| 2010 | A Service Oriented Architecture for achieving QoSaware Workflow Management in Virtualized Environments. Spyridon V. Gogouvitis, Kleopatra Konstanteli, George Kousiouris, Gregory Katsaros, Dimosthenis Kyriazis, Theodora A. Varvarigou |
| 2010 | A cluster-based negotiation model for task allocation in Wireless Sensor Network. Yukun Li, Zhipeng Gao, Yang Yang, Zhili Guan, Xingyu Chen, Xuesong Qiu |
| 2010 | A deployment framework for self-contained policies. Marwan Cheaito, Romain Laborde, François Barrère, Abdelmalek Benzekri |
| 2010 | A distributed relay selection algorithm for cognitive radio ad-hoc networks. Yun Li, Ruifeng Zhang, Chonggang Wang, Ali Daneshmand, Xiaohu You |
| 2010 | A flow-based anomaly detection method using sketch and combinations of traffic features. Shuying Chang, Xuesong Qiu, Zhipeng Gao, Ke Liu, Feng Qi |
| 2010 | A framework for context-driven end-to-end QoS control in Converged Networks. Suleiman Y. Yerima, Gerard P. Parr, Cathryn Peoples, Sally I. McClean, Philip J. Morrow |
| 2010 | A framework for self-configuration on WMNs aware of performance and security issues. Helber Wagner da Silva, Raimir Holanda, Aldri Luiz dos Santos, Michele Nogueira Lima |
| 2010 | A network service platform providing stable QoS based on dynamic allocation of distributed components. Kazuhiko Kinoshita, Naosuke Yokoe, Yusuke Hirota, Hideki Tode, Koso Murakami |
| 2010 | A neutral layered mapping system with two-stage cache for a scalable Internet. Letong Sun, Xia Yin, Zhiliang Wang, Yang Xiang, Jianping Wu |
| 2010 | A performance view on DNSSEC migration. Daniel Migault, Cedric Girard, Maryline Laurent |
| 2010 | A service composition approach for inter-domain provisioning. Fernando Matos, Alexandre Matos, Paulo Simões, Edmundo Monteiro |
| 2010 | A trust model for capability delegation in federated policy systems. Kevin Feeney, Rob Brennan, Simon N. Foley |
| 2010 | Adaptive admission control of distributed cloud services. Nikolaos Leontiou, Dimitrios Dechouniotis, Spyros G. Denazis |
| 2010 | Adaptive context monitoring in heterogeneous environments. Dineshbalu Balakrishnan, Amiya Nayak |
| 2010 | Adopting software engineering practices to network processor devices introducing the Domain Specific Modeling paradigm to the ForCES Framework. Evangelos Haleplidis, Christos Tranoris, Spyros G. Denazis, Odysseas G. Koufopavlou |
| 2010 | Aligning infrastructure and business processes using watermarks. Heiko Ludwig, Kamal Bhattacharya, Rick Sheftic, Michael Nidd, Michael Moser, Andreas Kind |
| 2010 | An Iterative Information-Theoretic approach to estimate traffic matrix. Ke Liu, Xuesong Qiu, Zhipeng Gao, Xingyu Chen, Shuying Chang, Yuan Pang |
| 2010 | An aggregation scheme for the optimisation of service search in Peer-to-Peer overlays. Adriano Fiorese, Paulo Simões, Fernando Boavida |
| 2010 | An architecture for P2P locality in managed networks using hierarchical trackers. Charles Miers, Marcos A. Simplício Jr., Walter Goya, Tereza Cristina M. B. Carvalho, Victor Souza |
| 2010 | An automated roll-back plan to IT change management tool. Denílson Cursino Oliveira, Raimir Holanda Filho |
| 2010 | An efficient active probing approach based on the combination of online and offline strategies. Likun Yu, Lu Cheng, Yan Qiao, Yiguo Yuan, Xingyu Chen |
| 2010 | An efficient data circulation and discovery scheme in VANETs using public transportation systems. Chyi-Ren Dow, Pa Hsuan, Yu-Hong Lee, Yi-Tung Lee, Ching-Yin Huang |
| 2010 | An extensible framework for repair-driven monitoring. Thomas Reidemeister, Miao Jiang, Paul A. S. Ward |
| 2010 | An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype. Riyad Alshammari, Nur Zincir-Heywood |
| 2010 | Application of time series analysis to fault management in MANETs. Angelo Sapello, Adarsh S. Sethi, Marian H. Nodine, Ritu Chadha |
| 2010 | Approaches to nodes choosing protocol model for collaborative MIMO cellular networks. Xiaoxing Yu, Jing Feng |
| 2010 | Automated and secure IPv6 configuration in enterprise networks. Frédéric Beck, Olivier Festor, Isabelle Chrisment, Ralph E. Droms |
| 2010 | Automated management of network experiments and user behaviour emulation on large scale testbed facilities. Steven Latré, Wim Van de Meerssche, Stijn Melis, Dimitri Papadimitriou, Filip De Turck, Piet Demeester |
| 2010 | Botnet master detection using a mashup-based approach. Carlos Raniery Paula dos Santos, Rafael Santos Bezerra, João Marcelo Ceron, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco |
| 2010 | CRAC: Confidentiality risk assessment and IT-infrastructure comparison. Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa |
| 2010 | Capacity planning and power management to exploit sustainable energy. Daniel Gmach, Jerry Rolia, Cullen E. Bash, Yuan Chen, Tom Christian, Amip Shah, Ratnesh K. Sharma, Zhikui Wang |
| 2010 | Cautious weight tuning for link-state routing. Anders Gunnar, Mikael Johansson |
| 2010 | Cross-domain service management for enabling domain autonomy in a federated SOA. Ignacio Silva-Lepe, Isabelle Rouvellou, Rahul P. Akolkar, Arun Iyengar |
| 2010 | DP+IP = design of efficient backup scheduling. Ludmila Cherkasova, Alex Zhang, Xiaozhou Li |
| 2010 | Declarative application deployment and change management. Sebastian Herden, André Zwanziger, Philip Robinson |
| 2010 | Decomposition techniques for policy refinement. Robert Craven, Jorge Lobo, Emil C. Lupu, Alessandra Russo, Morris Sloman |
| 2010 | Dependency-aware fault diagnosis with metric-correlation models in enterprise software systems. Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward |
| 2010 | Difficulties of identifying application type in backbone traffic. Kensuke Fukuda |
| 2010 | Dispatch tooling for global service delivery. David Loewenstern, Melissa J. Buco, Yixin Diao, Heiko Ludwig, Christopher Ward |
| 2010 | Distortion optimization in enriched video traces for End-to-End video quality enhancement. Araz Jahaniaval, Dalia Fayek, Ryan Brown |
| 2010 | Domain-wide scheduling of OSPF graceful restarts for maintenance purposes. Samir Ghamri-Doudane, Laurent Ciavaglia |
| 2010 | Dynamic policy conflict analysis for collaborative web services. Zhengping Wu, Yuanyao Liu |
| 2010 | ECO-friendly distributed routing protocol for reducing network energy consumption. Daisuke Arai, Kiyohito Yoshihara |
| 2010 | Effective acquaintance management for Collaborative Intrusion Detection Networks. Carol J. Fung, Jie Zhang, Raouf Boutaba |
| 2010 | Evaluating impact of manageability features on device performance. Jacob Leverich, Vanish Talwar, Parthasarathy Ranganathan, Christos Kozyrakis |
| 2010 | Facing the unpredictable: Automated adaption of IT change plans for unpredictable management domains. Sebastian Hagen, Alfons Kemper |
| 2010 | Fast failure recovery for reliable multicast-based content delivery. Ning Wang, Binbin Dong |
| 2010 | Federation Computing: A pragmatic approach for the Future Internet. Christos Tranoris, Spyros G. Denazis |
| 2010 | Game theory driven monitoring of spatial-aggregated IP-Flow records. Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy |
| 2010 | Gossip-based resource management for cloud environments. Fetahi Wuhib, Rolf Stadler, Mike Spreitzer |
| 2010 | IP fast reroute control using centralized control plane architecture. Shohei Kamamura, Takashi Miyamura, Kohei Shiomoto |
| 2010 | Identity-bound accounting. Seppo Heikkinen, Santeri Siltala |
| 2010 | Information-based sensor tasking wireless body area networks in U-health systems. Hui Wang, Hyeok-soo Choi, Nazim Agoulmine, M. Jamal Deen, James Won-Ki Hong |
| 2010 | Integration of PXE-based desktop solutions into broadband access networks. Tiago Cruz, Paulo Simões, Fernando Bastos, Edmundo Monteiro |
| 2010 | Integration of a Power/Workload Control System into IT management architecture. Sven Graupner, Daniel Gmach |
| 2010 | Intrinsic monitoring within an IPv6 network: mapping node information to network paths. Lei Shi, Alan Davy, David Muldowney, Steven Davy, Edzard Höfig, Xiaoming Fu |
| 2010 | Joint analysis of network incidents and intradomain routing changes. Amelie Medem Kuatse, Renata Teixeira, Nick Feamster, Mickael Meulle |
| 2010 | Leveraging ESM platforms for continuous mission-oriented assessment of information assurance. Amy Fedyk, Michael Atighetchi, Partha P. Pal |
| 2010 | MANET network management and performance monitoring for NHDP and OLSRv2. Ulrich Herberg, Thomas H. Clausen, Robert G. Cole |
| 2010 | Machine learning based Call Admission Control approaches: A comparative study. Abul Bashar, Gerard Parr, Sally I. McClean, Bryan W. Scotney, Detlef D. Nauck |
| 2010 | MobiGrid: A middleware for integrating mobile phone and grid computing. Muthoni Masinde, Antoine B. Bagula, Victor Ndegwa |
| 2010 | Moving core services to the edge in NGNs for reducing managed infrastructure size. Roberto Baldoni, Roberto Beraldi, Giorgia Lodi, Marco Platania, Leonardo Querzoni |
| 2010 | Multi-domain fault management architecture based on a shared ontology-based knowledge plane. Alfonso Castro, Beatriz Fuentes, José A. Lozano, Begona Costales, Víctor A. Villagrá |
| 2010 | Near optimal demand-side energy management under real-time demand-response pricing. Jin Xiao, Jae Yoon Chung, Jian Li, Raouf Boutaba, James Won-Ki Hong |
| 2010 | Network IDS alert classification with frequent itemset mining and data clustering. Risto Vaarandi, Karlis Podins |
| 2010 | On energy-awareness for peer-assisted streaming with set-top boxes. Konstantin Pussep, Sebastian Kaune, Osama Abboud, Christian Huff, Ralf Steinmetz |
| 2010 | Optimal policy for Joint Call Admission Control in next generation wireless networks. Rodolfo W. L. Coutinho, Vitor L. Coelho, João Crisóstomo Weyl Albuquerque Costa, Glaucio H. S. Carvalho |
| 2010 | PRESS: PRedictive Elastic ReSource Scaling for cloud systems. Zhenhuan Gong, Xiaohui Gu, John Wilkes |
| 2010 | Performance evaluation of an architecture for localized IP mobility management. Javier Carmona-Murillo, José Luis González Sánchez, Francisco J. Rodríguez-Pérez |
| 2010 | Performance-aware design and optimization of enterprise applications. Jan Schaefer, Markus Schmid, Andreas Textor, Marcus Thoss, Reinhold Kröger, Andreas Roth |
| 2010 | Personalised handoff decision for seamless roaming in next generation of wireless networks. Lekometsa Mokhesi, Antoine B. Bagula |
| 2010 | Pinpointing patch impact test targets using kernel tracing. Kenji Hori, Kiyohito Yoshihara |
| 2010 | Policy exchange information model in support of cross-domain management. Andrew J. Mayer, Xi Jiang, Stephen McCarron, Hsin-Ping Chang |
| 2010 | Policy-based resource management in virtual network environment. Takashi Miyamura, Shohei Kamamura, Kohei Shiomoto |
| 2010 | Probability-based fault detection in wireless sensor networks. Rimao Huang, Xuesong Qiu, Lin-li Ye |
| 2010 | Proceedings of the 6th International Conference on Network and Service Management, CNSM 2010, Niagara Falls, Canada, October 25-29, 2010 |
| 2010 | Quality-assured provisioning of IPTV services in Ethernet-based broadband networks. Ya-Shian Wang, Kuan-Hsiung Liang, Hey-Chyi Young, Shou-Yi Cheng, Mei-Chun Chen, Ya-Ping Huang |
| 2010 | Real time distributed monitoring of services over IP. Cormac Mullaly, Brian Lee, Dawid Czesak |
| 2010 | Renovating legacy distributed systems using virtual appliance with dependency graph. Fumio Machida, Masahiro Kawato, Yoshiharu Maeno |
| 2010 | Risk management in VoIP infrastructures using support vector machines. Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Olivier Festor |
| 2010 | RiskRank: Security risk ranking for IP flow records. Shaonan Wang, Radu State, Mohamed Ourdane, Thomas Engel |
| 2010 | Rule-based SLA management for revenue maximisation in Cloud Computing Markets. Mario Macías, Josep Oriol Fitó, Jordi Guitart |
| 2010 | Scheduling service workflows for cost optimization in hybrid clouds. Luiz F. Bittencourt, Carlos R. Senna, Edmundo R. M. Madeira |
| 2010 | Semantic scheduling of active measurements for meeting network monitoring objectives. Prasad Calyam, Lakshmi Kumarasamy, Füsun Özgüner |
| 2010 | Sharing information about security alerts using semantic web technologies. Pilar Holgado, Jorge E. López de Vergara, Víctor A. Villagrá, Ivan Sanz, Antonio Amaya |
| 2010 | Similarity metric for risk assessment in IT change plans. Luís Armando Bianchin, Juliano Araújo Wickboldt, Lisandro Zambenedetti Granville, Luciano Paschoal Gaspary, Claudio Bartolini, Maher Rahmouni |
| 2010 | Teleo-Reactive policies for managing human-centric pervasive services. Srdjan Marinovic, Kevin P. Twidle, Naranker Dulay, Morris Sloman |
| 2010 | Toward business-driven risk management for Cloud computing. Josep Oriol Fitó, Mario Macías, Jordi Guitart |
| 2010 | Toward large-scale programmable networks: Lessons learned through the operation and management of a wide-area OpenFlow-based network. Yoshihiko Kanaumi, Shuichi Saito, Eiji Kawai |
| 2010 | Towards a validation framework for dynamic reconfiguration. Ludi Akue, Emmanuel Lavinal, Michelle Sibilla |
| 2010 | Towards automatic and independent internet services configuration. Miguel Lopes, António Costa, Bruno Dias |
| 2010 | Towards non-expert users monitoring networks and services through semantically enhanced visualizations. Owen Conlan, John Keeney, Cormac Hampson, Fionán Peter Williams |
| 2010 | Trust management for Web Services. Scott D. Stoller |
| 2010 | User identification in encrypted network communications. Robert Koch, Gabi Dreo Rodosek |
| 2010 | User-Controlled Automated Identity Delegation. Thorsten Höllrigl, Holger Kühner, Jochen Dinger, Hannes Hartenstein |
| 2010 | User-preference-based service selection using fuzzy logic. Zhengping Wu, Mu Yuan |
| 2010 | Using policies to drive autonomic management of virtual systems. Delei Weng, Michael A. Bauer |
| 2010 | Virtual platform support for QoS management in IMS based multiple provider networks. Muhammad Shoaib Siddiqui, Choong Seon Hong, Young-Cheol Bang |
| 2010 | Where have all the tickets gone? Claudio Bartolini, Phil Day |