| 2008 | A 2-tier architecture to support real-time communication in CSMA-based networks. Ricardo de Moraes, Francisco Vasques, Paulo Portugal |
| 2008 | A Bayesian knowledge engineering framework for service management. Wei Wang, Hao Wang, Bo Yang, Liang Liu, Peini Liu, Guosun Zeng |
| 2008 | A Framework for the establishment of inter-domain, on-demand VPNs. Alexandre Matos, Fernando Matos, Paulo Simões, Edmundo Monteiro |
| 2008 | A comprehensive semantic-based resource allocation framework for workflow management systems. Chong Wang, Zhile Zou, Qian Ma, Ru Fang, Hao Wang |
| 2008 | A model for heterogeneous networks management and performance evaluation. António Serrador, Luís M. Correia |
| 2008 | A model-based approach to adding autonomic capabilities to network fault management system. Yan Liu, Jing Zhang, Michael Jiang, David Raymer, John Strassner |
| 2008 | A model-driven configuration management methodology for testbed infrastructures. Fermín Galán Márquez, Jorge E. López de Vergara, David Fernández, Raul Muñoz |
| 2008 | A monitoring tool for Wireless Multi-hop Mesh Networks. François Jan, Bertrand Mathieu, Djamal-Eddine Meddour |
| 2008 | A new methodology for RF failure detection in UMTS networks. Juan Sanchez-Gonzalez, Oriol Sallent, Jordi Pérez-Romero, Ramón Agustí, Miguel Ángel Díaz-Guerra, Juan Antonio Moreno, Daniel Paul |
| 2008 | A novel approach to bottleneck analysis in networks. Nikhil Shetty, Assane Gueye, Jean C. Walrand |
| 2008 | A queueing equivalent thresholding method for thinning traffic captures. José Luis García-Dorado, Javier Aracil, José Alberto Hernández, Jorge E. López de Vergara |
| 2008 | A real-time flow monitor architecture encompassing on-demand monitoring functions. John McGlone, Alan Marshall, Roger F. Woods |
| 2008 | A resource management framework for multi-tier service delivery in autonomic virtualized environments. Xiaoying Wang, Dong-Jun Lan, Xing Fang, Meng Ye, Ying Chen |
| 2008 | A scalable monitoring strategy for highly dynamic systems. Luis Carlos Erpen De Bona, Keiko Verônica Ono Fonseca, Elias P. Duarte Jr. |
| 2008 | A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks. Cristian Popi, Olivier Festor |
| 2008 | A security management framework for sensor networks. Sergio de Oliveira, Thiago Rodrigues de Oliveira, José Marcos S. Nogueira |
| 2008 | A self-diagnosis approach for performance problem localization in component-based applications. Sand Correa, Eduardo Fonseca, Renato Cerqueira |
| 2008 | A self-organizing composition towards autonomic overlay networks. Ibrahim Al-Oqily, Ahmed Karmouch |
| 2008 | A state machine approach for problem detection in large-scale distributed system. Kewei Sun, Jie Qiu, Ying Li, Ying Chen, Weixing Ji |
| 2008 | A state-space approach to SLA based management. Vibhore Kumar, Karsten Schwan, Subu Iyer, Yuan Chen, Akhil Sahai |
| 2008 | A step towards understanding Joost IPTV. Josilene Moreira, Rafael Antonello, Stenio F. L. Fernandes, Carlos Alberto Kamienski, Djamel Sadok |
| 2008 | A strategic approach for re-organization of internet topology for improving both efficiency and attack tolerance. Yasuhiro Sato, Shingo Ata, Ikuo Oka |
| 2008 | A template-based solution to support knowledge reuse in IT change design. Weverton Luis da Costa Cordeiro, Guilherme Sperb Machado, Fabio Fabian Daitx, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, Akhil Sahai, Claudio Bartolini, David Trastour, Katia Barbosa Saikoski |
| 2008 | ALBA: An autonomic load balancing algorithm for IEEE 802.11 wireless networks. Gilbert Sawma, Issam Aib, Ryad Ben-El-Kezadri, Guy Pujolle |
| 2008 | Adapt-RDM - A bandwidth management algorithm suitable for DiffServ services aware traffic engineering. Walter da Costa Pinto Neto, Joberto S. B. Martins |
| 2008 | Alert prioritization in Intrusion Detection Systems. Khalid Alsubhi, Ehab Al-Shaer, Raouf Boutaba |
| 2008 | Algorithm to automatically solve security policy conflicts among IP devices configurations. Simone Ferraresi, Emanuele Francocci, Alessio Quaglini, Andrea Baiocchi |
| 2008 | An Internet traffic classification methodology based on statistical discriminators. Raimir Holanda Filho, Marcus Fabio Fontenelle do Carmo, José Everardo Bessa Maia, G. P. Siqueira |
| 2008 | An attribute aggregation architecture with trust-based evaluation for access control. Jaewon Lee, Heeyoul Kim, Joon Sung Hong |
| 2008 | An improved GPS scheduling discipline based on multifractal traffic characteristics. Flávio Henrique Vieira Teles, Luan Ling Lee, C. Jorge |
| 2008 | An incentive engineering mechanism for optimizing handoff decisions between cellular data networks and WLANs. Jun Wang, Victor C. M. Leung |
| 2008 | An investigation of visualization techniques forSNMP traffic traces. Ewerton Monteiro Salvador, Lisandro Zambenedetti Granville |
| 2008 | An ontology for privacy policy management in ubiquitous environments. Luciana Andréia Fondazzi Martimiano, Müller R. P. Gonçalves, Edson dos Santos Moreira |
| 2008 | An open framework for federating integrated management model of distributed it environment. Manish Sethi, Ashok Anand, Dipayan Gangopadhyay, Venkateswara Reddy Madduri, Manish Gupta |
| 2008 | Analysis of application performance and its change via representative application signatures. Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat, Julie Symons, Evgenia Smirni |
| 2008 | Analyzing security and energy tradeoffs in autonomic capacity management. Ítalo S. Cunha, Itamar Viana, João R. M. Palotti, Jussara M. Almeida, Virgílio A. F. Almeida |
| 2008 | Application domain independent policy conflict analysis using information models. Steven Davy, Brendan Jennings, John Strassner |
| 2008 | Application of adaptive probing for fault diagnosis in computer networks. Maitreya Natu, Adarshpal S. Sethi |
| 2008 | Applying a model of configuration complexity to measure security impact on IT procedures. Giovane Cesar Moreira Moura, Luciano Paschoal Gaspary |
| 2008 | Applying aspect oriented service control in IMS network. Jia Jia Wen, Li Na Ren, Lee Longmore, Qi Yu |
| 2008 | Assessing the Madeira NorthBound Interface. Pablo Arozarena, D. Ortega, B. Baesjou |
| 2008 | Asset-based requirement analysis in telecom Service Delivery Platform domain. Qiming Tian, Xiaoyan Chen, Ling Jin, Ping Pan, Chun Ying |
| 2008 | Automatic model-based service hosting environment migration. Liang Liu, Ying Li, Qian Ma, Kewei Sun, Ying Chen, Hao Wang |
| 2008 | Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control. Lopamudra Roychoudhuri, Ehab S. Al-Shaer |
| 2008 | Autonomic networking: Theory and practice. John Strassner |
| 2008 | Availability "weak point" analysis over an SOA deployment framework. Lei Xie, Jing Luo, Jie Qiu, John A. Pershing, Ying Li, Ying Chen |
| 2008 | Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shaozhi Ye, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong |
| 2008 | Bootstrapping device state in managed systems. Greg W. Cox, Walter L. Johnson, John Strassner, David Raymer |
| 2008 | Brazilian terrestrial digital TV system. Luiz Fernando Gomes Soares |
| 2008 | CPU-based DoS attacks against SIP servers. Ming Luo, Tao Peng, Christopher Leckie |
| 2008 | Characterization of IP flows eligible for lambda-connections in optical networks. Tiago Fioreze, Mattijs Oude Wolbers, Remco van de Meent, Aiko Pras |
| 2008 | ChargeView: An integrated tool for implementing chargeback in IT systems. Sandip Agarwala, Ramani Routray, Sandeep Uttamchandani |
| 2008 | Common business process model for continuous SDP transformation. Ling Jin, Ping Pan, Chun Ying, Xiaoyan Chen, Qiming Tian |
| 2008 | Coordinated management of power usage and runtime performance. Malgorzata Steinder, Ian Whalley, James E. Hanson, Jeffrey O. Kephart |
| 2008 | Cost analysis of the service migration problem between communication platforms. Dayyan Shayani, Carmen Mas Machuca, Monika Jäger, Andreas Gladisch |
| 2008 | CyberPlanner: A comprehensive toolkit for network service providers. Raouf Boutaba, Jin Xiao, Issam Aib |
| 2008 | DYSWIS: An architecture for automated diagnosis of networks. Vishal Kumar Singh, Henning Schulzrinne, Kai Miao |
| 2008 | Data tagging architecture for system monitoring in dynamic environments. Bharat Krishnamurthy, Anindya Neogi, Bikram Sengupta, Raghavendra Singh |
| 2008 | Data-WISE: Efficient management of data-intensive workflows in scheduled grid environments. Gargi Dasgupta, Koustuv Dasgupta, Balaji Viswanathan |
| 2008 | Decision support for service transition management Enforce change scheduling by performing change risk and business impact analysis. Thomas Setzer, Kamal Bhattacharya, Heiko Ludwig |
| 2008 | Decomposition of IT service processes and alternative service identification using ontologies. Christian Bartsch, Larisa Shwartz, Christopher Ward, Genady Grabarnik, Melissa J. Buco |
| 2008 | Dependency graph to improve notifications' semantic on anomaly detection. Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr. |
| 2008 | Design and implementation of a policy-based management framework for Ambient Networks: Choices and lessons learned. Carlos Alberto Kamienski, Joseane Farias Fidalgo, Ramide Dantas, Djamel Sadok, Börje Ohlman |
| 2008 | Designing, optimizing, and evaluating network security configuration. Ehab Al-Shaer |
| 2008 | Detecting BGP anomalies with wavelet. Jianning Mai, Lihua Yuan, Chen-Nee Chuah |
| 2008 | Detecting Skype flows in Web traffic. Emanuel P. Freire, Artur Ziviani, Ronaldo M. Salles |
| 2008 | Device Instrumentation for performance monitoring and its application in service level management. Alexander Clemm, Ralf Wolter |
| 2008 | Distinguished experts panel. George Pavlou, Luciano Paschoal Gaspary |
| 2008 | Distributed fault correlation scheme using a semantic publish/subscribe system. Wei Tai, Declan O'Sullivan, John Keeney |
| 2008 | Dynamic inter-organizational cooperation setup in Circle-of-Trust environments. Latifa Boursas, Vitalian A. Danciu |
| 2008 | Dynamic pull-based load balancing for autonomic servers. Remi Badonnel, Mark Burgess |
| 2008 | Dynamic reconfiguration of logical topology for WDM networks under traffic changes. Phuong Nga Tran, Ulrich Killat |
| 2008 | Effective implementation of network composition for ambient networks. Ramide Dantas, Joseane Farias Fidalgo, Jennifer Lima, Djamel Sadok, Carlos Alberto Kamienski, Börje Ohlman |
| 2008 | Efficient method of collecting routing tables based on OSPF/iBGP monitoring. Yuichiro Hei, Tomohiko Ogishi, Shigehiro Ano |
| 2008 | Efficient physical topology discovery for large OSPF networks. Choonho Son, Junsuk Oh, Kyoung-ho Lee, Kieung Kim, Jaehyung Yoo |
| 2008 | Eigen space based method for detecting faulty nodes in large scale enterprise systems. Manoj K. Agarwal |
| 2008 | Enabling rollback support in IT change management systems. Guilherme Sperb Machado, Fabio Fabian Daitx, Weverton Luis da Costa Cordeiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, Claudio Bartolini, Akhil Sahai, David Trastour, Katia Barbosa Saikoski |
| 2008 | Enforcing security in mobile RFID networks multilateral approaches and solutions. Namje Park, Dooho Choi, Seungjoo Kim, Dongho Won |
| 2008 | Enterprise mashups and Web 2.0 for management. Hani Jamjoom, Nikos Anerousis |
| 2008 | Estimating business value of IT services through process complexity analysis. Yixin Diao, Kamal Bhattacharya |
| 2008 | Evaluation on data modeling languages for NETCONF-based network management. Hui Xu, Debao Xiao |
| 2008 | Fast recovery paths schema to improve reliability in IP networks. Fernando Barreto, Emílio C. G. Wille, Luiz Nacamura |
| 2008 | Fast similarity search in peer-to-peer networks. Thomas Bocek, Ela Hunt, David Hausheer, Burkhard Stiller |
| 2008 | Feasibility validation of management capability for an Ethernet based access network using Ethernet OAM functionality. Munefumi Tsurusawa, Yukio Horiuchi |
| 2008 | First steps towards an autonomic management system. Moez Esseghir, Samir Ghamri-Doudane, Kamel Haddadou |
| 2008 | Fostering the simulation-based evaluation of management architectures over multi-hop topologies. Jose Angel Irastorza, Ramón Agüero, Luis Muñoz |
| 2008 | From value chains to ecosystem: New opportunities for telecommunications and new challenges for managing networks and services. Roberto Saracco |
| 2008 | GARCH - non-linear time series model for traffic modeling and prediction. Chaoba Nikkie Anand, Caterina M. Scoglio, Balasubramaniam Natarajan |
| 2008 | Grid resource management with tightly coupled WBEM/CIM local management. Shahnaza Tursunova, Tran Trong Son, Young-Tak Kim |
| 2008 | Grid-enabling orbital analysis and computationally intensive applications for a growing set of diversified users. Thomas Barr, Chris Byron, Ziyad Duron, Robert M. Keller, Ben Lickly, Carl Nygaard, Kyle Roberts, Michael AuYeung, Joseph Betser, John Coggi, Brooks Davis, Craig A. Lee, Dave Stodden, Mark Thomas |
| 2008 | Handover prediction strategy for 3G-WLAN overlay networks. Hyeyeon Kwon, MiJeong Yang, Aesoon Park, S. Venkatesan |
| 2008 | Harmonizing service and network provisioning for federative access in a mobile environment. David J. Lutz, Patrick Mandic, Sascha Neinert, Ruth del Campo, Jürgen Jähnert |
| 2008 | Heuristics on link stability in ad hoc networks. Matthias R. Brust, Carlos H. C. Ribeiro, Steffen Rothkugel |
| 2008 | High performance distributed Denial-of-Service resilient web cluster architecture. Supranamaya Ranjan, Edward W. Knightly |
| 2008 | Home/office intranet resource management for QoS-guaranteed realtime stream service provisioning on IEEE 802.11e WLAN. Young-Chul Jung, Byung-Kil Kim, Young-Tak Kim |
| 2008 | Host-aware routing in multicast overlay backbone. Jun Guo, Sanjay Jha |
| 2008 | HyperBone: A scalable overlay network based on a virtual hypercube. Luis C. E. Bona, Keiko Verônica Ono Fonseca, Elias P. Duarte Jr. |
| 2008 | IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil Marcus Brunner, Carlos Becker Westphall, Lisandro Zambenedetti Granville |
| 2008 | IT Service Management and Business-Driven IT Management. Claudio Bartolini, Jacques Philippe Sauvé |
| 2008 | Improvement in resource reservations management within tunnels over all-IP mobile networks using IntServ6. Jhon J. Padilla Aguilar, Josep Paradells Aspas |
| 2008 | Improving QoS guarantees through implicit AC. Solange Rito Lima, Pedro Nuno Miranda de Sousa, Paulo Carvalho |
| 2008 | Improving distributed service management using Service Modeling Language (SML). Robert Adams, Ricardo Rivaldo, Guilherme Germoglio, Flavio Santos, Yuan Chen, Dejan S. Milojicic |
| 2008 | Improving user experience and resource management in wireless communications. Ricardo Rabelo Oliveira, Antonio Alfredo Ferreira Loureiro |
| 2008 | Information integration techniques to automate incident management. Rajeev Gupta, K. Hima Prasad, Mukesh K. Mohania |
| 2008 | Infrastructure sharing and shared operations for mobile network operators From a deployment and operations view. Thomas Frisanco, Paul Tafertshofer, Pierre Lurin, Rachel Ang |
| 2008 | Integrating business performance management with IT management through impact analysis and provisioning. Ana Biazetti, Germán S. Goldszmidt |
| 2008 | Integrating cfengine and scli: Managing network devices like host systems. Jürgen Schönwälder, Vladislav Marinov, Mark Burgess |
| 2008 | Inter-domain QoS signaling under mobility. Eraldo Silveira e Silva, Florin Racaru, Jean-Marie Farines, Michel Diaz |
| 2008 | Internet routing management. Deep Medhi |
| 2008 | Intrusion detection through artificial neural networks. I. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral |
| 2008 | JXTA PEER SNMP: An SNMP peer for inter-domain management. Maverson Eduardo Schulze Rosa, Aldo Nascimento, Luciano Sytnifc, Elias Procópio Duarte Jr. |
| 2008 | Kalinahia: Considering quality of service to design and execute distributed multimedia applications. Sophie Laplace, Marc Dalmau, Philippe Roose |
| 2008 | LNMP- Management architecture for IPv6 based low-power wireless Personal Area Networks (6LoWPAN). Hamid Mukhtar, Kang-Myo Kim, Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Seung-Wha Yoo |
| 2008 | Load balancing scheme and implementation in multihoming mobile router. Gyu Myoung Lee, Byung-Chun Jeon, Siyoung Heo, Hanlim Kim, Jongsam Jin, Seongchun Lee |
| 2008 | MANETs routing protocols evaluation in a scenario with high mobility MANET routing protocols performance and behavior. Ricardo de Oliveira Schmidt, Marco A. S. Trentin |
| 2008 | MANKOP: A Knowledge Plane for wireless ad hoc networks. Daniel F. Macedo, Aldri L. dos Santos, Guy Pujolle, José Marcos S. Nogueira |
| 2008 | Making IP traffic engineering robust to intra- and inter-AS transient link failures. Mina Amin, Kin-Hon Ho, Ning Wang, Michael P. Howarth, George Pavlou |
| 2008 | Manageability design for an autonomic management of semi-dynamic web service compositions. Christof Momm, I. P. Hallerbach, Sebastian Abeck, Christoph Rathfelder |
| 2008 | Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham |
| 2008 | Mining event logs with SLCT and LogHound. Risto Vaarandi |
| 2008 | Model-based management of security services in complex network environments. João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus |
| 2008 | Monitoring scheduling for home gateways. Stéphane Frénot, Yvan Royon, Pierre Parrend, Denis Beras |
| 2008 | Multi-layer network management system with dynamic control of MPLS/GMPLS LSPs based on IP flows. Masanori Miyazawa, Kenichi Ogaki, Tomohiro Otani |
| 2008 | Neighbor cell relation list and measured cell identity management in LTE. Mehdi Amirijoo, Pål K. Frenger, Fredrik Gunnarsson, Harald Kallin, Johan Moe, Kristina Zetterberg |
| 2008 | Network domain entrypoint/path determination for DDoS attacks. Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay |
| 2008 | Network-wide inference of end-to-end path intersections. Bengi Karacali, Mark J. Karol |
| 2008 | Non-intrusive transaction monitoring using system logs. Bikram Sengupta, Nilanjan Banerjee, Animashree Anandkumar, Chatschik Bisdikian |
| 2008 | On the complexity of determining autonomic policy constrained behaviour. Mark Burgess, Lars Kristiansen |
| 2008 | On the multi-scale behavior of packet size distribution in Internet backbone network. Seongjin Lee, Youjip Won, Dong-Joon Shin |
| 2008 | On the planning of a hybrid IT infrastructure. Paulo Ditarso Maciel Jr., Flavio Figueiredo, D. Maia, Francisco Vilar Brasileiro, Alvaro Coelho |
| 2008 | On utility models for access network selection in wireless heterogeneous networks. Quoc-Thinh Nguyen-Vuong, Yacine Ghamri-Doudane, Nazim Agoulmine |
| 2008 | Optimizing request denial and latency in an agent-based VPN architecture. Haiyang Qian, Steve Dispensa, Deep Medhi |
| 2008 | Optimizing software packages for application management. Joseph L. Hellerstein |
| 2008 | Orchestration of heterogeneous virtualized resources for end-to-end service control. Michiaki Hayashi, Nobutaka Matsumoto, Takahiro Miyamoto, Hideaki Tanaka |
| 2008 | PathCrawler: Automatic harvesting web infra-structure. Cesar Marcondes, M. Y. Sanadidi, Mario Gerla, Ramon S. Schwartz, Raphael O. Santos, Magnos Martinello |
| 2008 | Peer-to-Peer networking: State of the art and research challenges. Raouf Boutaba |
| 2008 | Performance evaluation of the Flow-Aware Networking (FAN) architecture under Grid environment. César Cárdenas, Maurice Gagnaire, Víctor López, Javier Aracil |
| 2008 | Policy and role based mobile RFID user privacy data management system. Namje Park, Youjin Song, Dongho Won |
| 2008 | Policy-based dynamic provisioning in data centers based on SLAs, business rules and business objectives. Angela McCloskey, Bradley Simmons, Hanan Lutfiyya |
| 2008 | Policy-based self-healing for radio access networks. Javier Baliosian, Katarína Matusíková, Karl Quinn, Rolf Stadler |
| 2008 | Policy-based self-management of hybrid ad hoc networks for dynamic channel configuration. Antonis M. Hadjiantonis, George Pavlou |
| 2008 | Privacy management service contacts as a new business opportunity for operators. Louis-François Pau |
| 2008 | Provisioning IMS-based seamless triple play services over different access networks. Adel Al-Hezmi, Fabricio Carvalho de Gouveia, Muhammad Sher, Oliver Friedrich, Thomas Magedanz |
| 2008 | QoS and reputation-aware service selection. Noura Limam, Raouf Boutaba |
| 2008 | ReCon: A tool to Recommend dynamic server Consolidation in multi-cluster data centers. Sameep Mehta, Anindya Neogi |
| 2008 | Real-time problem localization for synchronous transactions in HTTP-based composite enterprise applications. Narendran Sachindran, Manish Gupta |
| 2008 | Reinforcement learning in policy-driven autonomic management. Raphael M. Bahati, Michael A. Bauer |
| 2008 | Relaxed multiple routing configurations for IP fast reroute. Tarik Cicic, Audun Fosselie Hansen, Amund Kvalbein, Matthias Hartmann, Rüdiger Martin, Michael Menth |
| 2008 | Relieving hot spots in collaborative intrusion detection systems during worm outbreaks. Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie |
| 2008 | Routing with a bandwidth based algorithm in virtual call centres. Akinbola Adetunji, Hadi Larijani |
| 2008 | SGNET: Implementation insights. Corrado Leita, Marc Dacier |
| 2008 | SIP application composition framework based on business rules. Li Na Ren, Jia Jia Wen, Qi Yu, Lee Longmore |
| 2008 | SIP network discovery by using SIP message probing. Jin Zhou, Jie Li, Yin Ben Xia, Bin Cai, Chun Ying |
| 2008 | SPIRIT: Service for providing infrastructure recommendations for IT. Ashwin Lall, Anca Sailer, Mark Brodie |
| 2008 | SRDP-Sign: a reliable multicast protocol for signaling. Franco Tommasi, Simone Molendini, Elena Scialpi |
| 2008 | Secure route optimization for Mobile Network Node using secure address proxying. Manhee Jo, Hiroshi Inamura |
| 2008 | Self-tuning network support for MANETs. Yangcheng Huang, Saleem N. Bhatti, Søren-Aksel Sørensen |
| 2008 | Service capacity allocation and pricing. Chunhua Tian, Feng Li, Rongzeng Cao, Wei Ding |
| 2008 | Service continuity management through an E2E dynamic session in NGN. Noëmie Simoni, Chunyang Yin, Ghislain Du Chéné |
| 2008 | Spectrum management in cognitive radio networks. Ian F. Akyildiz |
| 2008 | Spectrum, network and operations management in cognitive radio networks. Ian F. Akyildiz |
| 2008 | Supporting control plane-enabled transport networks within ITU-T Next Generation Network (NGN) architecture. Fabio Baroncelli, Barbara Martini, Valerio Martini, Piero Castoldi |
| 2008 | Survival multipath routing for MANETs. Michele Nogueira Lima, Helber Wagner da Silva, Aldri L. dos Santos, Guy Pujolle |
| 2008 | Template based rapid service creation environment for service delivery platform. Ping Pan, Ling Jin, Chun Ying, Jin Hua Liu |
| 2008 | The SCRUB security data sharing infrastructure. William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham |
| 2008 | Towards SLA-based optimal workload distribution in SANs. Eray Gençay, Carsten Sinz, Wolfgang Küchlin |
| 2008 | Towards a flexible security management solution for dynamic MANETs. Vincent Toubiana, Houda Labiod |
| 2008 | Towards an efficient implementation of traceback mechanisms in autonomous systems. Karima Boudaoud, F. LeBorgne |
| 2008 | Towards automated application signature generation for traffic identification. Byung-Chul Park, Young J. Won, Myung-Sup Kim, James W. Hong |
| 2008 | Towards autonomic risk-aware security configuration. Mohammad Salim Ahmed, Ehab Al-Shaer, Mohamed Mahmoud Taibah, Muhammad Abedin, Latifur Khan |
| 2008 | Towards integrating management interfaces. Elyes Lehtihet, Nazim Agoulmine |
| 2008 | Towards malware inspired management frameworks. Jérôme François, Radu State, Olivier Festor |
| 2008 | Tracking back the root cause of a path change in interdomain routing. Alessio Campisano, Luca Cittadini, Giuseppe Di Battista, Tiziana Refice, Claudio Sasso |
| 2008 | Transmission power control techniques for MAC protocols in wireless sensor networks. Luiz Henrique A. Correia, José Marcos S. Nogueira |
| 2008 | UTRAN O&M support system with statistical fault identification and customizable rule sets. Yoshinori Watanabe, Yasuhiko Matsunaga, Kosei Kobayashi, Toshio Tonouchi, Tomohiro Igakura, Shinji Nakadai, Kenichirou Kamachi |
| 2008 | Unsupervised learning algorithms for intrusion detection. Stefano Zanero, Giuseppe Serazzi |
| 2008 | Using machine learning for non-intrusive modeling and prediction of software aging. Artur Andrzejak, Luís Moura Silva |
| 2008 | Using mixed integer programming to schedule it change requests. Leila Zia, Yixin Diao, Christopher Ward, Kamal Bhattacharya |
| 2008 | Using trust for key distribution and route selection in Wireless Sensor Networks. Nathan Lewis, Noria Foukia, Donovan G. Govan |
| 2008 | Utility-based placement of dynamic Web applications with fairness goals. David Carrera, Malgorzata Steinder, Ian Whalley, Jordi Torres, Eduard Ayguadé |
| 2008 | Value network model for service ecosystem in business environment. Feng Li, Chunhua Tian, Rongzeng Cao, Shun Jiang |
| 2008 | Wavelength conversion architectures in OBS networks. José Maranhão Neto, Helio Waldman, André Soares, William Giozza |
| 2008 | Web services monitoring: An initial case study on the tools perspective. Aimilios Chourmouziadis, George Pavlou |
| 2008 | WiMAX network performance monitoring & optimization. Qi Zhang, H. Dam |
| 2008 | Wire-speed application flow generation in hardware platform for multi-gigabit traffic monitoring. Taesang Choi, Sangsik Yoon, Dongwon Kang, Sangwan Kim, Joonkyung Lee, Kyeongho Lee |