23-27 May 2011
Filter Results
-
[Front cover]
Publication Year: 2011, Page(s): c1|
PDF (145 KB)
-
[Copyright notice]
Publication Year: 2011, Page(s): 1|
PDF (100 KB)
-
Table of contents - IM 2011
Publication Year: 2011, Page(s):1 - 13|
PDF (180 KB)
-
Programme at a glance
Publication Year: 2011, Page(s): 1|
PDF (123 KB)
-
Welcome message from the general co-chairs
Publication Year: 2011, Page(s):1 - 2 -
Welcome message from the technical program committee co-chairs
Publication Year: 2011, Page(s):1 - 2 -
Sponsor logos
Publication Year: 2011, Page(s): 1|
PDF (427 KB)
-
IFIP/IEEE IM 2011 Committees
Publication Year: 2011, Page(s):1 - 6|
PDF (255 KB)
-
Keynotes
Publication Year: 2011, Page(s):1 - 4These keynote speeches discuss the following:cloud computing; stalking the wily Homunculus and other adventures in network management; managing the next wave of mobile broadband networks; and information-centric networking. View full abstract»
-
Welcome message from the workshop co-chairs
Publication Year: 2011, Page(s):1 - 3 -
Welcome message from the workshop co-chairs
Publication Year: 2011, Page(s):1 - 3 -
Welcome message from the workshop co-chairs
Publication Year: 2011, Page(s):1 - 2 -
Welcome message from the workshop co-chairs
Publication Year: 2011, Page(s):1 - 4 -
Welcome message from the workshop co-chairs
Publication Year: 2011, Page(s):1 - 3 -
An information plane architecture supporting home network management
Publication Year: 2011, Page(s):1 - 8
Cited by: Papers (10)Home networks have evolved to become small-scale versions of enterprise networks. The tools for visualizing and managing such networks are primitive and continue to require networked systems expertise on the part of the home user. As a result, non-expert home users must manually manage non-obvious aspects of the network - e.g., MAC address filtering, network masks, and firewall rules, using these ... View full abstract»
-
Flow signatures of popular applications
Publication Year: 2011, Page(s):9 - 16
Cited by: Papers (2)Network flow data is widely used to analyze the protocol mix forwarded by a router or to identify anomalies that may be caused by hardware and software failures, configuration errors, or intrusion attempts. The goal of our research is to find application signatures in network flow traces that can be used to pinpoint certain applications, such as specific web browsers, mail clients, or media-player... View full abstract»
-
On the merits of popularity prediction in multimedia content caching
Publication Year: 2011, Page(s):17 - 24
Cited by: Papers (7)In recent years, telecom operators have been moving away from traditional, broadcast-driven, television towards IP-based, interactive and on-demand services. Consequently, multicast is no longer a viable solution to limit the amount of traffic in the IP-TV network. In order to counter an explosion in generated traffic, caches can be strategically placed throughout the content delivery infrastructu... View full abstract»
-
An auditing system for multi-domain IP carrying Service Level Agreements
Publication Year: 2011, Page(s):25 - 32Service Level Agreements (SLAs) are well-known from a large variety of business branches. However, despite the increasing importance of the Internet and electronic communication, a fairly low dissemination of IP carrying SLAs is observed. IP carrying SLAs are offered by Internet Service Providers (ISPs) documenting network service levels such as maximum packet loss, maximum packet delay, or availa... View full abstract»
-
Distributed inter-domain SLA negotiation using Reinforcement Learning
Publication Year: 2011, Page(s):33 - 40
Cited by: Papers (4)Applications requiring network Quality of Service (QoS) (e.g. telepresence, cloud computing, etc.) are becoming mainstream. To support their deployment, network operators must automatically negotiate end-to-end QoS contracts (aka. Service Level Agreements, SLAs) and configure their networks accordingly. Other crucial needs must be considered: QoS should provide incentives to network operators, and... View full abstract»
-
Impact analysis of BGP sessions for prioritization of maintenance operations
Publication Year: 2011, Page(s):41 - 48Network operators in large-scale networks are often faced with long lists of maintenance tasks and find it difficult to track the relative importance of these tasks, without knowing their impact on the network's operation. As a result, operators may react slowly to critical tasks, increasing network downtime and maintenance costs. We present a system that quantifies the impact of maintenance tasks... View full abstract»
-
A data confidentiality architecture for developing management mashups
Publication Year: 2011, Page(s):49 - 56Mashups are powerful applications created from accessing and composing multiple and distributed information sources. Their ease-of-use and modularity allow users at any skill level to construct, share and integrate their own applications. However, data security concerns remain a hindering factor in its widespread adoption, in particular, for network management. In this paper, we propose a novel de... View full abstract»
-
Managing data retention policies at scale
Publication Year: 2011, Page(s):57 - 64
Cited by: Papers (1) | Patents (1)Compliance with regulatory policies on data remains a key hurdle to cloud computing. Policies such as EU privacy, HIPAA, and PCI-DSS place requirements on data availability, integrity, migration, retention, and access, among many others. This paper proposes a policy management service that offers scalable management of data retention policies attached to data objects stored in a cloud environment.... View full abstract»
-
Run-time performance optimization and job management in a data protection solution
Publication Year: 2011, Page(s):65 - 72
Cited by: Papers (1)The amount of stored data in enterprise Data Centers quadruples every 18 months. This trend presents a serious challenge for backup management and sets new requirements for performance efficiency of traditional backup and archival tools. In this work, we discuss potential performance shortcomings of the existing backup solutions. During a backup session a predefined set of objects (client filesyst... View full abstract»
-
Towards efficient resource management for data-analytic platforms
Publication Year: 2011, Page(s):73 - 80
Cited by: Papers (1)We present architectural and experimental work exploring the role of intermediate data handling in the performance of MapReduce workloads. Our findings show that: (a) certain jobs are more sensitive to disk cache size than others and (b) this sensitivity is mostly due to the local file I/O for the intermediate data. We also show that a small amount of memory is sufficient for the normal needs of m... View full abstract»
-
A prototype for in-network management in NaaS-enabled networks
Publication Year: 2011, Page(s):81 - 88
Cited by: Papers (2)In-network management (INM) is a paradigm for distributed and embedded management for future networks. One of its main design goals is to be used in conjunction with Network-as-a-Service (NaaS)-enabled networks, which need to be managed efficiently, in a way that requires only little manual interaction, and across administrative network domains. In this paper, we present an elaborate an INM protot... View full abstract»