Scheduled System Maintenance
On Saturday, October 21, single article sales and account management will be unavailable until 6 PM ET.
Notice: There is currently an issue with the citation download feature. Learn more.

2016 12th International Conference on Network and Service Management (CNSM)

Oct. 31 2016-Nov. 4 2016

Filter Results

Displaying Results 1 - 25 of 79
  • Index

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (345 KB)
    Freely Available from IEEE
  • Welcome message from CNSM 2016 chairs

    Publication Year: 2016, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (253 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2016, Page(s):iv - vi
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Other reviewers

    Publication Year: 2016, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Program at a glance

    Publication Year: 2016, Page(s):viii - xiv
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Detailed program

    Publication Year: 2016, Page(s):xv - xxiv
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2016, Page(s):xxv - xxix
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Papers by title

    Publication Year: 2016, Page(s):xxx - xxxii
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2016, Page(s): xxxiii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Workshops

    Publication Year: 2016, Page(s): xxxiv
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • ManSDN/NFV 2016: The 3rd International workshop on management of SDN and NFV systems (ManSDN/NFV 2016) — Program

    Publication Year: 2016, Page(s):xxxv - xxxvi
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • ManSDN/NFV 2016: The 3rd International workshop on management of SDN and NFV systems (ManSDN/NFV 2016) — Committees

    Publication Year: 2016, Page(s): xxxvii
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • GISN 2016: International workshop on green ICT and smart networking (GISN 2016) — Program

    Publication Year: 2016, Page(s):xxxviii - xxxix
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • GISN 2016: International workshop on green ICT and smart networking (GISN 2016) — Committees

    Publication Year: 2016, Page(s): xl
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • A connectionist approach to dynamic resource management for virtualised network functions

    Publication Year: 2016, Page(s):1 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (723 KB) | HTML iconHTML

    Network Functions Virtualisation (NFV) continues to gain attention as a paradigm shift in the way telecommunications services are deployed and managed. By separating Network Functions (NFs) from traditional middleboxes, NFV is expected to lead to reduced CAPEX and OPEX, and to more agile services. However, one of the main challenges to achieving these objectives is on how physical resources can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boost online virtual network embedding: Using neural networks for admission control

    Publication Year: 2016, Page(s):10 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    The allocation of physical resources to virtual networks, i.e., the virtual network embedding (VNE), is still an on-going research field due to its problem complexity. While many solutions for the online VNE problem exist, only few have focused on methods that can be generally applied for optimization of online embeddings. In this paper, we propose an admission control based on a Recurrent Neural ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ReNoVatE: Recovery from node failure in virtual network embedding

    Publication Year: 2016, Page(s):19 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Network visualization (NV) has evolved as a key enabling technology for offering the next generation network services. Recently, it is being rolled out in data center networks as a means to provide bandwidth guarantees to cloud applications. With increasing deployments of virtual networks (VNs) in commercial-grade networks with commodity hardware, VNs need to tackle failures in the underlying subs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SWAN: Base-band units placement over reconfigurable wireless front-hauls

    Publication Year: 2016, Page(s):28 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5584 KB) | HTML iconHTML

    Small-cells are rapidly emerging as the mobile operators' choice to provide additional capacity in current and future mobile networks. However, in order to fully deliver on their promises, small-cells need to address severe interference control and coordination challenges. By centralizing base-band processing in large high-volume computing infrastructures, Cloud-RAN can effectively enable advanced... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantifying the service performance impact of self-organizing network actions

    Publication Year: 2016, Page(s):37 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    As smartphone users increasingly rely on cellular networks to access voice, video, and web applications, guaranteeing good performance and high availability is more important than ever. Historically, managing cellular network configuration has been a manual, error-prone process; recently, automated solutions such as SON (Self-Organizing Networks) controllers are being deployed for dynamic tuning o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Steiner tree-based verification approach for handling topology changes in self-organizing networks

    Publication Year: 2016, Page(s):46 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    In today's Self-Organizing Networks (SONs) we differentiate between closed-loop functions, which have a predefined absolute goal, and such that form an action plan that achieves a high expected utility. Both function types perform changes to Configuration Management (CM) parameters, but only the second type may re-adapt the action plan in order to maximize the utility. A SON verification approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient detection of flow anomalies with limited monitoring resources

    Publication Year: 2016, Page(s):55 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    Real time detection of flow anomalies is a critical part of wide range of management and security applications in many Cloud and NFV systems. Solutions based on per-flow records have become impossible due to the increasing traffic volumes and the limited available resources such as TCAM entries and fast counters. In this paper we study a novel dynamic control mechanism that allows detecting flow a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correlating network events and transferring labels in the presence of IP address anonymisation

    Publication Year: 2016, Page(s):64 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    The availability of labelled data, i.e. ground-truth or reference data, is typically a requirement for performing network research, especially for network security research. Labelled data, however, are sparsely available. Data sets present in repositories such as CAIDA or PREDICT are mostly missing labels and have IP addresses anonymised. Especially the latter compounds correlating these data sets... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Web service response time percentiles

    Publication Year: 2016, Page(s):73 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (747 KB) | HTML iconHTML

    Predicting Web service response time percentiles is often an important aspect of service level management exercises. Existing techniques can be very time consuming since they involve the manual construction of complex analytic or simulation models. To address this problem, we propose Prospective, a fully automated and data-driven approach for predicting Web service response time percentiles. Prosp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic server selection strategy for multi-server HTTP adaptive streaming services

    Publication Year: 2016, Page(s):82 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    HTTP Adaptive Streaming (HAS) has become the de facto standard technology for the delivery of video streaming services. Current adaptation heuristics for HAS focus on the selection of the optimal quality representation to be delivered from a single server. However, many content providers use multiple content servers storing replicas of the segmented video or are deployed over Content Delivery Netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.