Sciweavers

CNSM
2010
13 years 2 months ago
Towards non-expert users monitoring networks and services through semantically enhanced visualizations
— Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources...
Owen Conlan, John Keeney, Cormac Hampson, Fion&aac...
CNSM
2010
13 years 5 months ago
Semantic scheduling of active measurements for meeting network monitoring objectives
Network control and management techniques (e.g., dynamic path switching, on-demand bandwidth provisioning) rely on active measurements of end-to-end network status. These measureme...
Prasad Calyam, Lakshmi Kumarasamy, Füsun &Oum...
CNSM
2010
13 years 5 months ago
Capacity planning and power management to exploit sustainable energy
This paper describes an approach for designing a power management plan that matches the supply of power with the demand for power in data centers. Power may come from the grid, fro...
Daniel Gmach, Jerry Rolia, Cullen Bash, Yuan Chen,...
CNSM
2010
13 years 7 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...
CNSM
2010
13 years 8 months ago
Automated and secure IPv6 configuration in enterprise networks
Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability...
Frederic Beck, Olivier Festor, Isabelle Chrisment,...
CNSM
2010
13 years 9 months ago
Rule-based SLA management for revenue maximisation in Cloud Computing Markets
This paper introduces several Business Rules for maximising the revenue of Providers in Cloud Computing Markets. These rules apply in both negotiation and execution time, and enfor...
Mario Macías, Josep Oriol Fitó, Jord...
CNSM
2010
13 years 9 months ago
Moving core services to the edge in NGNs for reducing managed infrastructure size
Telco providers are in the phase of migrating their services from PSTN to so called Next Generation Networks (NGNs) based on standard IP connectivity. This switch is expected to pr...
Roberto Baldoni, Roberto Beraldi, Giorgia Lodi, Ma...
CNSM
2010
13 years 9 months ago
Evaluating impact of manageability features on device performance
Manageability is a key design constraint for IT solutions, defined as the range of operations required to maintain and administer system resources through their lifecycle phases. E...
Jacob Leverich, Vanish Talwar, Parthasarathy Ranga...
CNSM
2010
13 years 9 months ago
Virtual platform support for QoS management in IMS based multiple provider networks
1 -- Design of a Set-top Box (STB) is presented to provide virtual platforms such that it can support multiple service providers. Each service provider is able to manage its own mu...
Muhammad Shoaib Siddiqui, Choong Seon Hong, Young-...
CNSM
2010
13 years 9 months ago
CRAC: Confidentiality risk assessment and IT-infrastructure comparison
Confidentiality is a critical aspect in todays Risk Assessment (RA) practices for many industrial organizations. Assessing confidentiality risks is challenging and the result of a ...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel...