IFIP TC6 Open Digital Library

CNSM 2011: Paris, France

7th International Conference on Network and Service Management, CNSM 2011, Paris, France, October 24-28, 2011

IEEE, ISBN: 978-1-4577-1588-4



Contents

Internet Bad Neighborhoods: The spam case.

Giovane Cesar Moreira Moura, Ramin Sadre, Aiko Pras

 1-8

A service management architecture component model.

Jianwen Chen, Rhonda Childress, Iain Mcintosh, George Africa, Arthur Sitaramayya

 1-4

CloudOpt: Multi-goal optimization of application deployments across a cloud.

Jim Zw Li, C. Murray Woodside, John W. Chinneck, Marin Litoiu

 1-9

Peer-assisted network operator-friendly P2P traffic control technique.

HyunYong Lee, Akihiro Nakao

 1-9

Self-adaptive routing in multi-hop sensor networks.

Themistoklis Bourdenas, David Wood, Petros Zerfos, Flávio Bergamaschi, Morris Sloman

 1-9

TARWIS - A testbed management architecture for wireless sensor network testbeds.

Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Thomas Staub, Torsten Braun

 1-4

Self-organizing relays in LTE networks: Queuing analysis and algorithms.

Richard Combes, Zwi Altman, Eitan Altman

 1-8

A unifying architecture for easy development, deployment and management of voice-driven mobile applications.

Jakub Dolezal, Lukas Kencl

 1-5

Collaborative policy-based autonomic management: In a hierarchical model.

Omid Mola, Michael A. Bauer

 1-5

An approach to peer selection in service overlays.

Adriano Fiorese, Paulo Simões, Fernando Boavida

 1-4

Distributed workload and response time management for web applications.

Shengzhi Zhang, Haishan Wu, Wenjie Wang, Bo Yang 0013, Peng Liu 0005, Athanasios V. Vasilakos

 1-9

Adword auction bidding strategies of budget-limited advertisers on competing search engines.

Patrick Maillé, Bruno Tuffin

 1-7

Witnessing Distributed Denial-of-Service traffic from an attacker's network.

Sin-Seok Seo, Young J. Won, James Won-Ki Hong

 1-7

NEPnet: A scalable monitoring system for anomaly detection of network service.

Sujun Cheng, Zhendong Cheng, Zhongzhi Luan, Depei Qian

 1-5

Mitigating the negative impact of preemption on heterogeneous MapReduce workloads.

Lu Cheng, Qi Zhang, Raouf Boutaba

 1-9

Managing a SaaS application in the cloud using PaaS policy sets and a strategy-tree.

Bradley Simmons, Hamoun Ghanbari, Marin Litoiu, Gabriel Iszlai

 1-5

Operator placement with QoS constraints for distributed stream processing.

Yuanqiang Huang, Zhongzhi Luan, Rong He, Depei Qian

 1-7

A remote water sensing system with optical fiber networks.

Yu-Jen Hsu, Chih-Yih Wang, Zi-Wen Wang

 1-5

Realization of name lookup table in routers towards content-centric networks.

Haesung Hwang, Shingo Ata, Masayuki Murata

 1-5

A performance and usability comparison of automated planners for IT change planning.

Sebastian Hagen, Alfons Kemper

 1-9

Control and visualization system for managed self-organization network.

Shohei Kamamura, Yuki Koizumi, Takashi Miyamura, Shin'ichi Arakawa, Kohei Shiomoto, Masayuki Murata

 1-4

Hotspot diagnosis on logical level.

Bo Yang 0013, Hendrik F. Hamann, Jeffrey O. Kephart, Stephan Barabasi

 1-5

Service deactivation aware placement and defragmentation in enterprise clouds.

Sourav Dutta, Akshat Verma

 1-9

An ontology-driven approach to support wireless network monitoring for home area networks.

Yuqian Song, John Keeney, Owen Conlan, Philip Perry, Adriana Hava

 1-7

Verifying home network bandwidth sharing plans.

Dimosthenis Pediaditakis, Naranker Dulay

 1-9

Introducing energy-awareness in Traffic Engineering for Future Networks.

George Athanasiou, Kostas Tsagkaris, Panagiotis Vlacheas, Panagiotis Demestichas

 1-4

Scalable root cause analysis assisted by classified alarm information model based algorithm.

Masanori Miyazawa, Kosuke Nishimura

 1-4

Fault management and service provisioning process model of next generation access networks.

Carmen Mas Machuca, Sandro Kraus, Koen Casier

 1-6

Dynamic service adaptation for plug and play device interoperability.

Charbel El Kaed, Yves Denneulin, François-Gaël Ottogalli

 1-9

Integrated management of network and security devices in IT infrastructures.

Bart Van Brabant, Wouter Joosen

 1-5

Functional components for a Security Manager within future Inter-Cloud environments.

Michael Kretzschmar, Mario Golling

 1-5

Performance analysis of SNMP in OLSRv2-routed MANETs.

Ulrich Herberg, Robert G. Cole, Jiazi Yi

 1-5

Universal economic analysis for IT transformation.

Chang-Shing Perng, Rong N. Chang, Tao Tao, Edward So, Mihwa Choi, Hidayatullah Shaikh

 1-4

Monitoring, aggregation and filtering for efficient management of virtual networks.

Stuart Clayman, Richard G. Clegg, Lefteris Mamatas, George Pavlou, Alex Galis

 1-7

Outsourced management of home and SOHO Windows desktops.

Tiago Cruz, Paulo Simões, João Rodrigues, Edmundo Monteiro, Fernando Bastos

 1-7

AMF configurations: Checking for service protection using heuristics.

Pejman Salehi, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe

 1-8

Policy refinement: Decomposition and operationalization for dynamic domains.

Robert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman

 1-9

Autonomic downlink inter-cell interference coordination in LTE Self-Organizing Networks.

Panagiotis Vlacheas, Evangelos D. Thomatos, Kostas Tsagkaris, Panagiotis Demestichas

 1-5

A web-based what-if scenario analysis tool for performance improvement of IT support organizations.

Claudio Bartolini, Cesare Stefanelli, Davide Targa, Mauro Tortonesi

 1-5

Supporting vulnerability awareness in autonomic networks and systems with OVAL.

Martín Barrère, Remi Badonnel, Olivier Festor

 1-8

Multihop cellular network optimization using genetic algorithms.

Velmurugan Ayyadurai, Klaus Moessner, Rahim Tafazolli

 1-5

Gossip-based resource allocation for green computing in large clouds.

Rerngvit Yanggratoke, Fetahi Wuhib, Rolf Stadler

 1-9

Towards decentralized and adaptive network resource management.

Daphné Tuncer, Marinos Charalambides, George Pavlou, Ning Wang

 1-6

Online workflow management and performance analysis with Stampede.

Dan Gunter, Ewa Deelman, Taghrid Samak, Christopher X. Brooks, Monte Goode, Gideon Juve, Gaurang Mehta, Priscilla Moraes, Fabio Silva, D. Martin Swany, Karan Vahi

 1-10

MODE: Mix Driven On-line Resource Demand Estimation.

Amir Kalbasi, Diwakar Krishnamurthy, Jerry Rolia, Michael Richter

 1-9

Modeling and simulation of DiffServ scenarios with the NSDL framework.

Eduardo M. D. Marques, Jose J. F. Sousa, Paulo Nazareno Maia Sampaio

 1-4

A bi-criteria algorithm for multipoint-to-multipoint virtual connections in transport networks.

Lúcia Martins, Nuno Ferreira, José M. F. Craveirinha

 1-5

Adaptive QoE measurement on videostreaming IP services.

José A. Lozano, Alfonso Castro, Beatriz Fuentes, Juan Manuel González, Alvaro Rodríguez

 1-4

An autonomic open marketplace for service management and resilience.

Haydn Mearns, John Leaney, Artem Parakhine, John K. Debenham, Dominique Verchère

 1-5

A trace-based service level planning framework for enterprise application clouds.

Anas Youssef, Diwakar Krishnamurthy

 1-5

On synthesizing distributed firewall configurations considering risk, usability and cost constraints.

Bin Zhang 0007, Ehab Al-Shaer

 1-8

Criticality avoidance: A new paradigm for congestion control based on science of phase transition.

Siun-Chuon Mau, Akshay Vashist, Alexander Poylisher, Ritu Chadha, Cho-Yu Jason Chiang

 1-6

Adaptive terminal reporting for scalable service quality monitoring in large networks.

Jan Groenendijk, Yangcheng Huang, Liam Fallon

 1-5

Simulation based evaluation of dynamic resource allocation for adaptive multimedia services.

Krunoslav Ivesic, Maja Matijasevic, Lea Skorin-Kapov

 1-4

Research on Home NodeB Gateway load balancing mechanism.

Xiaojie Wang, Lanlan Rui, Peng Yu, Xingyu Chen

 1-5

QoS based service provisioning in NGN/NGS context.

Soumia Kessal, Noëmie Simoni

 1-5

Unleashing the power of policies for service-oriented computing.

Carlos Alberto Kamienski, Ramide Dantas, Ernani Azevedo, Cyrus Dias, Djamel Sadok, Börje Ohlman

 1-5

Enforcing security with behavioral fingerprinting.

Jérôme François, Radu State, Thomas Engel, Olivier Festor

 1-9

SMURFEN: A system framework for rule sharing collaborative intrusion detection.

Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar

 1-6

Autonomic management of workflows on hybrid Grid-Cloud infrastructure.

Giuseppe Papuzzo, Giandomenico Spezzano

 1-4

Automated service provisioning and management for integrated femtocell/Wi-Fi and cellular networks.

Ya-Shian Wang, Chin-Ping Chuang, Kuan-Hsiung Liang, Been-Hwang Liao, Shou-Yi Cheng

 1-5

Reasoning services for security and energy management in wireless sensor networks.

Maïssa Mbaye, Hicham Khalife, Francine Krief

 1-5

Towards green computing using diskless high performance clusters.

K. Salah, R. Al-Shaikh, M. Sindi

 1-4

Scalable deterministic end-to-end probing and analytical method for overlay network monitoring.

Yanjie Ren, Yan Qiao, Xuesong Qiu, Shun-an Wu

 1-5

A probe prediction approach to overlay network monitoring.

Shun-an Wu, Qiao Yan, Xuesong Qiu, Yanjie Ren

 1-5

Automatic detection of sub-optimal performance in UMTS networks based on drive-test measurements.

Oriol Sallent, Jordi Pérez-Romero, Juan Sanchez-Gonzalez, Ramón Agustí, Miguel Ángel Díaz-Guerra, David Henche, Daniel Paul

 1-4

Towards self-adaptive management frameworks: The case of aggregated information monitoring.

Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti

 1-5

Towards introspectable, adaptable and extensible autonomic managers.

Yoann Maurel, Philippe Lalanda, Ada Diaconescu

 1-5

A comparison between divergence measures for network anomaly detection.

Jean Tajer, Ali Makke, Osman Salem, Ahmed Mehaoua

 1-5

Sub-Space clustering, Inter-Clustering Results Association & anomaly correlation for unsupervised network anomaly detection.

Johan Mazel, Pedro Casas, Yann Labit, Philippe Owezarski

 1-8

Towards a security framework for a WS-HumanTask processor.

Michael Gerhards, Sascha Skorupa, Volker Sander, P. Pfeiffer, Adam Belloum

 1-5

Securing P2P systems from Sybil attacks through adaptive identity management.

Weverton Luis da Costa Cordeiro, Flavio Roberto Santos, Gustavo Huff Mauch, Marinho P. Barcellos, Luciano Paschoal Gaspary

 1-6

Monitoring network topology dynamism of large-scale traceroute-based measurements.

Thomas Bourgeau

 1-5

Using strategy trees in change management in clouds.

Hiroshi Otsuka, Hanan Lutfiyya

 1-9

Cross-layer cluster-based data dissemination for failure detection in MANETs.

David Kidston, Li Li 0009, Walee Al Mamun, Hanan Lutfiyya

 1-7

Policy-assisted planning and deployment of virtual networks.

Steven Davy, Joan Serrat, Antonio Astorga, Brendan Jennings, Javier Rubio-Loyola

 1-8

Assessing RoQ attacks on MANETs over aware and unaware TPC techniques.

Urlan Barros, Mathieu Bouet, Aldri Luiz dos Santos, Michele Nogueira

 1-5

Performance management and quantitative modeling of IT service processes using mashup patterns.

Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Winnie Cheng, David Loewenstern, Larisa Shwartz, Nikos Anerousis

 1-9

Semi-automated data center hotspot diagnosis.

Suzanne McIntosh, Jeffrey O. Kephart, Jonathan Lenchner, B. Yang, Metin Feridun, M. Nidd, Axel Tanner, I. Barabasi

 1-7

Staffing optimization in complex service delivery systems.

Yixin Diao, Aliza Heching

 1-9

A unified approach to coordinated energy-management in data centers.

Rajarshi Das, Srinivas Yarlanki, Hendrik F. Hamann, Jeffrey O. Kephart, Vanessa Lopez

 1-5

Increasing data center network visibility with cisco NetFlow-Lite.

Luca Deri, Ellie Chou, Zach Cherian, Kedar Karmarkar, Mike Patterson

 1-6

Application-defined control of virtual networks over IP-optical networks.

Akeo Masuda, Akinori Isogai, Takashi Miyamura, Kohei Shiomoto, Atsushi Hiramatsu

 1-6

A 100Gig network processor platform for openflow.

Omar El Ferkouss, Ilyas Snaiki, Omar Mounaouar, Hamza Dahmouni, Racha Ben Ali, Yves Lemieux, Omar Cherkaoui

 1-4