By Topic

IEEE Transactions on Network and Service Management

Issue 3 • Date September 2009

Filter Results

Displaying Results 1 - 6 of 6
  • IEEE Transactions on Network and Service Management [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • A lightweight policy system for body sensor networks

    Publication Year: 2009, Page(s):137 - 148
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2037 KB) | HTML iconHTML

    Body sensor networks (BSNs) for healthcare have more stringent security and context adaptation requirements than required in large-scale sensor networks for environment monitoring. Policy-based management enables flexible adaptive behavior by supporting dynamic loading, enabling and disabling of policies without shutting down nodes. This overcomes many of the limitations of sensor operating system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving file distribution performance by grouping in peer-to-peer networks

    Publication Year: 2009, Page(s):149 - 162
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (705 KB) | HTML iconHTML

    It has been shown that the peer-to-peer paradigm is more efficient than the traditional client-server model for file sharing among a large number of users. Given a group of leechers who wants to download a single file and a group of seeds who possesses the whole file, the minimum time needed for distributing the file to all users can be calculated based on their bandwidth availabilities. A schedul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating network domain entry and exit point/path for DDoS attack traffic

    Publication Year: 2009, Page(s):163 - 174
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    A method to determine entry and exit points or paths of DDoS attack traffic flows into and out of network domains is proposed. We observe valid source addresses seen by routers from sampled traffic under non-attack conditions. Under attack conditions, we detect route anomalies by determining which routers have been used for unknown source addresses, to construct the attack paths. We consider deplo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed adaptive diverse routing for voice-over-IP in service overlay networks

    Publication Year: 2009, Page(s):175 - 189
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1268 KB) | HTML iconHTML

    This paper proposes a novel mechanism to discover delay-optimal diverse paths using distributed learning automata for Voice-over-IP (VoIP) routing in service overlay networks. In addition, a novel link failure detection method is proposed for detecting and recovering from link failures to reduce the number of dropped voice sessions. The main contributions of this paper are a decentralized, scalabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID system management: state-of-the art and open research issues

    Publication Year: 2009, Page(s):190 - 205
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB) | HTML iconHTML

    Radiofrequency identification (RFID) is an enabling technology that can provide organizations with unprecedented improved visibility and traceability of items throughout their journey in the value chain. As RFID deployments are scaling-up from pilot projects and proof-of-concept trials towards fully-fledged enterprise applications, RFID system management challenges will escalate. This paper takes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Network and Service Management will publish (online only) peerreviewed archival quality papers that advance the state-of-the-art and practical applications of network and service management.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Rolf Stadler
Laboratory for Communication Networks
KTH Royal Institute of Technology
Stockholm
Sweden
stadler@kth.se