| 2013 | A cloud monitoring framework for self-configured monitoring slices based on multiple tools. Marcio Barbosa de Carvalho, Rafael Pereira Esteves, Guilherme da Cunha Rodrigues, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco |
| 2013 | A design and implementation of dual-stack aware authentication system for enterprise captive portal. Surasak Sanguanpong, Kasom Koht-Arsa |
| 2013 | A distributed approach to dynamic VM management. Michael Tighe, Gastón Keller, Michael A. Bauer, Hanan Lutfiyya |
| 2013 | A formal approach for virtual machine migration planning. Saeed Al-Haj, Ehab Al-Shaer |
| 2013 | A probabilistic cost-efficient approach for mobile security assessment. Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor |
| 2013 | A scalable approach for structuring large-scale hierarchical cloud management systems. Hendrik Moens, Filip De Turck |
| 2013 | Adapting applications to exploit virtualization management knowledge. Vitalian A. Danciu, Alexander Knapp |
| 2013 | Adaptive network management for countering selective capture in wireless sensor networks. Hamid Al-Hamadi, Ing-Ray Chen |
| 2013 | An approach for knowledge-based IT management of air traffic control systems. Fabian Meyer, Reinhold Kröger, Ralf Heidger, Morris Milekovic |
| 2013 | Analysis of YouTube user experience from passive measurements. Giorgos Dimopoulos, Pere Barlet-Ros, Josep Sanjuàs-Cuxart |
| 2013 | Assessment and event based analysis of dynamic wireless networks. Denis Carvin, Guillaume Kremer, Philippe Owezarski, Pascal Berthou |
| 2013 | Auction-type framework for selling inter-domain paths. Xavier Misseri, Jean-Louis Rougier, Stefano Moretti |
| 2013 | Automated source code extension for debugging of OpenFlow based networks. Stefan Hommes, Frank Hermann, Radu State, Thomas Engel |
| 2013 | Characterizing the impact of network substrate topologies on virtual network embedding. Marcelo Caggiani Luizelli, Leonardo Richter Bays, Luciana Salete Buriol, Marinho P. Barcellos, Luciano Paschoal Gaspary |
| 2013 | Choreographing configuration changes. Herry Herry, Paul Anderson, Michael Rovatsos |
| 2013 | Classifying server behavior and predicting impact of modernization actions. Jasmina Bogojeska, David Lanyi, Ioana Giurgiu, George Stark, Dorothea Wiesmann |
| 2013 | CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networks. Corinna Schmitt, Andre Freitag, Georg Carle |
| 2013 | Detecting anomalies in cellular networks using an ensemble method. Gabriela F. Ciocarlie, Ulf Lindqvist, Szabolcs Nováczki, Henning Sanneck |
| 2013 | Determining leaders and clusters in video consumption. Danny De Vleeschauwer, Chris Hawinkel, Yannick Le Louédec |
| 2013 | Dynamic Controller Provisioning in Software Defined Networks. Md. Faizul Bari, Arup Raton Roy, Shihabur Rahman Chowdhury, Qi Zhang, Mohamed Faten Zhani, Reaz Ahmed, Raouf Boutaba |
| 2013 | Dynamic multi-stage Energy-Saving Management mechanism based on Base Station cooperation. Peng Yu, Wenjing Li, Yulin Su, Xuesong Qiu |
| 2013 | Dynamic traffic management mechanism for active optimization of ISP costs. Zbigniew Duliñski, Rafal Stankiewicz |
| 2013 | Efficient distributed monitoring in 6LoWPAN networks. Abdelkader Lahmadi, Alexandre Boeglin, Olivier Festor |
| 2013 | Efficient probing method for active diagnosis in large scale network. Lu Guan, Ying Wang, Wenjing Li, Congxian Yan |
| 2013 | Gravitational networks: Self-organizing network topologies into hierarchically structured domains. Martin Johnsson, Brendan Jennings |
| 2013 | Guaranteeing consistency between large replicated writable disk images. Sean Rooney, Luis Garcés-Erice |
| 2013 | HORST - Home router sharing based on trust. Michael Seufert, Valentin Burger, Tobias Hoßfeld |
| 2013 | Identifying missed monitoring alerts based on unstructured incident tickets. Liang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik |
| 2013 | Impact of rare alarms on event correlation. Anne Bouillard, Aurore Junier, Benoit Ronot |
| 2013 | Incentivizing efficient load repartition in heterogeneous wireless networks with selfish delay-sensitive users. Vladimir Fux, Patrick Maillé |
| 2013 | Integrating VM selection criteria in distributed dynamic VM consolidation using Fuzzy Q-Learning. Seyed Saeid Masoumzadeh, Helmut Hlavacs |
| 2013 | Integrating an online configuration checker with existing management systems: Application to CIM/WBEM environments. Ludi Akue, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla |
| 2013 | Joint optimization for the delivery of multiple video channels in Telco-CDN. Fen Zhou, Jiayi Liu, Gwendal Simon, Raouf Boutaba |
| 2013 | Leveraging attention scarcity to improve the overall user experience of Cloud services. Marco Aurélio Stelmar Netto, Marcos D. Assunção, Silvia Bianchi |
| 2013 | Lightweight link dimensioning using sFlow sampling. Ricardo de Oliveira Schmidt, Ramin Sadre, Anna Sperotto, Aiko Pras |
| 2013 | Measuring TCP connection establishment times of dual-stacked web services. Vaibhav Bajpai, Jürgen Schönwälder |
| 2013 | Monitoring latency with OpenFlow. Kevin Phemius, Mathieu Bouet |
| 2013 | More control over network resources: An ISP caching perspective. Daphné Tuncer, Marinos Charalambides, Raul Landa, George Pavlou |
| 2013 | Multi-source cooperative adaptation for QoE-aware video multicast rate-control. Kaliappa Ravindran |
| 2013 | Network aware virtual machine and image placement in a cloud. David Breitgand, Amir Epstein, Alex Glikson, Assaf Israel, Danny Raz |
| 2013 | Network performance improvement through evaluation of bicriteria routing methods in transport networks. Lúcia Martins, Joao Lopes, José M. F. Craveirinha, João C. N. Clímaco, Ricardo Cadime, Catarina Monica |
| 2013 | Networking solutions in the federation of clouds. Roman Lapacz, Blazej Pietrzak |
| 2013 | On the manipulability of voting systems: application to multi-operator networks. François Durand, Fabien Mathieu, Ludovic Noirie |
| 2013 | OnTimeSecure: Secure middleware for federated Network Performance Monitoring. Prasad Calyam, Shweta Kulkarni, Alex Berryman, Kunpeng Zhu, Mukundan Sridharan, Rajiv Ramnath, Gordon Springer |
| 2013 | OpenSAF and VMware from the perspective of high availability. Ali Nikzad, Ferhat Khendek, Maria Toeroe |
| 2013 | Optimizing crowd based monitoring in large scale mobile networks. Jan Groenendijk, Yangcheng Huang |
| 2013 | Pazl: A mobile crowdsensing based indoor WiFi monitoring system. Valentin Radu, Lito Kriara, Mahesh K. Marina |
| 2013 | Proceedings of the 9th International Conference on Network and Service Management, CNSM 2013, Zurich, Switzerland, October 14-18, 2013 |
| 2013 | Real-time adaptive algorithm for resource monitoring. Mauro Andreolini, Michele Colajanni, Marcello Pietri, Stefania Tosi |
| 2013 | Reciprocity with virtual nodes: Supporting mobile peers in Peer-to-Peer content distribution. Matthias Wichtlhuber, Peter Heise, Bjorn Scheurich, David Hausheer |
| 2013 | Refactoring multi-layered access control policies through (De)composition. Matteo Maria Casalino, Romuald Thion |
| 2013 | Reliability estimation in mobile ad hoc networks. Ritu Chadha, Alexander Poylisher, Constantin Serban |
| 2013 | SLA impact modeling for service engagement. Yixin Diao, Linh Lam, Larisa Shwartz, David M. Northcutt |
| 2013 | SLA learning from past failures, a Multi-Armed Bandit approach. Lise Rodier, David Auger, Johanne Cohen, Hélia Pouyllau |
| 2013 | Scalable matching and ranking for network search. Misbah Uddin, Rolf Stadler, Alexander Clemm |
| 2013 | The trouble with choice: An empirical study to investigate the influence of charging strategies and content selection on QoE. Andreas Sackl, Patrick Zwickl, Peter Reichl |
| 2013 | Thwarting attacks on ZigBee - Removal of the KillerBee stinger. Björn Stelte, Gabi Dreo Rodosek |
| 2013 | Towards a trust computing architecture for RPL in Cyber Physical Systems. Sebastian Seeber, Anuj Sehgal, Björn Stelte, Gabi Dreo Rodosek, Jürgen Schönwälder |
| 2013 | Towards an improved data centre simulation with DCSim. Michael Tighe, Gastón Keller, Jamil Shamy, Michael A. Bauer, Hanan Lutfiyya |
| 2013 | Towards real-time intrusion detection for NetFlow and IPFIX. Rick Hofstede, Václav Bartos, Anna Sperotto, Aiko Pras |
| 2013 | Update aware replica placement. Assaf Rappaport, Danny Raz |
| 2013 | Video delivery over next generation cellular networks. Manos Dramitinos, Nan Zhang, Miroslaw Kantor, José Costa-Requena, Ioanna Papafili |
| 2013 | Volume is not enough: SVC-aware server allocation for peer-assisted streaming. Julius Rückert, Osama Abboud, Martin Kluge, David Hausheer |
| 2013 | When free riding is the best choice: The case of network charges for content providers. Maurizio Naldi, Giuseppe D'Acquisto |
| 2013 | Who decides migration? A migration lock mechanism for virtual machines. Xiaolin Wang, Yingwei Luo, Zhenlin Wang |