, Mirko Gradillo, Gabriele Lospoto, Claudio Pisa, Massimo Rimondini
:
On the practical applicability of SDN research. 1-9 - Leonardo Richter Bays
, Luciano Paschoal Gaspary, Reaz Ahmed, Raouf Boutaba:
Virtual network embedding in software-defined networks. 10-18 - Luis Augusto Dias Knob
, Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco
:
SDEFIX - Identifying elephant flows in SDN-based IXP networks. 19-26 - Anderson Santos da Silva, Juliano Araujo Wickboldt
, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho
:
ATLANTIC: A framework for anomaly traffic detection, classification, and mitigation in SDN. 27-35 - Anne-Marie Bosneag, Sidath Handurukande, James O'Sullivan:
Automatic discovery of sub-optimal radio performance in LTE RAN networks. 36-43 - Nessrine Trabelsi, Chung Shue Chen, Laurent Roullet, Eitan Altman, Rachid El Azouzi
:
Coordinated scheduling via frequency and power allocation optimization in LTE cellular networks. 44-51 - Thant Zin Oo, Nguyen Hoang Tran
, Walid Saad, Jae Hyeok Son, Choong Seon Hong
:
Traffic offloading via Markov approximation in heterogeneous cellular networks. 52-60 - Tuan LeAnh, Nguyen Hoang Tran
, Walid Saad, Seungil Moon, Choong Seon Hong
:
Matching-based distributed resource allocation in cognitive femtocell networks. 61-68 - Houda Jmila
, Kaouther Drira, Djamal Zeghlache
:
A self-stabilizing framework for dynamic bandwidth allocation in virtual networks. 69-77 - Shihabur Rahman Chowdhury
, Reaz Ahmed, Md Mashrur Alam Khan, Nashid Shahriar, Raouf Boutaba, Jeebak Mitra, Feng Zeng:
Protecting virtual networks with DRONE. 78-86 - Amir Nahir, Ariel Orda, Danny Raz:
Reversing the supermarket: A distributed approach for handling elasticity in the cloud. 87-95 - Maja Vukovic, Jinho Hwang:
Cloud migration using automated planning. 96-103 - Jeroen van der Hooft, Stefano Petrangeli, Niels Bouten, Tim Wauters, Rafael Huysegems, Tom Bostoen, Filip De Turck
:
An HTTP/2 push-based approach for SVC adaptive streaming. 104-111 - Safiqul Islam, Michael Welzl
, David A. Hayes
, Stein Gjessing:
Managing real-time media flows through a flow state exchange. 112-120 - Vahid Aghaei Foroushani, A. Nur Zincir-Heywood
:
Autonomous system based flow marking scheme for IP-Traceback. 121-128 - Parikshit Juluri, Venkatesh Tamarapalli
, Deep Medhi:
QoE management in DASH systems using the segment aware rate adaptation algorithm. 129-136 - Tsvetko Tsvetkov, Janne Ali-Tolppa, Henning Sanneck, Georg Carle:
A minimum spanning tree-based approach for reducing verification collisions in self-organizing networks. 137-145 - Zifan Li, Peng Yu, Wenjing Li, Xuesong Qiu:
Modeling and optimization of self-organizing energy-saving mechanism for HetNets. 146-152 - Dario Valocchi, Daphné Tuncer, Marinos Charalambides
, Mauro Femminella, Gianluca Reali, George Pavlou:
Extensible signaling framework for decentralized network management applications. 153-161 - Nagao Ogino, Takeshi Kitahara, Shin'ichi Arakawa, Go Hasegawa
, Masayuki Murata:
Decentralized boolean network tomography based on network partitioning. 162-170 - Simon Jouet, Colin Perkins
, Dimitrios P. Pezaros:
OTCP: SDN-managed congestion control for data center networks. 171-179 - Behzad Mirkhanzadeh, Naeim Taheri, Siavash Khorsandi:
SDxVPN: A software-defined solution for VPN service providers. 180-188 - Eros S. Spalla, Diego R. Mafioletti, Alextian B. Liberato, Gilberto Ewald, Christian Esteve Rothenberg
, Lásaro J. Camargos, Rodolfo da Silva Villaça, Magnos Martinello:
AR2C2: Actively replicated controllers for SDN resilient control plane. 189-196 - Felipe A. Lopes, Leonidas Lima
, Marcelo Santos, Robson do Nascimento Fidalgo, Stenio Fernandes:
High-level modeling and application validation for SDN. 197-205 - Yi Li, Hong Liu, Wenjun Yang, Dianming Hu, Wei Xu:
Inter-data-center network traffic prediction with elephant flows. 206-213 - Da Feng, Weiqiang Sun, Peng Wu, Xiaojian Zhang, Junmin Wu, Weisheng Hu:
Dimensioning of Store-and-Transfer WDM Network with limited storage. 214-221 - Andri Lareida, Sebastian Schrepfer, Thomas Bocek, Burkhard Stiller:
Overlay network measurements with distribution evolution and geographical visualization. 222-230 - Michael Menth, Nikolas Zeitler:
Activity-based congestion management for fair bandwidth sharing in trusted packet networks. 231-239 - Wazen M. Shbair
, Thibault Cholez, Jérôme François
, Isabelle Chrisment:
A multi-level framework to identify HTTPS services. 240-248 - Ren Quinn, Josh Kunz, Aisha Syed, Joe Breen, Sneha Kumar Kasera, Robert Ricci
, Jacobus E. van der Merwe:
KnowNet: Towards a knowledge plane for enterprise network management. 249-256 - Josh Kunz, Christopher Becker, Mohamed Jamshidy, Sneha Kumar Kasera, Robert Ricci
, Jacobus E. van der Merwe:
OpenEdge: A dynamic and secure open service edge network. 257-264 - Bryan Ng, Alexander Deng, Ying Qu, Winston K. G. Seah
:
Changeover prediction model for improving handover support in campus area WLAN. 265-272 - Alexandre Gustavo Wermann, Marcelo Cardoso Bortolozzo, Eduardo Germano da Silva, Alberto E. Schaeffer Filho
, Luciano Paschoal Gaspary, Marinho P. Barcellos:
ASTORIA: A framework for attack simulation and evaluation in smart grids. 273-280 - Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura
:
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study. 281-288 - Samaneh Tajalizadehkhoob, Maciej Korczynski, Arman Noroozian, Carlos Gañán, Michel van Eeten
:
Apples, oranges and hosting providers: Heterogeneity and security in the hosting market. 289-297 - Ricardo T. Macedo, Aldri Luiz dos Santos
, Yacine Ghamri-Doudane, Michele Nogueira Lima
:
A scheme for DDoS attacks mitigation in IdM systems through reorganizations. 298-305 - Cong Guo, Martin Karsten:
On the feasibility of core-rooted path addressing. 306-314 - Wenqin Shao, Luigi Iannone, Jean-Louis Rougier, François Devienne, Mateusz Viste:
Scalable BGP prefix selection for effective inter-domain traffic engineering. 315-323 - Yahya Hassanzadeh-Nazarabadi
, Alptekin Küpçü
, Öznur Özkasap
:
LARAS: Locality aware replication algorithm for the Skip Graph. 324-332 - Sai Qian Zhang, Ali Tizghadam, Byungchul Park, Hadi Bannazadeh, Alberto Leon-Garcia:
Joint NFV placement and routing for multicast service on SDN. 333-341 - Hyeontaek Oh, S. H. Shah Newaz, Sangdon Park, Jun Kyun Choi:
Maximizing energy efficiency in off-peak hours: A novel sleep scheme for WLAN access points. 342-348 - Alexander Sayenko, Mikhail Zolotukhin, Timo Hämäläinen
:
On optimal placement of low power nodes for improved performance in heterogeneous networks. 349-357 - Cristiano M. Silva, Wagner Meira Jr.:
An architecture integrating stationary and mobile roadside units for providing communication on intelligent transportation systems. 358-365 - Anthéa Mayzaud, Anuj Sehgal, Remi Badonnel, Isabelle Chrisment, Jürgen Schönwälder
:
Using the RPL protocol for supporting passive monitoring in the Internet of Things. 366-374 - Huiguang Liang, Hyong S. Kim, Hwee-Pink Tan
, Wai-Leong Yeow:
Where am I? Characterizing and improving the localization performance of off-the-shelf mobile devices through cooperation. 375-382 - Matheus B. Lehmann, Marinho P. Barcellos, Andreas Mauthe
:
Providing producer mobility support in NDN through proactive data replication. 383-391 - Huiguang Liang, Ido Nevat, Hyong S. Kim, Hwee-Pink Tan
, Wai-Leong Yeow:
Not you too? Distilling local contexts of poor cellular network performance through participatory sensing. 392-400 - Roberto Riggio
, Imen Grida Ben Yahia, Steven Latré, Tinku Rasheed:
Scylla: A language for virtual network functions orchestration in enterprise WLANs. 401-409 - Hui Yu, Jiahai Yang, Cong Xu, Hui Wang, Zi Liang:
SpongeNet: Towards bandwidth guarantees of cloud datacenter with two-phase VM placement. 410-417 - Maria Torres Vega
, Jeroen Famaey
, Antonius M. J. Koonen
, Antonio Liotta
:
Resource allocation in optical beam-steered indoor networks. 418-426 - Elisa Mannes, Carlos Maziero, Luiz Carlos Lassance, Fábio Borges
:
Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networks. 427-435 - Cesar Ghali, Gene Tsudik, Christopher A. Wood, Edmund Yeh:
Practical accounting in content-centric networking. 436-444 - Anatolij Zubow, Sven Zehl, Adam Wolisz:
BIGAP - Seamless handover in high performance enterprise IEEE 802.11 networks. 445-453 - Sang-Yoon Chang, Younghee Park, Akshaya Muralidharan:
Fast address hopping at the switches: Securing access for packet forwarding in SDN. 454-460 - Messaoud Aouadj, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla:
Composing data and control functions to ease virtual networks programmability. 461-467 - Samira Rezaei, Hamidreza Radmanesh, Payam Alavizadeh, Hamidreza Nikoofar, Farshad Lahouti:
Automatic fault detection and diagnosis in cellular networks using operations support systems data. 468-473 - Matteo Artuso, Cosmin Caba, Henrik Lehrmann Christiansen
, José Soler
:
Towards flexbile SDN-based management for cloud-based mobile networks. 474-480 - Qinghong Zhong, Ying Wang, Wenjing Li, Xuesong Qiu:
A min-cover based controller placement approach to build reliable control network in SDN. 481-487 - Sufian Hameed
, Usman Murad Ali:
Efficacy of Live DDoS Detection with Hadoop. 488-494 - Kostas Giotis, Maria Apostolaki, Vasilis S. Maglaris:
A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains. 495-501 - Xuxian Jiang, Kapil Singh, Yajin Zhou:
AppShell: Making data protection practical for lost or stolen Android devices. 502-508 - Martin Ussath, Feng Cheng, Christoph Meinel:
Event attribute tainting: A new approach for attack tracing and event correlation. 509-515 - Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto
, Harald Baier, Aiko Pras:
Collaborative DDoS defense using flow-based security event information. 516-522 - Alberto Huertas Celdrán
, Manuel Gil Pérez
, Félix J. García Clemente
, Gregorio Martínez Pérez:
MASTERY: A multicontext-aware system that preserves the users' privacy. 523-528 - Guilherme Arthur Geronimo, Rafael Brundo Uriarte
, Carlos Becker Westphall:
Order@Cloud: A VM organisation framework based on multi-objectives placement ranking. 529-535 - Oussama Soualah, Ilhem Fajjari, Makhlouf Hadji, Nadjib Aitsaadi, Djamal Zeghlache
:
A novel virtual network embedding scheme based on Gomory-Hu tree within cloud's backbone. 536-542 - Jose Leal Domingues Neto, Daniel F. Macedo, José Marcos S. Nogueira
:
Location aware decision engine to offload mobile computation to the cloud. 543-549 - Jieyu Lin, Qi Zhang, Hadi Bannazadeh, Alberto Leon-Garcia:
Automated anomaly detection and root cause analysis in virtualized cloud infrastructures. 550-556 - Faiza Samreen
, Yehia El-khatib
, Matthew Rowe, Gordon S. Blair
:
Daleel: Simplifying cloud instance selection using machine learning. 557-563 - Rafael Xavier, Hendrik Moens, Bruno Volckaert, Filip De Turck
:
Adaptive virtual machine allocation algorithms for cloud-hosted elastic media services. 564-570 - Stefan Rass
, Raphael Wigoutschnigg:
Arguable anonymity from key-privacy: The deterministic crowds protocol. 571-576 - Sufian Hameed
, Usman Murad Jamali, Adnan Samad:
Protecting NFC data exchange against eavesdropping with encryption record type definition. 577-583 - Carlo Marcelo Revoredo da Silva, Ricardo Batista Rodrigues, Ruy J. G. B. de Queiroz, Vinicius C. Garcia
, Jose Silva, Daniel Gatti, Rodrigo Elia Assad, Leandro M. do Nascimento, Kellyton Brito
, Péricles B. C. de Miranda:
Towards a taxonomy for security threats on the web ecosystem. 584-590 - Davide Ceneda
, Marco Di Bartolomeo, Valentino Di Donato, Maurizio Patrignani
, Maurizio Pizzonia, Massimo Rimondini
:
RoutingWatch: Visual exploration and analysis of routing events. 591-597 - Stefano Salsano
, Luca Veltri, Luca Davoli
, Pier Luigi Ventre, Giuseppe Siracusano:
PMSR - Poor Man's Segment Routing, a minimalistic approach to Segment Routing and a Traffic Engineering use case. 598-604 - Hiroshi Matsuura:
Maximizing lifetime of multiple data aggregation trees in wireless sensor networks. 605-611 - Cihangir Besiktas, Didem Gözüpek, Aydin Ulas
, Erhan Lokman, Özcan Özyurt, Kazim Ulusoy:
Flexible bandwidth-based virtual network embedding. 612-617 - Janne Ali-Tolppa, Tsvetko Tsvetkov:
Optimistic concurrency control in self-organizing networks using automatic coordination and verification. 618-624 - Simon Lohmuller, Lars-Christoph Schmelz, Sören Hahn:
Adaptive SON management using KPI measurements. 625-631 - Huu-Nghi Nguyen, Thomas Begin, Anthony Busson, Isabelle Guérin Lassous:
Towards a passive measurement-based estimator for the standard deviation of the end-to-end delay. 632-637 - Long Qu, Chadi Assi, Khaled B. Shaban
:
Network function virtualization scheduling with transmission delay optimization. 638-644 - Abdulaziz M. Ghaleb, Tarek Khalifa
, Sara Ayoubi, Khaled Bashir Shaban
:
Surviving link failures in multicast VN embedded applications. 645-651 - Akio Watanabe, Keisuke Ishibashi, Tsuyoshi Toyono, Tatsuaki Kimura, Keishiro Watanabe, Yoichi Matsuo, Kohei Shiomoto
:
Workflow extraction for service operation using multiple unstructured trouble tickets. 652-658 - Chuan Pham
, Nguyen Hoang Tran
, Minh N. H. Nguyen, Shaolei Ren
, Walid Saad, Choong Seon Hong
:
Hosting virtual machines on a cloud datacenter: A matching theoretic approach. 659-664 - João F. Machry Sarubbi, Cristiano M. Silva:
Delta-r: A novel and more economic strategy for allocating the roadside infrastructure in vehicular networks with guaranteed levels of performance. 665-671 - Maria Efthymiopoulou, Nikolaos Efthymiopoulos, Athanasios Christakidis:
Enabling QoS in peer to peer live streaming through dynamic bandwidth or playback rate control. 672-678 - Tal Mizrahi, Yoram Moses:
OneClock to rule them all: Using time in networked applications. 679-685 - Clarissa Cassales Marquezan, Xueli An, Zoran Despotovic, Ramin Khalili, Artur Hecker
:
Dispatching PACKET_INs to the right SDN control application via context interpretation in Mobile Core Networks. 686-690 - Adrian Flores de la Cruz, Juan Pedro Muñoz-Gea
, Pilar Manzanares-Lopez
, Josemaria Malgosa-Sanahuja
:
Network failures support for traffic monitoring mechanisms in software-defined networks. 691-694 - Martin Johnsson, Brendan Jennings
:
Meeting latency targets for complex SOA-based transactions in data centers. 695-698 - Liam Fallon, Sven van der Meer
, John Keeney:
Apex: An engine for dynamic adaptive policy execution. 699-702 - Jonghwan Hyun, Youngjoon Won, Eunji Kim, Jae-Hyoung Yoo, James Won-Ki Hong:
Is LTE-Advanced really advanced? 703-707 - Carol Habib
, Abdallah Makhoul
, Rony Darazi, Raphaël Couturier
:
Multisensor data fusion and decision support in wireless body sensor networks. 708-712 - Joris Claassen, Ralph Koning, Paola Grosso
:
Linux containers networking: Performance and scalability of kernel modules. 713-717 - Jeremie Leguay
, Lorenzo Maggi, Moez Draief, Stefano Paris, Symeon Chouvardas:
Admission control with online algorithms in SDN. 718-721 - Amina Boubendir, Emmanuel Bertin, Noemie Simoni:
NaaS architecture through SDN-enabled NFV: Network openness towards web communication service providers. 722-726 - Shahram Mollahasani, Ertan Onur
:
Evaluation of terahertz channel in data centers. 727-730 - Can Altay, Nazli Zeynep Bozdemir, Erdogan Camcioglu:
Standalone eNode-B design with integrated virtual EPC in public safety networks. 731-734 - Michael Strasser, Nico Weiner, Sahin Albayrak
:
Outsourced invoice service: Service-clearing as SaaS in mobility service marketplaces. 735-739 - Roberto Doriguzzi Corin
, Domenico Siracusa
, Elio Salvadori, Arne Schwabe:
Empowering network operating systems with memory management techniques. 740-744 - Christian Salim
, Abdallah Makhoul
, Rony Darazi, Raphaël Couturier
:
Adaptive sampling algorithms with local emergency detection for energy saving in Wireless Body Sensor Networks. 745-749 - Muhammed Macit
, Emrullah Delibas, Bahtiyar Karanlik, Alperen Inal, Tevfik Aytekin
:
Real time distributed analysis of MPLS network logs for anomaly detection. 750-753 - Ahmed Al-Jawad, Purav Shah
, Orhan Gemikonakli
, Ramona Trestian
:
Compression-based technique for SDN using sparse-representation dictionary. 754-758 - Roberto di Lallo
, Gabriele Lospoto, Massimo Rimondini
, Giuseppe Di Battista:
Supporting end-to-end connectivity in federated networks using SDN. 759-762 - Andre S. Gomes
, Vitor Fonseca
, Bruno Sousa
, David Palma
, Paulo Simões
, Edmundo Monteiro
, Luís Cordeiro
:
A mobile follow-me cloud content caching model. 763-766 - Petr Velan
:
EventFlow: Network flow aggregation based on user actions. 767-771 - Sara Koulali, Essaid Sabir
, Mostafa Azizi:
Energy optimization through duty cycling scheduling in mobile social networks: A non-cooperative game theory approach. 772-775 - Ahmet Aris
, Sema F. Oktug, Siddika Berna Örs Yalçin
:
RPL version number attacks: In-depth study. 776-779 - Basar Daldal, Ibrahim Bilgin, Dogac Basaran, Selin Metin:
Using Web Services for WebRTC signaling interoperability. 780-783 - Amer AlGhadhban
, Basem Shihada
:
Energy efficient SDN commodity switch based practical flow forwarding method. 784-788 - Mauro Tortonesi, James Michaelis, Niranjan Suri, Michael A. Baker:
Software-defined and value-based information processing and dissemination in IoT applications. 789-793 - Zoraze Ali, Nicola Baldo, Josep Mangues-Bafalluy, Lorenza Giupponi:
Machine learning based handover management for improved QoE in LTE. 794-798 - Jorge Visca, Raul Fuentes, Ana R. Cavalli, Javier Baliosian:
Opportunistic media sharing for mobile networks. 799-803 - Ziyu Wang, Jiahai Yang, Hui Zhang, Chenxi Li, Shize Zhang, Hui Wang:
Towards online anomaly detection by combining multiple detection methods and Storm. 804-807 - Takayuki Kuroda, Manabu Nakanoya, Atsushi Kitano, Aniruddha S. Gokhale
:
The configuration-oriented planning for fully declarative IT system provisioning automation. 808-811 - Daniele Apiletti, Elena Baralis, Tania Cerquitelli, Paolo Garza, Luca Venturini
:
SaFe-NeC: A scalable and flexible system for network data characterization. 812-816