Sciweavers

CONEXT
2010
ACM
13 years 9 months ago
Is content publishing in BitTorrent altruistic or profit-driven?
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity ...
Rubén Cuevas Rumín, Michal Kryczka, ...
CONEXT
2010
ACM
13 years 9 months ago
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist rese...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
CONEXT
2010
ACM
13 years 9 months ago
Assessing the vulnerability of replicated network services
Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a serv...
George Dean Bissias, Brian Neil Levine, Ramesh K. ...
CONEXT
2010
ACM
13 years 9 months ago
Auto-configuration of 802.11n WLANs
Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of...
Mustafa Y. Arslan, Konstantinos Pelechrinis, Ioann...
CNSM
2010
13 years 9 months ago
Rule-based SLA management for revenue maximisation in Cloud Computing Markets
This paper introduces several Business Rules for maximising the revenue of Providers in Cloud Computing Markets. These rules apply in both negotiation and execution time, and enfor...
Mario Macías, Josep Oriol Fitó, Jord...
CNSM
2010
13 years 9 months ago
Moving core services to the edge in NGNs for reducing managed infrastructure size
Telco providers are in the phase of migrating their services from PSTN to so called Next Generation Networks (NGNs) based on standard IP connectivity. This switch is expected to pr...
Roberto Baldoni, Roberto Beraldi, Giorgia Lodi, Ma...
CNSM
2010
13 years 9 months ago
Evaluating impact of manageability features on device performance
Manageability is a key design constraint for IT solutions, defined as the range of operations required to maintain and administer system resources through their lifecycle phases. E...
Jacob Leverich, Vanish Talwar, Parthasarathy Ranga...
CNSM
2010
13 years 9 months ago
Virtual platform support for QoS management in IMS based multiple provider networks
1 -- Design of a Set-top Box (STB) is presented to provide virtual platforms such that it can support multiple service providers. Each service provider is able to manage its own mu...
Muhammad Shoaib Siddiqui, Choong Seon Hong, Young-...
CNSM
2010
13 years 9 months ago
CRAC: Confidentiality risk assessment and IT-infrastructure comparison
Confidentiality is a critical aspect in todays Risk Assessment (RA) practices for many industrial organizations. Assessing confidentiality risks is challenging and the result of a ...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel...