| Author |
Start page |
Title |
A A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Abboud, Osama |
147 |
Volume is Not Enough: SVC-aware Server Allocation for Peer-assisted Streaming |
| Ahmed, Reaz |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
| Al-Haj, Saeed |
51 |
A Formal Approach for Virtual Machine Migration Planning |
| Al-Hamadi, Hamid |
203 |
Adaptive Network Management for Countering Selective Capture in Wireless Sensor Networks |
| Al-Shaer, Ehab |
51 |
A Formal Approach for Virtual Machine Migration Planning |
| Anderson, Paul |
156 |
Choreographing Configuration Changes |
| Andreolini, Mauro |
67 |
Real-Time Adaptive Algorithm for Resource Monitoring |
| Assunção, Marcos |
84 |
Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services |
B A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Badonnel, Remi |
235 |
A Probabilistic Cost-efficient Approach for Mobile Security Assessment |
| Bajpai, Vaibhav |
130 |
Measuring TCP Connection Establishment Times of Dual-Stacked Web Services |
| Barcellos, Marinho |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
| Bari, Md. Faizul |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
| Barlet-Ros, Pere |
260 |
Analysis of YouTube User Experience From Passive Measurements |
| Barrère, Martín |
235 |
A Probabilistic Cost-efficient Approach for Mobile Security Assessment |
| Bartoš, Václav |
227 |
Towards Real-Time Intrusion Detection for NetFlow and IPFIX |
| Bauer, Michael |
166 |
A Distributed Approach to Dynamic VM Management |
| Bays, Leonardo |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
| Berryman, Alex |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
| Berthou, Pascal |
175 |
Assessment and Event Based Analysis of Dynamic Wireless Networks |
| Bianchi, Silvia |
84 |
Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services |
| Boeglin, Alexandre |
268 |
Efficient Distributed Monitoring in 6LoWPAN Networks |
| Bogojeska, Jasmina |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
| Bouet, Mathieu |
122 |
Monitoring Latency with OpenFlow |
| Bouillard, Anne |
126 |
Impact of Rare Alarms on Event Correlation |
| Boutaba, Raouf |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
| 161 |
Joint Optimization for the Delivery of Multiple Video Channels in Telco-CDN |
| Breitgand, David |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
| Buriol, Luciana |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
C A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Cadime, Ricardo |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
| Caggiani Luizelli, Marcelo |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
| Calyam, Prasad |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
| Carle, Georg |
211 |
CoMaDa: An Adaptive Framework with Graphical Support for Configuration, Management, and Data Handling Tasks for Wireless Sensor Networks |
| Carvalho, Márcio |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
| Carvin, Denis |
175 |
Assessment and Event Based Analysis of Dynamic Wireless Networks |
| Casalino, Matteo |
243 |
Refactoring Multi-Layered Access Control Policies Through (De)Composition |
| Chadha, Ritu |
189 |
Reliability Estimation in Mobile Ad Hoc Networks |
| Charalambides, Marinos |
26 |
More Control Over Network Resources: An ISP Caching Perspective |
| Chen, Ing-Ray |
203 |
Adaptive Network Management for Countering Selective Capture in Wireless Sensor Networks |
| Chowdhury, Shihabur |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
| Ciocarlie, Gabriela |
171 |
Detecting Anomalies in Cellular Networks Using an Ensemble Method |
| Clemm, Alexander |
251 |
Scalable Matching and Ranking for Network Search |
| Clímaco, João |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
| Colajanni, Michele |
67 |
Real-Time Adaptive Algorithm for Resource Monitoring |
| Craveirinha, José |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
D A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| De Turck, Filip |
1 |
A Scalable Approach for Structuring Large-Scale Hierarchical Cloud Management Systems |
| Diao, Yixin |
185 |
SLA Impact Modeling for Service Engagement |
| Dimopoulos, Giorgos |
260 |
Analysis of YouTube User Experience From Passive Measurements |
| Dreo Rodosek, Gabi |
134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
| 219 |
Thwarting Attacks on ZigBee - Removal of the KillerBee |
E A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Engel, Thomas |
105 |
Automated Source Code Extension for Debugging of OpenFlow Based Networks |
| Epstein, Amir |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
| Esteves, Rafael |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
F A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Festor, Olivier |
235 |
A Probabilistic Cost-efficient Approach for Mobile Security Assessment |
| 268 |
Efficient Distributed Monitoring in 6LoWPAN Networks |
| Freitag, André |
211 |
CoMaDa: An Adaptive Framework with Graphical Support for Configuration, Management, and Data Handling Tasks for Wireless Sensor Networks |
G A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Garcés-Erice, Luis |
109 |
Guaranteeing Consistency Between Large Replicated Writable Disk Images |
| Gaspary, Luciano Paschoal |
42 |
Characterizing the Impact of Network Substrate Topologies on Virtual Network Embedding |
| Giurgiu, Ioana |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
| Glikson, Alex |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
| Grabarnik, Genady |
143 |
Identifying Missed Monitoring Alerts Based on Unstructured Incident Tickets |
| Granville, Lisandro |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
| Groenendijk, Jan |
114 |
Optimizing Crowd Based Monitoring in Large Scale Mobile Networks |
| Guan, Lu |
198 |
Efficient Probing Method for Active Diagnosis in Large Scale Network |
H A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Hausheer, David |
147 |
Volume is Not Enough: SVC-aware Server Allocation for Peer-assisted Streaming |
| Hermann, Frank |
105 |
Automated Source Code Extension for Debugging of OpenFlow Based Networks |
| Herry, Herry |
156 |
Choreographing Configuration Changes |
| Hofstede, Rick |
227 |
Towards Real-Time Intrusion Detection for NetFlow and IPFIX |
| Hommes, Stefan |
105 |
Automated Source Code Extension for Debugging of OpenFlow Based Networks |
| Huang, Yangcheng |
114 |
Optimizing Crowd Based Monitoring in Large Scale Mobile Networks |
| Hurel, Gaëtan |
235 |
A Probabilistic Cost-efficient Approach for Mobile Security Assessment |
I A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Israel, Assaf |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
J A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Jennings, Brendan |
138 |
Gravitational Networks: Self-Organizing Network Topologies Into Hierarchically Structured Domains |
| Johnsson, Martin |
138 |
Gravitational Networks: Self-Organizing Network Topologies Into Hierarchically Structured Domains |
| Junier, Aurore |
126 |
Impact of Rare Alarms on Event Correlation |
K A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Keller, Gaston |
166 |
A Distributed Approach to Dynamic VM Management |
| Koht-arsa, Kasom |
118 |
A Design and Implementation of Dual-Stack Aware Authentication System for Enterprise Captive Portal |
| Kremer, Guillaume |
175 |
Assessment and Event Based Analysis of Dynamic Wireless Networks |
| Kriara, Lito |
75 |
Pazl: A Mobile Crowdsensing Based Indoor WiFi Monitoring System |
| Kulkarni, Shweta |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
L A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Lahmadi, Abdelkader |
268 |
Efficient Distributed Monitoring in 6LoWPAN Networks |
| Lam, Linh |
185 |
SLA Impact Modeling for Service Engagement |
| Landa, Raul |
26 |
More Control Over Network Resources: An ISP Caching Perspective |
| Lanyi, David |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
| Li, Tao |
143 |
Identifying Missed Monitoring Alerts Based on Unstructured Incident Tickets |
| Lindqvist, Ulf |
171 |
Detecting Anomalies in Cellular Networks Using an Ensemble Method |
| Liu, Jiayi |
161 |
Joint Optimization for the Delivery of Multiple Video Channels in Telco-CDN |
| Lopes, João |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
| Lutfiyya, Hanan |
166 |
A Distributed Approach to Dynamic VM Management |
M A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Marina, Mahesh |
75 |
Pazl: A Mobile Crowdsensing Based Indoor WiFi Monitoring System |
| Martins, Lúcia |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
| Moens, Hendrik |
1 |
A Scalable Approach for Structuring Large-Scale Hierarchical Cloud Management Systems |
| Mónica, Catarina |
34 |
Network Performance Improvement Through Evaluation of Bicriteria Routing Methods in Transport Networks |
N A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Netto, Marco |
84 |
Leveraging Attention Scarcity to Improve the Overall User Experience of Cloud Services |
| Northcutt, David |
185 |
SLA Impact Modeling for Service Engagement |
| Nováczki, Szabolcs |
171 |
Detecting Anomalies in Cellular Networks Using an Ensemble Method |
O A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Owezarski, Philippe |
175 |
Assessment and Event Based Analysis of Dynamic Wireless Networks |
P A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Pavlou, George |
26 |
More Control Over Network Resources: An ISP Caching Perspective |
| Phemius, Kévin |
122 |
Monitoring Latency with OpenFlow |
| Pietri, Marcello |
67 |
Real-Time Adaptive Algorithm for Resource Monitoring |
| Poylisher, Alexander |
189 |
Reliability Estimation in Mobile Ad Hoc Networks |
| Pras, Aiko |
152 |
Lightweight Link Dimensioning Using sFlow Sampling |
| 227 |
Towards Real-Time Intrusion Detection for NetFlow and IPFIX |
R A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Radu, Valentin |
75 |
Pazl: A Mobile Crowdsensing Based Indoor WiFi Monitoring System |
| Ramnath, Rajiv |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
| Rappaport, Assaf |
92 |
Update Aware Replica Placement |
| Raz, Danny |
9 |
Network Aware Virtual Machine and Image Placement in a Cloud |
| 92 |
Update Aware Replica Placement |
| Rodrigues, Guilherme |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
| Ronot, Benoit |
126 |
Impact of Rare Alarms on Event Correlation |
| Rooney, Sean |
109 |
Guaranteeing Consistency Between Large Replicated Writable Disk Images |
| Rovatsos, Michael |
156 |
Choreographing Configuration Changes |
| Roy, Arup |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
| Rückert, Julius |
147 |
Volume is Not Enough: SVC-aware Server Allocation for Peer-assisted Streaming |
S A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Sadre, Ramin |
152 |
Lightweight Link Dimensioning Using sFlow Sampling |
| Sanguanpong, Surasak |
118 |
A Design and Implementation of Dual-Stack Aware Authentication System for Enterprise Captive Portal |
| Sanjuàs-Cuxart, Josep |
260 |
Analysis of YouTube User Experience From Passive Measurements |
| Sanneck, Henning |
171 |
Detecting Anomalies in Cellular Networks Using an Ensemble Method |
| Schmidt, Ricardo |
152 |
Lightweight Link Dimensioning Using sFlow Sampling |
| Schmitt, Corinna |
211 |
CoMaDa: An Adaptive Framework with Graphical Support for Configuration, Management, and Data Handling Tasks for Wireless Sensor Networks |
| Schönwälder, Jürgen |
130 |
Measuring TCP Connection Establishment Times of Dual-Stacked Web Services |
| 134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
| Seeber, Sebastian |
134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
| Sehgal, Anuj |
134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
| Serban, Constantin |
189 |
Reliability Estimation in Mobile Ad Hoc Networks |
| Shwartz, Larisa |
143 |
Identifying Missed Monitoring Alerts Based on Unstructured Incident Tickets |
| 185 |
SLA Impact Modeling for Service Engagement |
| Simon, Gwendal |
161 |
Joint Optimization for the Delivery of Multiple Video Channels in Telco-CDN |
| Sperotto, Anna |
152 |
Lightweight Link Dimensioning Using sFlow Sampling |
| 227 |
Towards Real-Time Intrusion Detection for NetFlow and IPFIX |
| Springer, Gordon |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
| Sridharan, Mukundan |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |
| Stadler, Rolf |
251 |
Scalable Matching and Ranking for Network Search |
| Stark, George |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
| State, Radu |
105 |
Automated Source Code Extension for Debugging of OpenFlow Based Networks |
| Stelte, Björn |
134 |
Towards a Trust Computing Architecture for RPL in Cyber Physical Systems |
| 219 |
Thwarting Attacks on ZigBee - Removal of the KillerBee |
| Su, Yulin |
193 |
Dynamic Multi-stage Energy-Saving Management Mechanism Based on Base Station Cooperation |
T A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Tang, Liang |
143 |
Identifying Missed Monitoring Alerts Based on Unstructured Incident Tickets |
| Tarouco, Liane |
180 |
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools |
| Thion, Romuald |
243 |
Refactoring Multi-Layered Access Control Policies Through (De)Composition |
| Tighe, Michael |
166 |
A Distributed Approach to Dynamic VM Management |
| Tosi, Stefania |
67 |
Real-Time Adaptive Algorithm for Resource Monitoring |
| Tuncer, Daphne |
26 |
More Control Over Network Resources: An ISP Caching Perspective |
U A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Uddin, Misbah |
251 |
Scalable Matching and Ranking for Network Search |
W A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Wang, Ying |
198 |
Efficient Probing Method for Active Diagnosis in Large Scale Network |
| Wenjing, Li |
193 |
Dynamic Multi-stage Energy-Saving Management Mechanism Based on Base Station Cooperation |
| 198 |
Efficient Probing Method for Active Diagnosis in Large Scale Network |
| Wiesmann, Dorothea |
59 |
Classifying Server Behavior and Predicting Impact of Modernization Actions |
X A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Xue-song, Qiu |
193 |
Dynamic Multi-stage Energy-Saving Management Mechanism Based on Base Station Cooperation |
Y A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Yan, Congxian |
198 |
Efficient Probing Method for Active Diagnosis in Large Scale Network |
| Yu, Peng |
193 |
Dynamic Multi-stage Energy-Saving Management Mechanism Based on Base Station Cooperation |
Z A B C D E F G H I J K L M N O P R S T U V W X Y Z |
| Zhang, Qi |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
| Zhani, Mohamed Faten |
18 |
Dynamic Controller Provisioning in Software Defined Networks |
| Zhou, Fen |
161 |
Joint Optimization for the Delivery of Multiple Video Channels in Telco-CDN |
| Zhu, Kunpeng |
100 |
OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring |