- Giang Bui, Prasad Calyam, Brittany Morago, Ronny Bazan Antequera, Trung Nguyen, Ye Duan:
LIDAR-based virtual environment study for disaster response scenarios. IM 2015: 790-793 - Marcel Caria, Tamal Das, Admela Jukan:
Divide and conquer: Partitioning OSPF networks with SDN. IM 2015: 467-474 - Christian Cervantes, Diego Poplade, Michele Nogueira, Aldri Santos:
Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. IM 2015: 606-611 - Zhuo Cheng, Haitao Zhang, Yasuo Tan, Azman Osman Lim:
Greedy scheduling with feedback control for overloaded real-time systems. IM 2015: 934-937 - Alexander Clemm, Mouli Chandramouli, Nitish Gupta, Robert Lerche, Ashwin Pankaj, Manjunath Patil, Ganesan Rajam, V. Anbalagan, Joe Zhang, Yifan Zhang:
DNA: An SDN framework for Distributed Network Analytics (Demo Paper). IM 2015: 1143-1144 - Alexander Clemm, Mouli Chandramouli, Sailesh Krishnamurthy:
DNA: An SDN framework for distributed network analytics. IM 2015: 9-17 - Kevin Collados, Juan-Luis Gorricho, Joan Serrat, Hu Zheng, Ke Xu:
An intelligent two-agent self-configuration approach for radio resource management. IM 2015: 706-712 - Weverton Luis da Costa Cordeiro, Luciano Paschoal Gaspary:
Limiting fake accounts in large-scale distributed systems through adaptive identity management. IM 2015: 1092-1098 - Antonio Corradi, Giovanni Curatola, Luca Foschini, Raffaele Ianniello, Carlos Roberto De Rolt:
Automatic extraction of POIs in smart cities: Big data processing in ParticipAct. IM 2015: 1059-1064 - Rostand Costa, Raphael Resende, Stenio Fernandes:
Urban data collectors: A pragmatic approach to leveraging urban sensing. IM 2015: 886-889 - Matthieu Coudron, Stefano Secci, Guy Pujolle:
Differentiated pacing on multiple paths to improve one-way delay estimations. IM 2015: 672-678 - Tiago Cruz, Jorge Barrigas, Jorge Proença, Antonio Graziano, Stefano Panzieri, Leonid Lev, Paulo Simões:
Improving network security monitoring for industrial control systems. IM 2015: 878-881 - Ramide Dantas, Djamel Sadok, Christofer Flinta, Andreas Johnsson:
KVM virtualization impact on active round-trip time measurements. IM 2015: 810-813 - Cuong T. Do, Nguyen Hoang Tran, Dai Hoang Tran, Chuan Pham, Md. Golam Rabiul Alam, Choong Seon Hong:
Toward service selection game in a heterogeneous market cloud computing. IM 2015: 44-52 - Rafael Pereira Esteves, Lisandro Zambenedetti Granville:
Application-Aware adaptive provisioning in virtualized networks. IM 2015: 1107-1113 - Tao Feng, Jun Bi, Peiyao Xiao, Xiuli Zheng:
Hybrid SDN architecture to integrate with legacy control and management plane: An experiences-based study. IM 2015: 754-757 - Germano Fenner, Alberto Sampaio Lima, José Neuman de Souza, Antão Moura, Rossana M. de Castro Andrade:
A system dynamics model for managing service desk capacity. IM 2015: 1424-1427 - Vahid Aghaei Foroushani, Nur Zincir-Heywood:
Investigating unique flow marking for tracing back DDoS attacks. IM 2015: 762-765 - Carolina Fortuna, Milorad Tosic, Mikolaj Chwalisz, Peter De Valck, Ingrid Moerman, Ivan Seskar:
Representation of spectrum sensing experimentation functionality for federated management and control. IM 2015: 1226-1229 - Borislava Gajic, Szabolcs Nováczki, Stephen S. Mwanje:
An improved anomaly detection in mobile networks by using incremental time-aware clustering. IM 2015: 1286-1291 - Steffen Gebert, Christian Schwartz, Thomas Zinner, Phuoc Tran-Gia:
Continuously delivering your network. IM 2015: 766-769 - Ebrahim Ghazisaeedi, Changcheng Huang, James Yan:
Off-peak energy-wise link reconfiguration for virtualized network environment. IM 2015: 814-817 - Ioana Giurgiu, Adela-Diana Almasi, Dorothea Wiesmann:
Do you know how to configure your enterprise relational database to reduce incidents? IM 2015: 339-347 - Genady Ya. Grabarnik, Mauro Tortonesi, Larisa Shwartz:
Business-driven configuration of IT services in public and hybrid clouds based on performance forecasting. IM 2015: 826-829 - Martin Grill, Ivan Nikolaev, Veronica Valeros, Martin Rehák:
Detecting DGA malware using NetFlow. IM 2015: 1304-1309 - Kailing Guo, Ying Wang, Xuesong Qiu, Wenjing Li, Ailing Xiao:
Particle swarm optimization based multi-domain virtual network embedding. IM 2015: 798-801 - Soroush Haeri, Rajvir Gill, Marilyn Hay, Toby Wong, Ljiljana Trajkovic:
Multihoming with locator/ID Separation Protocol: An experimental testbed. IM 2015: 1238-1241 - Subir Halder, Amrita Ghosal:
Lifetime maximizing clustering structure using archimedes' spiral based deployment in WSNs. IM 2015: 592-598 - Ryo Hamamoto, Chisa Takano, Hiroyasu Obata, Kenji Ishida, Tutomu Murase:
An access point selection mechanism based on cooperation of access points and users movement. IM 2015: 926-929 - Balkis Hamdane, Sihem Guemara El Fatmi:
A credential and encryption based access control solution for named data networking. IM 2015: 1234-1237