By Topic

12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops

Date 23-27 May 2011

Filter Results

Displaying Results 1 - 25 of 185
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Table of contents - IM 2011

    Publication Year: 2011, Page(s):1 - 13
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • Programme at a glance

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Welcome message from the general co-chairs

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (63 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from the technical program committee co-chairs

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • Sponsor logos

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (427 KB)
    Freely Available from IEEE
  • IFIP/IEEE IM 2011 Committees

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (255 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (61 KB)

    These keynote speeches discuss the following:cloud computing; stalking the wily Homunculus and other adventures in network management; managing the next wave of mobile broadband networks; and information-centric networking. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Welcome message from the workshop co-chairs

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (957 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from the workshop co-chairs

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (866 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from the workshop co-chairs

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (843 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from the workshop co-chairs

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (964 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from the workshop co-chairs

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (869 KB) | HTML iconHTML
    Freely Available from IEEE
  • An information plane architecture supporting home network management

    Publication Year: 2011, Page(s):1 - 8
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (931 KB) | HTML iconHTML

    Home networks have evolved to become small-scale versions of enterprise networks. The tools for visualizing and managing such networks are primitive and continue to require networked systems expertise on the part of the home user. As a result, non-expert home users must manually manage non-obvious aspects of the network - e.g., MAC address filtering, network masks, and firewall rules, using these ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow signatures of popular applications

    Publication Year: 2011, Page(s):9 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB) | HTML iconHTML

    Network flow data is widely used to analyze the protocol mix forwarded by a router or to identify anomalies that may be caused by hardware and software failures, configuration errors, or intrusion attempts. The goal of our research is to find application signatures in network flow traces that can be used to pinpoint certain applications, such as specific web browsers, mail clients, or media-player... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the merits of popularity prediction in multimedia content caching

    Publication Year: 2011, Page(s):17 - 24
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1792 KB) | HTML iconHTML

    In recent years, telecom operators have been moving away from traditional, broadcast-driven, television towards IP-based, interactive and on-demand services. Consequently, multicast is no longer a viable solution to limit the amount of traffic in the IP-TV network. In order to counter an explosion in generated traffic, caches can be strategically placed throughout the content delivery infrastructu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An auditing system for multi-domain IP carrying Service Level Agreements

    Publication Year: 2011, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1646 KB) | HTML iconHTML

    Service Level Agreements (SLAs) are well-known from a large variety of business branches. However, despite the increasing importance of the Internet and electronic communication, a fairly low dissemination of IP carrying SLAs is observed. IP carrying SLAs are offered by Internet Service Providers (ISPs) documenting network service levels such as maximum packet loss, maximum packet delay, or availa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed inter-domain SLA negotiation using Reinforcement Learning

    Publication Year: 2011, Page(s):33 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1137 KB) | HTML iconHTML

    Applications requiring network Quality of Service (QoS) (e.g. telepresence, cloud computing, etc.) are becoming mainstream. To support their deployment, network operators must automatically negotiate end-to-end QoS contracts (aka. Service Level Agreements, SLAs) and configure their networks accordingly. Other crucial needs must be considered: QoS should provide incentives to network operators, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact analysis of BGP sessions for prioritization of maintenance operations

    Publication Year: 2011, Page(s):41 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1428 KB) | HTML iconHTML

    Network operators in large-scale networks are often faced with long lists of maintenance tasks and find it difficult to track the relative importance of these tasks, without knowing their impact on the network's operation. As a result, operators may react slowly to critical tasks, increasing network downtime and maintenance costs. We present a system that quantifies the impact of maintenance tasks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A data confidentiality architecture for developing management mashups

    Publication Year: 2011, Page(s):49 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1771 KB) | HTML iconHTML

    Mashups are powerful applications created from accessing and composing multiple and distributed information sources. Their ease-of-use and modularity allow users at any skill level to construct, share and integrate their own applications. However, data security concerns remain a hindering factor in its widespread adoption, in particular, for network management. In this paper, we propose a novel de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing data retention policies at scale

    Publication Year: 2011, Page(s):57 - 64
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1376 KB) | HTML iconHTML

    Compliance with regulatory policies on data remains a key hurdle to cloud computing. Policies such as EU privacy, HIPAA, and PCI-DSS place requirements on data availability, integrity, migration, retention, and access, among many others. This paper proposes a policy management service that offers scalable management of data retention policies attached to data objects stored in a cloud environment.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Run-time performance optimization and job management in a data protection solution

    Publication Year: 2011, Page(s):65 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1818 KB) | HTML iconHTML

    The amount of stored data in enterprise Data Centers quadruples every 18 months. This trend presents a serious challenge for backup management and sets new requirements for performance efficiency of traditional backup and archival tools. In this work, we discuss potential performance shortcomings of the existing backup solutions. During a backup session a predefined set of objects (client filesyst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards efficient resource management for data-analytic platforms

    Publication Year: 2011, Page(s):73 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2110 KB) | HTML iconHTML

    We present architectural and experimental work exploring the role of intermediate data handling in the performance of MapReduce workloads. Our findings show that: (a) certain jobs are more sensitive to disk cache size than others and (b) this sensitivity is mostly due to the local file I/O for the intermediate data. We also show that a small amount of memory is sufficient for the normal needs of m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A prototype for in-network management in NaaS-enabled networks

    Publication Year: 2011, Page(s):81 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2332 KB) | HTML iconHTML

    In-network management (INM) is a paradigm for distributed and embedded management for future networks. One of its main design goals is to be used in conjunction with Network-as-a-Service (NaaS)-enabled networks, which need to be managed efficiently, in a way that requires only little manual interaction, and across administrative network domains. In this paper, we present an elaborate an INM protot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.