callback( { "result":{ "query":":facetid:toc:\"db/journals/jnsm/jnsm15.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"436.44" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"31", "@dc":"31", "@oc":"31", "@id":"43457298", "text":":facetid:toc:db/journals/jnsm/jnsm15.bht" } }, "hits":{ "@total":"31", "@computed":"31", "@sent":"31", "@first":"0", "hit":[{ "@score":"1", "@id":"5480676", "info":{"authors":{"author":[{"@pid":"18/4550","text":"Toufik Ahmed"},{"@pid":"05/5594","text":"Mubashar Mushtaq"}]},"title":"P2P Object-based adaptivE Multimedia Streaming (POEMS).","venue":"J. Netw. Syst. Manag.","volume":"15","number":"3","pages":"289-310","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/AhmedM07","doi":"10.1007/S10922-007-9068-7","ee":"https://doi.org/10.1007/s10922-007-9068-7","url":"https://dblp.org/rec/journals/jnsm/AhmedM07"}, "url":"URL#5480676" }, { "@score":"1", "@id":"5480677", "info":{"authors":{"author":{"@pid":"12/2489","text":"Lawrence Bernstein"}},"title":"Network Management Isn't Dying, It's Just Fading Away.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"4","pages":"419-424","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/Bernstein07","doi":"10.1007/S10922-007-9080-Y","ee":"https://doi.org/10.1007/s10922-007-9080-y","url":"https://dblp.org/rec/journals/jnsm/Bernstein07"}, "url":"URL#5480677" }, { "@score":"1", "@id":"5480678", "info":{"authors":{"author":[{"@pid":"12/2489","text":"Lawrence Bernstein"},{"@pid":"77/3370","text":"C. M. Yuhas"}]},"title":""The System is the Solution".","venue":"J. Netw. Syst. Manag.","volume":"15","number":"2","pages":"137-140","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/BernsteinY07","doi":"10.1007/S10922-007-9061-1","ee":"https://doi.org/10.1007/s10922-007-9061-1","url":"https://dblp.org/rec/journals/jnsm/BernsteinY07"}, "url":"URL#5480678" }, { "@score":"1", "@id":"5480679", "info":{"authors":{"author":{"@pid":"46/4880","text":"Joseph Betser"}},"title":"The Evolution of the NOMS-IM Symposia Series: From a Gleam in the Eye to Multiple Technical Activities.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"4","pages":"569-579","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/Betser07","doi":"10.1007/S10922-007-9081-X","ee":"https://doi.org/10.1007/s10922-007-9081-x","url":"https://dblp.org/rec/journals/jnsm/Betser07"}, "url":"URL#5480679" }, { "@score":"1", "@id":"5480680", "info":{"authors":{"author":[{"@pid":"35/6562","text":"Thomas Michael Bohnert"},{"@pid":"m/EdmundoMonteiro","text":"Edmundo Monteiro"}]},"title":"Multi-Class Measurement Based Admission Control for a QoS Framework with Dynamic Resource Management.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"2","pages":"219-240","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/BohnertM07","doi":"10.1007/S10922-007-9065-X","ee":"https://doi.org/10.1007/s10922-007-9065-x","url":"https://dblp.org/rec/journals/jnsm/BohnertM07"}, "url":"URL#5480680" }, { "@score":"1", "@id":"5480681", "info":{"authors":{"author":[{"@pid":"b/ChristosBouras","text":"Christos Bouras"},{"@pid":"76/4079","text":"Kostas Stamos"}]},"title":"Performance Analysis of Adaptive Admission Control Algorithms for Bandwidth Brokers.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"2","pages":"191-218","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/BourasS07","doi":"10.1007/S10922-007-9059-8","ee":"https://doi.org/10.1007/s10922-007-9059-8","url":"https://dblp.org/rec/journals/jnsm/BourasS07"}, "url":"URL#5480681" }, { "@score":"1", "@id":"5480682", "info":{"authors":{"author":[{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"},{"@pid":"08/2578","text":"Issam Aib"}]},"title":"Policy-based Management: A Historical Perspective.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"4","pages":"447-480","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/BoutabaA07","doi":"10.1007/S10922-007-9083-8","ee":"https://doi.org/10.1007/s10922-007-9083-8","url":"https://dblp.org/rec/journals/jnsm/BoutabaA07"}, "url":"URL#5480682" }, { "@score":"1", "@id":"5480683", "info":{"authors":{"author":[{"@pid":"12/6180","text":"Frank Chiang"},{"@pid":"94/2112","text":"Robin Braun"},{"@pid":"90/459","text":"Johnson I. Agbinya"}]},"title":"Self-Configuration of Network Services with Biologically Inspired Learning and Adaptation.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"1","pages":"87-116","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/ChiangBA07","doi":"10.1007/S10922-006-9056-3","ee":"https://doi.org/10.1007/s10922-006-9056-3","url":"https://dblp.org/rec/journals/jnsm/ChiangBA07"}, "url":"URL#5480683" }, { "@score":"1", "@id":"5480684", "info":{"authors":{"author":{"@pid":"45/4134","text":"Luca Deri"}},"title":"High-Speed Dynamic Packet Filtering.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"3","pages":"401-415","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/Deri07","doi":"10.1007/S10922-007-9070-0","ee":"https://doi.org/10.1007/s10922-007-9070-0","url":"https://dblp.org/rec/journals/jnsm/Deri07"}, "url":"URL#5480684" }, { "@score":"1", "@id":"5480685", "info":{"authors":{"author":{"@pid":"01/1498","text":"Rand Edwards"}},"title":"History and Status of Operations Support Systems.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"4","pages":"555-567","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/Edwards07","doi":"10.1007/S10922-007-9077-6","ee":"https://doi.org/10.1007/s10922-007-9077-6","url":"https://dblp.org/rec/journals/jnsm/Edwards07"}, "url":"URL#5480685" }, { "@score":"1", "@id":"5480686", "info":{"authors":{"author":[{"@pid":"95/1530","text":"Georgios Exarchakos"},{"@pid":"66/3455","text":"Nick Antonopoulos"}]},"title":"Resource Sharing Architecture For Cooperative Heterogeneous P2P Overlays.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"3","pages":"311-334","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/ExarchakosA07","doi":"10.1007/S10922-007-9069-6","ee":"https://doi.org/10.1007/s10922-007-9069-6","url":"https://dblp.org/rec/journals/jnsm/ExarchakosA07"}, "url":"URL#5480686" }, { "@score":"1", "@id":"5480687", "info":{"authors":{"author":[{"@pid":"55/6379","text":"Samir Ghamri-Doudane"},{"@pid":"14/2269","text":"Nazim Agoulmine"}]},"title":"Enhanced DHT-based P2P Architecture for Effective Resource Discovery and Management.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"3","pages":"335-354","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/Ghamri-DoudaneA07","doi":"10.1007/S10922-007-9067-8","ee":"https://doi.org/10.1007/s10922-007-9067-8","url":"https://dblp.org/rec/journals/jnsm/Ghamri-DoudaneA07"}, "url":"URL#5480687" }, { "@score":"1", "@id":"5480688", "info":{"authors":{"author":[{"@pid":"76/2017","text":"John Hale"},{"@pid":"22/6781","text":"Paul Brusil"}]},"title":"Secur(e/ity) Management: A Continuing Uphill Climb.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"4","pages":"525-553","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/HaleB07","doi":"10.1007/S10922-007-9079-4","ee":"https://doi.org/10.1007/s10922-007-9079-4","url":"https://dblp.org/rec/journals/jnsm/HaleB07"}, "url":"URL#5480688" }, { "@score":"1", "@id":"5480689", "info":{"authors":{"author":[{"@pid":"06/5075","text":"John Keeney"},{"@pid":"80/6593-1","text":"David Lewis 0001"},{"@pid":"16/508","text":"Declan O'Sullivan"}]},"title":"Ontological Semantics for Distributing Contextual Knowledge in Highly Distributed Autonomic Systems.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"1","pages":"75-86","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/KeeneyLO07","doi":"10.1007/S10922-006-9054-5","ee":"https://doi.org/10.1007/s10922-006-9054-5","url":"https://dblp.org/rec/journals/jnsm/KeeneyLO07"}, "url":"URL#5480689" }, { "@score":"1", "@id":"5480690", "info":{"authors":{"author":[{"@pid":"47/3484","text":"Hristo Koshutanski"},{"@pid":"59/6145","text":"Fabio Massacci"}]},"title":"A Negotiation Scheme for Access Rights Establishment in Autonomic Communication.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"1","pages":"117-136","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/KoshutanskiM07","doi":"10.1007/S10922-006-9057-2","ee":"https://doi.org/10.1007/s10922-006-9057-2","url":"https://dblp.org/rec/journals/jnsm/KoshutanskiM07"}, "url":"URL#5480690" }, { "@score":"1", "@id":"5480691", "info":{"authors":{"author":[{"@pid":"13/5564","text":"Romain Laborde"},{"@pid":"90/1451","text":"Michel Kamel"},{"@pid":"20/699","text":"François Barrère"},{"@pid":"05/1682","text":"Abdelmalek Benzekri"}]},"title":"Implementation of a Formal Security Policy Refinement Process in WBEM Architecture.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"2","pages":"241-266","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/LabordeKBB07","doi":"10.1007/S10922-007-9063-Z","ee":"https://doi.org/10.1007/s10922-007-9063-z","url":"https://dblp.org/rec/journals/jnsm/LabordeKBB07"}, "url":"URL#5480691" }, { "@score":"1", "@id":"5480692", "info":{"authors":{"author":[{"@pid":"42/341","text":"Xiaoxiang Leng"},{"@pid":"79/3662","text":"Jun Bi"},{"@pid":"60/7041","text":"Miao Zhang"},{"@pid":"82/4905","text":"Jianping Wu"}]},"title":"Connecting IPvX Networks Over IPvY with a P2P Method.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"3","pages":"383-399","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/LengBZW07","doi":"10.1007/S10922-007-9071-Z","ee":"https://doi.org/10.1007/s10922-007-9071-z","url":"https://dblp.org/rec/journals/jnsm/LengBZW07"}, "url":"URL#5480692" }, { "@score":"1", "@id":"5480693", "info":{"authors":{"author":[{"@pid":"80/6593-1","text":"David Lewis 0001"},{"@pid":"d/SimonADobson","text":"Simon Dobson"}]},"title":"Autonomic Pervasive and Context-Aware Systems.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"1","pages":"1-3","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/LewisD07","doi":"10.1007/S10922-006-9055-4","ee":"https://doi.org/10.1007/s10922-006-9055-4","url":"https://dblp.org/rec/journals/jnsm/LewisD07"}, "url":"URL#5480693" }, { "@score":"1", "@id":"5480694", "info":{"authors":{"author":[{"@pid":"97/1879","text":"Apostolos Malatras"},{"@pid":"h/AntonisMHadjiantonis","text":"Antonis M. Hadjiantonis"},{"@pid":"p/GeorgePavlou","text":"George Pavlou"}]},"title":"Exploiting Context-Awareness for the Autonomic Management of Mobile Ad Hoc Networks.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"1","pages":"29-55","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/MalatrasHP07","doi":"10.1007/S10922-006-9052-7","ee":"https://doi.org/10.1007/s10922-006-9052-7","url":"https://dblp.org/rec/journals/jnsm/MalatrasHP07"}, "url":"URL#5480694" }, { "@score":"1", "@id":"5480695", "info":{"authors":{"author":{"@pid":"m/ManuMalek","text":"Manu Malek"}},"title":"Fifteenth-year Commemorative Issue.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"4","pages":"417-418","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/Malek07","doi":"10.1007/S10922-007-9086-5","ee":"https://doi.org/10.1007/s10922-007-9086-5","url":"https://dblp.org/rec/journals/jnsm/Malek07"}, "url":"URL#5480695" }, { "@score":"1", "@id":"5480696", "info":{"authors":{"author":[{"@pid":"m/JPMartinFlatin","text":"Jean-Philippe Martin-Flatin"},{"@pid":"03/2899","text":"Gabriel Jakobson"},{"@pid":"05/3190","text":"Lundy Lewis"}]},"title":"Event Correlation in Integrated Management: Lessons Learned and Outlook.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"4","pages":"481-502","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/Martin-FlatinJL07","doi":"10.1007/S10922-007-9078-5","ee":"https://doi.org/10.1007/s10922-007-9078-5","url":"https://dblp.org/rec/journals/jnsm/Martin-FlatinJL07"}, "url":"URL#5480696" }, { "@score":"1", "@id":"5480697", "info":{"authors":{"author":{"@pid":"m/DeepMedhi","text":"Deep Medhi"}},"title":"Routing Management in the PSTN and the Internet: A Historical Perspective.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"4","pages":"503-523","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/Medhi07","doi":"10.1007/S10922-007-9085-6","ee":"https://doi.org/10.1007/s10922-007-9085-6","url":"https://dblp.org/rec/journals/jnsm/Medhi07"}, "url":"URL#5480697" }, { "@score":"1", "@id":"5480698", "info":{"authors":{"author":[{"@pid":"16/375","text":"Lilia Paradis"},{"@pid":"76/5895-1","text":"Qi Han 0001"}]},"title":"A Survey of Fault Management in Wireless Sensor Networks.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"2","pages":"171-190","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/ParadisH07","doi":"10.1007/S10922-007-9062-0","ee":"https://doi.org/10.1007/s10922-007-9062-0","url":"https://dblp.org/rec/journals/jnsm/ParadisH07"}, "url":"URL#5480698" }, { "@score":"1", "@id":"5480699", "info":{"authors":{"author":{"@pid":"p/GeorgePavlou","text":"George Pavlou"}},"title":"On the Evolution of Management Approaches, Frameworks and Protocols: A Historical Perspective.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"4","pages":"425-445","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/Pavlou07","doi":"10.1007/S10922-007-9082-9","ee":"https://doi.org/10.1007/s10922-007-9082-9","url":"https://dblp.org/rec/journals/jnsm/Pavlou07"}, "url":"URL#5480699" }, { "@score":"1", "@id":"5480700", "info":{"authors":{"author":[{"@pid":"p/AikoPras","text":"Aiko Pras"},{"@pid":"39/5680","text":"Jürgen Schönwälder"},{"@pid":"00/4292","text":"Burkhard Stiller"}]},"title":"Peer-to-Peer Technologies in Network and Service Management.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"3","pages":"285-288","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/PrasSS07","doi":"10.1007/S10922-007-9072-Y","ee":"https://doi.org/10.1007/s10922-007-9072-y","url":"https://dblp.org/rec/journals/jnsm/PrasSS07"}, "url":"URL#5480700" }, { "@score":"1", "@id":"5480701", "info":{"authors":{"author":[{"@pid":"157/8215","text":"Mohammad Abdur Razzaque"},{"@pid":"d/SimonADobson","text":"Simon Dobson"},{"@pid":"n/PaddyNixon","text":"Paddy Nixon"}]},"title":"Cross-Layer Architectures for Autonomic Communications.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"1","pages":"13-27","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/RazzaqueDN07","doi":"10.1007/S10922-006-9051-8","ee":"https://doi.org/10.1007/s10922-006-9051-8","url":"https://dblp.org/rec/journals/jnsm/RazzaqueDN07"}, "url":"URL#5480701" }, { "@score":"1", "@id":"5480702", "info":{"authors":{"author":[{"@pid":"59/6223","text":"Ioanna Roussaki"},{"@pid":"11/5291","text":"Maria Strimpakou"},{"@pid":"71/5564","text":"Carsten Pils"}]},"title":"Distributed Context Retrieval and Consistency Control in Pervasive Computing.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"1","pages":"57-74","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/RoussakiSP07","doi":"10.1007/S10922-006-9053-6","ee":"https://doi.org/10.1007/s10922-006-9053-6","url":"https://dblp.org/rec/journals/jnsm/RoussakiSP07"}, "url":"URL#5480702" }, { "@score":"1", "@id":"5480703", "info":{"authors":{"author":[{"@pid":"05/4635","text":"Giancarlo Ruffo"},{"@pid":"25/2473","text":"Rossano Schifanella"}]},"title":"FairPeers: Efficient Profit Sharing in Fair Peer-to-Peer Market Places.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"3","pages":"355-382","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/RuffoS07","doi":"10.1007/S10922-007-9066-9","ee":"https://doi.org/10.1007/s10922-007-9066-9","url":"https://dblp.org/rec/journals/jnsm/RuffoS07"}, "url":"URL#5480703" }, { "@score":"1", "@id":"5480704", "info":{"authors":{"author":[{"@pid":"62/3732","text":"John Strassner"},{"@pid":"16/508","text":"Declan O'Sullivan"},{"@pid":"80/6593-1","text":"David Lewis 0001"}]},"title":"Ontologies in the Engineering of Management and Autonomic Systems: A Reality Check.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"1","pages":"5-11","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/StrassnerOL07","doi":"10.1007/S10922-006-9058-1","ee":"https://doi.org/10.1007/s10922-006-9058-1","url":"https://dblp.org/rec/journals/jnsm/StrassnerOL07"}, "url":"URL#5480704" }, { "@score":"1", "@id":"5480705", "info":{"authors":{"author":[{"@pid":"40/654","text":"Fábio Luciano Verdi"},{"@pid":"46/1513","text":"Maurício F. Magalhães"},{"@pid":"92/2659","text":"Eleri Cardozo"},{"@pid":"m/EdmundoRobertoMauroMadeira","text":"Edmundo R. M. Madeira"},{"@pid":"28/685","text":"Annikki Welin"}]},"title":"A Service Oriented Architecture-based Approach for Interdomain Optical Network Services.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"2","pages":"141-170","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/VerdiMCMW07","doi":"10.1007/S10922-007-9060-2","ee":"https://doi.org/10.1007/s10922-007-9060-2","url":"https://dblp.org/rec/journals/jnsm/VerdiMCMW07"}, "url":"URL#5480705" }, { "@score":"1", "@id":"5480706", "info":{"authors":{"author":[{"@pid":"07/425","text":"Bruno Bogaz Zarpelão"},{"@pid":"22/1419","text":"Leonardo de Souza Mendes"},{"@pid":"46/6747","text":"Mario Lemes Proença Jr."}]},"title":"Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment.","venue":"J. Netw. Syst. Manag.","volume":"15","number":"2","pages":"267-283","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jnsm/ZarpelaoMP07","doi":"10.1007/S10922-007-9064-Y","ee":"https://doi.org/10.1007/s10922-007-9064-y","url":"https://dblp.org/rec/journals/jnsm/ZarpelaoMP07"}, "url":"URL#5480706" } ] } } } )