Default Cover Image

2017 13th International Conference on Network and Service Management (CNSM)

Nov. 26 2017 to Nov. 30 2017

Tokyo, Japan

Table of Contents

Author indexFreely available from IEEE.pp. 1-13
[Copyright notice]Freely available from IEEE.pp. 1-1
Enforcing free roaming among EU countries: An economic analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Can MPTCP secure Internet communications from man-in-the-middle attacks?Full-text access may be available. Sign in or learn about subscription options.pp. 1-7
A software-defined firewall bypass for congestion offloadingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Data driven selection of DRX for energy efficient 5G RANFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Resource provisioning for IoT application services in smart citiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Resource-aware placement of softwarised security services in cloud data centersFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Traffic optimization in anonymous networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Anomaly detection for openstack services with process-related topological analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Agent composition for 5G management and orchestrationFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A prediction-based dynamic resource management approach for network virtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Charting an intent driven networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Fill-in the gaps: Spatial-temporal models for missing dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
A path planning method of wireless sensor networks based on service priorityFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Applicability and limitations of a simple WiFi hotspot model for citiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
AutoFocus: Automatically scoping the impact of anomalous service eventsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Adaptive traffic monitoring for software dataplanesFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Scalability and reliability aware SDN controller placement strategiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
An autonomic and policy-based authorization framework for OpenFlow networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Measuring exposure in DDoS protection servicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Flexible functional split in 5G networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
A model-based application autonomic manager with fine granular bandwidth controlFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Regulating wireless access costs for not vertically integrated content providersFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Wireless LAN access point deployment and pricing with location-based advertisingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
GML learning, a generic machine learning model for network measurements analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Distributed-collaborative managed dash video servicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Adaptive and distributed monitoring mechanism in software-defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Risk prediction of the SCADA communication network based on entropy-gray modelFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
MULE: Multi-layer virtual network embeddingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
SDN enhancements for the sliced, deep programmable 5G coreFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
User association for load balancing in cellular network with hybrid cognitive radio relaysFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Network-integrated edge computing orchestrator for application placementFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Connectivity extraction in cloud infrastructuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Large-scale antennas analysis of untrusted relay system with cooperative jammingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Control plane latency reduction for service chaining in mobile edge computing systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A lightweight snapshot-based DDoS detectorFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Enabling low latency and high reliability for IMS-NFVFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Scheduling service function chains for ultra-low latency network servicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Identification of communication devices from analysis of traffic patternsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Cost-effective replica management in fault-tolerant cloud environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Efficient big link allocation scheme in virtualized software-defined networkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Reliable service function chain provisioning in software-defined networkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
BFD-based link latency measurement in software defined networkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Auto scaling of data plane VNFs in 5G networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Enhanced fast BSS transition on enterprise WLAN with SDN-based distribution systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Accurate delay measurement for parallel monitoring of probe flowsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Arena: Adaptive real-time update anomaly prediction in cloud systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Managing the availability of VNFs with the availability management frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Automated synthesis of NFV topology: A security requirement-oriented designFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Android malicious application detection using support vector machine and active learningFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
IPv6-specific misconfigurations in the DNSFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Simulation framework for impact assessment of next generation spectrum authorization regimesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Wireless sensor network-based service provision: A three-sided market modelFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Software-defined multipath-TCP for smart mobile devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Analyzing human mobility and social relationships from cellular network dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An evolutionary controllers' placement algorithm for reliable SDN networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
DiMob: Scalable and seamless mobility in SDN managed wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Design of virtual gateway in virtual software defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Pre-provisioning of local protection for handling dual-failures in OpenFlow-based networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Architecture for building hybrid kernel-user space virtual network functionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
On demand QoS with a SDN traffic engineering management (STEM) moduleFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Deadline-aware and energy-efficient dynamic flow scheduling in data center networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Cost- and energy-aware multi-flow mobile data offloading under time dependent pricingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Design of SDN based end-to-end routing over multiple domains for mobility managementFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Duopoly price competition in secondary spectrum marketsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
NeuRoute: Predictive dynamic routing for software-defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Detailed programFreely available from IEEE.pp. 1-15
Papers by titleFreely available from IEEE.pp. 1-7
Showing 95 out of 95