Sciweavers

AIMS
2009
Springer
14 years 6 months ago
Visualization of Node Interaction Dynamics in Network Traces
The analysis of network traces often requires to find the spots where something interesting happens. Since traces are usually very large data-sets, it is often not easy and time i...
Petar Dobrev, Sorin Stancu-Mara, Jürgen Sch&o...
AIMS
2009
Springer
14 years 6 months ago
Answering Queries Using Cooperative Semantic Caching
Andrei Vancea, Burkhard Stiller
AIMS
2009
Springer
14 years 6 months ago
Churn Tolerance Improvement Techniques in an Algorithm-Neutral DHT
Churn resilience is an important topic in DHT research. In this paper, I present techniques to improve churn resilience and their effects. All the techniques can be implemented i...
Kazuyuki Shudo
AIMS
2009
Springer
14 years 6 months ago
A Market-Based Pricing Scheme for Grid Networks
This paper presents a new market-based pricing scheme which aims to improve the link load balance in Grid networks. Simulation results show that the proposed scheme achieves a bett...
Peng Gao, Xingyao Wu, Tao Liu, David Hausheer
AIMS
2009
Springer
14 years 6 months ago
Dynamics of Resource Closure Operators
Abstract. We propose a framework for managing resources via convergent operators. Operators represent their need for a resource to a designated resource closure operator that manag...
Alva L. Couch, Marc Chiarini
AIMS
2009
Springer
14 years 6 months ago
Knowledge Management and Promises
Ontological modelling for machine inference has featured prominently in IT management research recently, but there is more immediate scope for knowledge modelling in the realm of h...
Mark Burgess
AIMS
2009
Springer
14 years 6 months ago
Towards Cost-Aware Multipath Routing
Abstract. Traditional approaches to multipath routing ignore the economic incentives necessary in aligning both networks and users towards a common goal. While theory suggests cong...
João Taveira Araújo, Miguel Rio, Geo...
AIMS
2009
Springer
14 years 6 months ago
NETCONF Interoperability Testing
The IETF has developed a network configuration management protocol called NETCONF which was published as proposed standard in 2006. The NETCONF protocol provides mechanisms to in...
Ha Manh Tran, Iyad Tumar, Jürgen Schönw&...
AIMS
2009
Springer
14 years 6 months ago
A Statistical Analysis of Network Parameters for the Self-management of Lambda-Connections
Network monitoring plays an important role in network management. Through the analysis of network parameters (e.g., flow throughput), managers can observe network behavior and mak...
Tiago Fioreze, Lisandro Zambenedetti Granville, Ra...
AIMS
2009
Springer
14 years 6 months ago
Scalable Detection and Isolation of Phishing
Abstract. This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and...
Giovane C. M. Moura, Aiko Pras