default search action
Journal of Network and Systems Management, Volume 13
Volume 13, Number 1, March 2005
Thresholds
- Ahmed M. Al-Naamany, Hadj Bourdoucen:
TCP Congestion Control Approach for Improving Network Services. 1-6
- Wayne D. Grover, David Tipper:
Design and Operation of Survivable Networks. 7-11
- Rajarshi Gupta, Eric C. Chi, Jean C. Walrand:
Different Algorithms for Normal and Protection Paths. 13-33 - Arie M. C. A. Koster, Adrian Zymolka, Monika Jäger, Ralf Huelsermann:
Demand-wise Shared Protection for Meshed Optical Networks. 35-55 - Eligijus Kubilinskas, Michal Pióro, Pål Nilsson:
Design models for Robust Multi-Layer Next Generation Internet Core Networks Carrying Elastic Traffic. 57-76 - Florent Mobiot, Brunilde Sansò, André Girard:
Design of Reliable IP/GMPLS Networks: An Integrated Approach. 77-97 - Sebastian Orlowski, Roland Wessäly:
Comparing Restoration Concepts using Optimal Network Configurations with Integrated Hardware and Routing Decisions. 99-118 - Péter Hegyi, Markosz Maliosz, Ákos Ladányi, Tibor Cinkler:
Virtual Private/Overlay Network Design with Traffic Concentration and Shared Protection. 119-138
Volume 13, Number 2, June 2005
Thresholds
- Eric Klein:
Moving or Merging IT Departments? J. Netw. Syst. Manag. 13(2) (2005)
- Alexander Keller, Marcus Brunner:
Self-Managing Systems and Networks. 147-149
- Norman Bobroff, Lily B. Mummert:
Design and Implementation of a Resource Manager in a Distributed Database System. 151-174 - Artur Andrzejak, Mehmet Ceyran:
Characterizing and Predicting Resource Demand by Periodicity Mining. 175-196 - Spyros Voulgaris, Daniela Gavidia, Maarten van Steen:
CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays. 197-217 - Mark Brodie, Sheng Ma, Leonid Rachevsky, Jon Champlin:
Automated Problem Determination using Call-Stack Matching. 219-237
Volume 13, Number 3, September 2005
- Paul Brusil, John Hale:
The Shifting Sands of Security Management. 241-245 - M. E. Kabay:
Improving Information Assurance Education Key to Improving Secure(ity) Management. 247-251 - Jerald Dawkins, K. Clark, Gavin Manes, Mauricio Papa:
A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks. 253-267 - Yi Hu, Brajendra Panda:
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. 269-291 - Ganapathi Padmavathi, Samukutty Annadurai:
Improved Key Management Technique for Secure Multicasting over IP. 293-308 - Carla Merkle Westphall, Joni da Silva Fraga:
Mandatory and Discretionary Policies for CORBA Security. 309-328 - Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi:
NetGlean: A Methodology for Distributed Network Security Scanning. 329-344 - Prem Chand:
Building A Standards Driven Security Framework for New Generation Operations Software and Systems (NGOSS) - The TeleManagement Forum (TMF) Approach. 345-350 - Alexander Clemm, Olivier Festor, Aiko Pras:
Managing New Networked Worlds - A Report on IM 2005. 351-354
Volume 13, Number 4, December 2005
- Yogesh Bhole, Adrian Popescu:
Measurement and Analysis of HTTP Traffic. 357-371 - Oussama Laouamri, Chouki Aktouf:
Towards a Complete SNMP-Based Supervision of System-on-Chips. 373-386 - Saravut Charcranoon, Tarek S. El-Bawab, Jong-Dug Shin, Hakki C. Cankaya:
Framework for Operation and Maintenance (OAM) in Optical Burst Switched Networks. 387-408 - Jianguo Ding, Bernd J. Krämer, Yingcai Bai, Hansheng Chen:
Backward Inference in Bayesian Networks for Distributed Systems Management. 409-427 - Lars-Olof Burchard:
Networks with Advance Reservations: Applications, Architecture, and Performance. 429-449 - Dimitris Alexopoulos, John Soldatos:
XMLNET: An Architecture for Cost Effective Network Management Based on XML Technologies. 451-477 - Remi Badonnel, Radu State, Olivier Festor, André Schaff:
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks. 479-497 - Alexander Clemm, Olivier Festor, Aiko Pras:
Managing New Networked Worlds - A Report on IM 2005. 499-502
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.