Author |
Start page |
Title |
A A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Abboud, Osama |
147 |
Volume is Not Enough: SVC-aware Server Allocation for Peer-assisted Streaming |
Ahmed, Reaz |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
Al-Haj, Saeed |
51 |
A Formal Approach for Virtual Machine Migration Planning |
Al-Hamadi, Hamid |
203 |
Adaptive Network Management for Countering Selective Capture in Wireless Sensor Networks |
Al-Shaer, Ehab |
51 |
A Formal Approach for Virtual Machine Migration Planning |
Anderson, Paul |
156 |
Choreographing Configuration Changes |
Andreolini, Mauro |
67 |
Real-Time Adaptive Algorithm for Resource Monitoring |
Assunção, Marcos |
84 |
Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services |
B A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Badonnel, Remi |
235 |
A Probabilistic Cost-efficient Approach for Mobile Security Assessment |
Bajpai, Vaibhav |
130 |
Measuring TCP Connection Establishment Times of Dual-Stacked Web Services |
Barcellos, Marinho |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
Bari, Md. Faizul |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
Barlet-Ros, Pere |
260 |
Analysis of YouTube User Experience From Passive Measurements |
Barrère, Martín |
235 |
A Probabilistic Cost-efficient Approach for Mobile Security Assessment |
Bartoš, Václav |
227 |
Towards Real-Time Intrusion Detection for NetFlow and IPFIX |
Bauer, Michael |
166 |
A Distributed Approach to Dynamic VM Management |
Bays, Leonardo |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
Berryman, Alex |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
Berthou, Pascal |
175 |
Assessment and Event Based Analysis of Dynamic Wireless Networks |
Bianchi, Silvia |
84 |
Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services |
Boeglin, Alexandre |
268 |
Efficient Distributed Monitoring in 6LoWPAN Networks |
Bogojeska, Jasmina |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
Bouet, Mathieu |
122 |
Monitoring Latency with OpenFlow |
Bouillard, Anne |
126 |
Impact of Rare Alarms on Event Correlation |
Boutaba, Raouf |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
161 |
Joint Optimization for the Delivery of Multiple Video Channels in Telco-CDN |
Breitgand, David |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
Buriol, Luciana |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
C A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Cadime, Ricardo |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
Caggiani Luizelli, Marcelo |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
Calyam, Prasad |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
Carle, Georg |
211 |
CoMaDa: An Adaptive Framework with Graphical Support for Configuration, Management, and Data Handling Tasks for Wireless Sensor Networks |
Carvalho, Márcio |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
Carvin, Denis |
175 |
Assessment and Event Based Analysis of Dynamic Wireless Networks |
Casalino, Matteo |
243 |
Refactoring Multi-Layered Access Control Policies Through (De)Composition |
Chadha, Ritu |
189 |
Reliability Estimation in Mobile Ad Hoc Networks |
Charalambides, Marinos |
26 |
More Control Over Network Resources: An ISP Caching Perspective |
Chen, Ing-Ray |
203 |
Adaptive Network Management for Countering Selective Capture in Wireless Sensor Networks |
Chowdhury, Shihabur |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
Ciocarlie, Gabriela |
171 |
Detecting Anomalies in Cellular Networks Using an Ensemble Method |
Clemm, Alexander |
251 |
Scalable Matching and Ranking for Network Search |
Clímaco, João |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
Colajanni, Michele |
67 |
Real-Time Adaptive Algorithm for Resource Monitoring |
Craveirinha, José |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
D A B C D E F G H I J K L M N O P R S T U V W X Y Z |
De Turck, Filip |
1 |
A Scalable Approach for Structuring Large-Scale Hierarchical Cloud Management Systems |
Diao, Yixin |
185 |
SLA Impact Modeling for Service Engagement |
Dimopoulos, Giorgos |
260 |
Analysis of YouTube User Experience From Passive Measurements |
Dreo Rodosek, Gabi |
134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
219 |
Thwarting Attacks on ZigBee - Removal of the KillerBee |
E A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Engel, Thomas |
105 |
Automated Source Code Extension for Debugging of OpenFlow Based Networks |
Epstein, Amir |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
Esteves, Rafael |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
F A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Festor, Olivier |
235 |
A Probabilistic Cost-efficient Approach for Mobile Security Assessment |
268 |
Efficient Distributed Monitoring in 6LoWPAN Networks |
Freitag, André |
211 |
CoMaDa: An Adaptive Framework with Graphical Support for Configuration, Management, and Data Handling Tasks for Wireless Sensor Networks |
G A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Garcés-Erice, Luis |
109 |
Guaranteeing Consistency Between Large Replicated Writable Disk Images |
Gaspary, Luciano Paschoal |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
Giurgiu, Ioana |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
Glikson, Alex |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
Grabarnik, Genady |
143 |
Identifying Missed Monitoring Alerts Based on Unstructured Incident Tickets |
Granville, Lisandro |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
Groenendijk, Jan |
114 |
Optimizing Crowd Based Monitoring in Large Scale Mobile Networks |
Guan, Lu |
198 |
Efficient Probing Method for Active Diagnosis in Large Scale Network |
H A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Hausheer, David |
147 |
Volume is Not Enough: SVC-aware Server Allocation for Peer-assisted Streaming |
Hermann, Frank |
105 |
Automated Source Code Extension for Debugging of OpenFlow Based Networks |
Herry, Herry |
156 |
Choreographing Configuration Changes |
Hofstede, Rick |
227 |
Towards Real-Time Intrusion Detection for NetFlow and IPFIX |
Hommes, Stefan |
105 |
Automated Source Code Extension for Debugging of OpenFlow Based Networks |
Huang, Yangcheng |
114 |
Optimizing Crowd Based Monitoring in Large Scale Mobile Networks |
Hurel, Gaëtan |
235 |
A Probabilistic Cost-efficient Approach for Mobile Security Assessment |
I A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Israel, Assaf |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
J A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Jennings, Brendan |
138 |
Gravitational Networks: Self-Organizing Network Topologies Into Hierarchically Structured Domains |
Johnsson, Martin |
138 |
Gravitational Networks: Self-Organizing Network Topologies Into Hierarchically Structured Domains |
Junier, Aurore |
126 |
Impact of Rare Alarms on Event Correlation |
K A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Keller, Gaston |
166 |
A Distributed Approach to Dynamic VM Management |
Koht-arsa, Kasom |
118 |
A Design and Implementation of Dual-Stack Aware Authentication System for Enterprise Captive Portal |
Kremer, Guillaume |
175 |
Assessment and Event Based Analysis of Dynamic Wireless Networks |
Kriara, Lito |
75 |
Pazl: A Mobile Crowdsensing Based Indoor WiFi Monitoring System |
Kulkarni, Shweta |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
L A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Lahmadi, Abdelkader |
268 |
Efficient Distributed Monitoring in 6LoWPAN Networks |
Lam, Linh |
185 |
SLA Impact Modeling for Service Engagement |
Landa, Raul |
26 |
More Control Over Network Resources: An ISP Caching Perspective |
Lanyi, David |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
Li, Tao |
143 |
Identifying Missed Monitoring Alerts Based on Unstructured Incident Tickets |
Lindqvist, Ulf |
171 |
Detecting Anomalies in Cellular Networks Using an Ensemble Method |
Liu, Jiayi |
161 |
Joint Optimization for the Delivery of Multiple Video Channels in Telco-CDN |
Lopes, João |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
Lutfiyya, Hanan |
166 |
A Distributed Approach to Dynamic VM Management |
M A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Marina, Mahesh |
75 |
Pazl: A Mobile Crowdsensing Based Indoor WiFi Monitoring System |
Martins, Lúcia |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
Moens, Hendrik |
1 |
A Scalable Approach for Structuring Large-Scale Hierarchical Cloud Management Systems |
Mónica, Catarina |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
N A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Netto, Marco |
84 |
Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services |
Northcutt, David |
185 |
SLA Impact Modeling for Service Engagement |
Nováczki, Szabolcs |
171 |
Detecting Anomalies in Cellular Networks Using an Ensemble Method |
O A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Owezarski, Philippe |
175 |
Assessment and Event Based Analysis of Dynamic Wireless Networks |
P A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Pavlou, George |
26 |
More Control Over Network Resources: An ISP Caching Perspective |
Phemius, Kévin |
122 |
Monitoring Latency with OpenFlow |
Pietri, Marcello |
67 |
Real-Time Adaptive Algorithm for Resource Monitoring |
Poylisher, Alexander |
189 |
Reliability Estimation in Mobile Ad Hoc Networks |
Pras, Aiko |
152 |
Lightweight Link Dimensioning Using sFlow Sampling |
227 |
Towards Real-Time Intrusion Detection for NetFlow and IPFIX |
R A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Radu, Valentin |
75 |
Pazl: A Mobile Crowdsensing Based Indoor WiFi Monitoring System |
Ramnath, Rajiv |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
Rappaport, Assaf |
92 |
Update Aware Replica Placement |
Raz, Danny |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
92 |
Update Aware Replica Placement |
Rodrigues, Guilherme |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
Ronot, Benoit |
126 |
Impact of Rare Alarms on Event Correlation |
Rooney, Sean |
109 |
Guaranteeing Consistency Between Large Replicated Writable Disk Images |
Rovatsos, Michael |
156 |
Choreographing Configuration Changes |
Roy, Arup |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
Rückert, Julius |
147 |
Volume is Not Enough: SVC-aware Server Allocation for Peer-assisted Streaming |
S A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Sadre, Ramin |
152 |
Lightweight Link Dimensioning Using sFlow Sampling |
Sanguanpong, Surasak |
118 |
A Design and Implementation of Dual-Stack Aware Authentication System for Enterprise Captive Portal |
Sanjuàs-Cuxart, Josep |
260 |
Analysis of YouTube User Experience From Passive Measurements |
Sanneck, Henning |
171 |
Detecting Anomalies in Cellular Networks Using an Ensemble Method |
Schmidt, Ricardo |
152 |
Lightweight Link Dimensioning Using sFlow Sampling |
Schmitt, Corinna |
211 |
CoMaDa: An Adaptive Framework with Graphical Support for Configuration, Management, and Data Handling Tasks for Wireless Sensor Networks |
Schönwälder, Jürgen |
130 |
Measuring TCP Connection Establishment Times of Dual-Stacked Web Services |
134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
Seeber, Sebastian |
134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
Sehgal, Anuj |
134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
Serban, Constantin |
189 |
Reliability Estimation in Mobile Ad Hoc Networks |
Shwartz, Larisa |
143 |
Identifying Missed Monitoring Alerts Based on Unstructured Incident Tickets |
185 |
SLA Impact Modeling for Service Engagement |
Simon, Gwendal |
161 |
Joint Optimization for the Delivery of Multiple Video Channels in Telco-CDN |
Sperotto, Anna |
152 |
Lightweight Link Dimensioning Using sFlow Sampling |
227 |
Towards Real-Time Intrusion Detection for NetFlow and IPFIX |
Springer, Gordon |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
Sridharan, Mukundan |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
Stadler, Rolf |
251 |
Scalable Matching and Ranking for Network Search |
Stark, George |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
State, Radu |
105 |
Automated Source Code Extension for Debugging of OpenFlow Based Networks |
Stelte, Björn |
134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
219 |
Thwarting Attacks on ZigBee - Removal of the KillerBee |
Su, Yulin |
193 |
Dynamic Multi-stage Energy-Saving Management Mechanism Based on Base Station Cooperation |
T A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Tang, Liang |
143 |
Identifying Missed Monitoring Alerts Based on Unstructured Incident Tickets |
Tarouco, Liane |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
Thion, Romuald |
243 |
Refactoring Multi-Layered Access Control Policies Through (De)Composition |
Tighe, Michael |
166 |
A Distributed Approach to Dynamic VM Management |
Tosi, Stefania |
67 |
Real-Time Adaptive Algorithm for Resource Monitoring |
Tuncer, Daphne |
26 |
More Control Over Network Resources: An ISP Caching Perspective |
U A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Uddin, Misbah |
251 |
Scalable Matching and Ranking for Network Search |
W A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Wang, Ying |
198 |
Efficient Probing Method for Active Diagnosis in Large Scale Network |
Wenjing, Li |
193 |
Dynamic Multi-stage Energy-Saving Management Mechanism Based on Base Station Cooperation |
198 |
Efficient Probing Method for Active Diagnosis in Large Scale Network |
Wiesmann, Dorothea |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
X A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Xue-song, Qiu |
193 |
Dynamic Multi-stage Energy-Saving Management Mechanism Based on Base Station Cooperation |
Y A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Yan, Congxian |
198 |
Efficient Probing Method for Active Diagnosis in Large Scale Network |
Yu, Peng |
193 |
Dynamic Multi-stage Energy-Saving Management Mechanism Based on Base Station Cooperation |
Z A B C D E F G H I J K L M N O P R S T U V W X Y Z |
Zhang, Qi |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
Zhani, Mohamed Faten |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
Zhou, Fen |
161 |
Joint Optimization for the Delivery of Multiple Video Channels in Telco-CDN |
Zhu, Kunpeng |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |