Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CNSM
CNSM 2017
Generate Citations
2017 13th International Conference on Network and Service Management (CNSM)
Nov. 26 2017 to Nov. 30 2017
Tokyo, Japan
Table of Contents
Author index
Freely available from IEEE.
pp. 1-13
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Enforcing free roaming among EU countries: An economic analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Patrick Maillé
,
Bruno Tuffin
Can MPTCP secure Internet communications from man-in-the-middle attacks?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ho-Dac-Duy Nguyen
,
Chi-Dung Phung
,
Stefano Secci
,
Benevid Felix
,
Michele Nogueira
A software-defined firewall bypass for congestion offloading
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Florian Heimgaertner
,
Mark Schmidt
,
David Morgenstern
,
Michael Menth
Data driven selection of DRX for energy efficient 5G RAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Diarmuid Corcoran
,
Loghman Andimeh
,
Andreas Ermedahl
,
Per Kreuger
,
Christian Schulte
A path layer for the Internet: Enabling network operations on encrypted protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Mirja Kühlewind
,
Tobias Bühler
,
Brian Trammell
,
Stephan Neuhaus
,
Roman Müntener
,
Gorry Fairhurst
Resource provisioning for IoT application services in smart cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
José Santos
,
Tim Wauters
,
Bruno Volckaert
,
Filip De Turck
Resource-aware placement of softwarised security services in cloud data centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Abeer Ali
,
Christos Anagnostopoulos
,
Dimitrios P. Pezaros
Traffic optimization in anonymous networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Patrik Kristel
,
Ján Lučanský
,
Ivan Kotuliak
Anomaly detection for openstack services with process-related topological analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tomonobu Niwa
,
Yuki Kasuya
,
Takeshi Kitahara
Capacity optimization for ultra-reliable low-latency communication in 5G — The SON perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Elke Roth-Mandutz
,
Abubaker-Matovu Waswa
,
Andreas Mitschele-Thiel
Agent composition for 5G management and orchestration
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Vilho Räisänen
A prediction-based dynamic resource management approach for network virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jiacong Li
,
Ying Wang
,
Zhanwei Wu
,
Sixiang Feng
,
Xuesong Qiu
Charting an intent driven network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yehia Elkhatib
,
Geoff Coulson
,
Gareth Tyson
An adaptive scaling mechanism for managing performance variations in network functions virtualization: A case study in an NFV-based EPC
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Carlos Hernán Tobar Arteaga
,
Fulvio Rissoi
,
Oscar Mauricio Caicedo Rendon
Fill-in the gaps: Spatial-temporal models for missing data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Ji Xue
,
Bin Nie
,
Evgenia Smirni
A path planning method of wireless sensor networks based on service priority
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Peng Li
,
Siya Xu
,
Kang Sun
,
Xuesong Qiu
,
Feng Qi
Applicability and limitations of a simple WiFi hotspot model for cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Michael Seufert
,
Christian Moldovan
,
Valentin Burger
,
Tobias HoBfeld
AutoFocus: Automatically scoping the impact of anomalous service events
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ren Quinn
,
Zihui Ge
,
He Yan
,
Jacobus Van der Merwe
Programmable residues defined networks for edge data centres
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Magnos Martinello
,
Alextian B. Liberato
,
Arash Farhadi Beldachi
,
Koteswararao Kondepu
,
Roberta L. Gomes
,
Rodolfo Villaca
,
Moisés R. N. Ribeiro
,
Yan Yan
,
Emilio Hugues-Salas
,
Dimitra Simeonidou
Adaptive traffic monitoring for software dataplanes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Gioacchino Tangari
,
Marinos Charalambides
,
Daphne Tuncer
,
George Pavlou
Scalability and reliability aware SDN controller placement strategies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Fetia Bannour
,
Sami Souihi
,
Abdelhamid Mellouk
An autonomic and policy-based authorization framework for OpenFlow networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Daniel Rosendo
,
Patricia Takako Endo
,
Djamel Sadok
,
Judith Kelner
Measuring exposure in DDoS protection services
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Mattijs Jonker
,
Anna Sperotto
Flexible functional split in 5G networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Davit Harutyunyan
,
Roberto Riggio
Delay-aware VNF placement and chaining based on a flexible resource allocation approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Abdelhamid Alleg
,
Toufik Ahmed
,
Mohamed Mosbah
,
Roberto Riggio
,
Raouf Boutaba
A model-based application autonomic manager with fine granular bandwidth control
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Nasim Beigi-Mohammadi
,
Mark Shtern
,
Marin Litoiu
Regulating wireless access costs for not vertically integrated content providers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xinyi Hu
,
George Kesidis
,
Seung Jun Baek
Wireless LAN access point deployment and pricing with location-based advertising
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Cheng Zhang
,
Zhi Liu
,
Bo Gu
,
Kyoko Yamori
,
Yoshiaki Tanaka
Two-way communication with wait-slot scheme for neighbor discovery process in dense Bluetooth low energy networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ting-Ting Yang
,
Hsueh-Wen Tseng
GML learning, a generic machine learning model for network measurements analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Pedro Casas
,
Juan Vanerio
,
Kensuke Fukuda
ORCHESTRA: Virtualized and programmable orchestration of heterogeneous WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Ensar Zeljković
,
Tom De Schepper
,
Patrick Bosch
,
Ian Vermeulen
,
Jetmir Haxhibeqiri
,
Jeroen Hoebeke
,
Jeroen Famaey
,
Steven Latré
An adaptive mechanism for LTE P-GW virtualization using SDN and NFV
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Luciano Jerez Chaves
,
Islene Calciolari Garcia
,
Edmundo Roberto Mauro Madeira
Distributed-collaborative managed dash video services
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Kemal E. Sahin
,
K. Tolga Bagci
,
A. Murat Tekalp
An empirical study of software reliability in SDN controllers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Petra Vizarreta
,
Kishor Trivedi
,
Bjarne Helvik
,
Poul Heegaard
,
Wolfgang Kellerer
,
Carmen Mas Machuca
Adaptive and distributed monitoring mechanism in software-defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xuan Thien Phan
,
Ignacio Dominguez Martinez-Casanueva
,
Kensuke Fukuda
Risk prediction of the SCADA communication network based on entropy-gray model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Meng Li
,
Wenjing Li
,
Peng Yu
,
Fanqin Zhou
MULE: Multi-layer virtual network embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Shihabur Rahman Chowdhury
,
Sara Ayoubi
,
Reaz Ahmed
,
Nashid Shahriar
,
Raouf Boutaba
,
Jeebak Mitra
,
Liu Liu
SDN enhancements for the sliced, deep programmable 5G core
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Fabian Eichhorn
,
Marius-Iulian Corici
,
Thomas Magedanz
,
Ping Du
,
Yoshiaki Kiriha
,
Akihiro Nakao
User association for load balancing in cellular network with hybrid cognitive radio relays
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hongfu Guo
,
Fanqin Zhou
,
Lei Feng
,
Peng Yu
,
Wenjing Li
Network-integrated edge computing orchestrator for application placement
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Vasileios Karagiannis
,
Apostolos Papageorgiou
Dynamic algorithm selection for the logic of tasks in IoT stream processing systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ehsan Poormohammady
,
Jens Helge Reelfs
,
Mirko Stoffers
,
Klaus Wehrle
,
Apostolos Papageorgiou
Connectivity extraction in cloud infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Pernelle Mensah
,
Samuel Dubus
,
Waël Kanoun
,
Christine Morin
,
Guillaume Piolle
,
Eric Totel
vFetch: Video prefetching using pseudo subscriptions and user channel affinity in YouTube
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Christian Koch
,
Benedikt Lins
,
Amr Rizk
,
Ralf Steinmetz
,
David Hausheer
Large-scale antennas analysis of untrusted relay system with cooperative jamming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xing Tan
,
Rui Zhao
,
Yuanjian Li
Control plane latency reduction for service chaining in mobile edge computing system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chi-Hsiang Hung
,
Yao-Chou Hsieh
,
Li-Chun Wang
A lightweight snapshot-based DDoS detector
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Gilles Roudière
,
Philippe Owezarski
Enabling low latency and high reliability for IMS-NFV
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Muhammad Taqi Raza
,
Songwu Lu
MD-IDN: Multi-domain intent-driven networking in software-defined infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Saeed Arezoumand
,
Kristina Dzeparoska
,
Hadi Bannazadeh
,
Alberto Leon-Garcia
Scheduling service function chains for ultra-low latency network services
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Hyame Assem Alameddine
,
Long Qu
,
Chadi Assi
Identification of communication devices from analysis of traffic patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Hiroki Kawai
,
Shingo Ata
,
Nobuyuki Nakamura
,
Ikuo Oka
Cost-effective replica management in fault-tolerant cloud environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Bart Spinnewyn
,
Juan Felipe Botero
,
Steven Latré
Efficient big link allocation scheme in virtualized software-defined networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Wontae Jeong
,
Gyeongsik Yang
,
Seong-Mun Kim
,
Chuck Yoo
Evaluating the impact of SDN-induced frequent route changes on TCP flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Radu Cârpa
,
Marcos Dias de AssunçÃo
,
Olivier Glück
,
Laurent LefÈvre
,
Jean-Christophe Mignot
Reliable service function chain provisioning in software-defined networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Yansen Xu
,
Ved P. Kafle
BFD-based link latency measurement in software defined networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Seong-Mun Kim
,
Gyeongsik Yang
,
Chuck Yoo
,
Sung-Gi Min
Assessing the value of containers for NFVs: A detailed network performance study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jakob Struye
,
Bart Spinnewyn
,
Kathleen Spaey
,
Kristiaan Bonjean
,
Steven Latre
High-end LTE service evolution in Korea: 4 years of nationwide mobile network measurements
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jonghwan Hyun
,
Youngjoon Won
,
Kenjiro Cho
,
Romain Fontugne
,
Jaeyoon Chung
,
James Won-Ki Hong
Automated selection of offloadable tasks for mobile computation offloading in edge computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Alessandro Zanni
,
Se-Young Yu
,
Paolo Bellavista
,
Rami Langar
,
Stefano Secci
Auto scaling of data plane VNFs in 5G networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Tulja Vamshi Kiran Buyakar
,
Anil Kumar Rangisetti
,
A Antony Franklin
,
Bheemarjuna Reddy Tamma
Enhanced fast BSS transition on enterprise WLAN with SDN-based distribution system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Hyundong Hwang
,
Young-Tak Kim
Accurate delay measurement for parallel monitoring of probe flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Kohei Watabe
,
Shintaro Hirakawa
,
Kenji Nakagawa
Real-time security services for SDN-based datacenters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Pál Varga
,
Georgios Kathareios
,
Ákos Máté
,
Rolf Clauberg
,
Andreea Anghel
,
Péter Orosz
,
Balázs Nagy
,
Tamás Tóthfalusi
,
László Kovács
,
Mitch Gusat
Arena: Adaptive real-time update anomaly prediction in cloud systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Shaohan Huang
,
Carol Fung
,
Chang Liu
,
Shupeng Zhang
,
Guang Wei
,
Zhongzhi Luan
,
Depei Qian
Managing the availability of VNFs with the availability management framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Pradheba C. Rangarajan
,
Ferhat Khendek
,
Maria Toeroe
Automated synthesis of NFV topology: A security requirement-oriented design
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
A H M Jakaria
,
Mohammad Ashiqur Rahman
,
Carol J Fungt
Modeling and analyzing power system failures on cloud services
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Daniel Rosendo
,
Patricia Takako Endo
,
Guto Leoni Santos
,
Demis Moacir Gomes
,
Glauco Gonçalves
,
André Moreira
,
Judith Kelner
,
Djamel Sadok
,
Mozhgan Mahloo
Android malicious application detection using support vector machine and active learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Bahman Rashidi
,
Carol Fung
,
Elisa Bertino
IPv6-specific misconfigurations in the DNS
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Luuk Hendriks
,
Pieter-Tjerk de Boer
,
Aiko Pras
Simulation toolbox for studying energy consumption in wired networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Anne-Cécile Orgerie
,
Betsegaw Lemma Amersho
,
Timothée Haudebourg
,
Martin Quinson
,
Myriana Rifai
,
Dino Lopez Pacheco
,
Laurent Lefèvre
Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Martín Barrère
,
Rodrigo Vieira Steiner
,
Rabih Mohsen
,
Emil C. Lupu
Network slice embedding under traffic uncertainties — A light robust approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Andreas Baumgartner
,
Thomas Bauschert
,
Abdul A. Blzarour
,
Varun S. Reddy
Attacking strategies and temporal analysis involving Facebook discussion groups
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Chun-Ming Lai
,
Xiaoyun Wang
,
Yunfeng Hong
,
Yu-Cheng Lin
,
S. Felix Wu
,
Patrick McDaniel
,
Hasan Cam
Simulation framework for impact assessment of next generation spectrum authorization regimes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Stephan Wirsing
,
Peter Reichl
Wireless sensor network-based service provision: A three-sided market model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Luis Guijarro
,
Jose R. Vidal
,
Vicent Pla
,
Maurizio Naldi
Software-defined multipath-TCP for smart mobile devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Tom De Schepper
,
Jakob Struye
,
Ensar Zeljković
,
Steven Latré
,
Jeroen Famaey
Analyzing human mobility and social relationships from cellular network data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zheng Liu
,
Yuanyuan Qiao
,
Siyan Tao
,
Wenhui Lin
,
Jie Yang
InFEP — Lightweight virtualization of distributed control on white-box networking hardware
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Thomas Kohler
,
Frank Dürr
,
Christian Bäumlisberger
,
Kurt Rothermel
Resource allocation for network slicing in WiFi access points
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Matías Richart
,
Javier Baliosian
,
Joan Serrati
,
Juan-Luis Gorricho
,
Ramon Agüero
,
Nazim Agoulmine
An evolutionary controllers' placement algorithm for reliable SDN networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jean-Michel Sanner
,
Yassine Hadjadj-Aoul
,
Meryem Ouzzif
,
Gerardo Rubino
DiMob: Scalable and seamless mobility in SDN managed wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ian Vermeulen
,
Patrick Bosch
,
Tom De Schepper
,
Steven Latre
Design of virtual gateway in virtual software defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Doyoung Lee
,
Yoonseon Han
,
James Won-Ki Hong
Pre-provisioning of local protection for handling dual-failures in OpenFlow-based networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Pankaj Thorat
,
Seil Jeon
,
Syed M. Raza
,
Hyunseung Choo
Architecture for building hybrid kernel-user space virtual network functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Nguyen Van Tu
,
Kyungchan Ko
,
James Won-Ki Hong
On demand QoS with a SDN traffic engineering management (STEM) module
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Cedric Morin
,
Géraldine Texier
,
Cao-Thanh Phan
Deadline-aware and energy-efficient dynamic flow scheduling in data center network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Zan Yao
,
Ying Wang
,
Junhua Ba
,
Junran Zong
,
Sixiang Feng
,
Zhanwei Wu
SDN implementation of multipath discovery to improve network performance in distributed storage systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Luis Guillen
,
Satoru Izumi
,
Toru Abe
,
Takuo Suganuma
,
Hiroaki Muraoka
Cost- and energy-aware multi-flow mobile data offloading under time dependent pricing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Cheng Zhang
,
Bo Gu
,
Zhi Liu
,
Kyoko Yamori
,
Yoshiaki Tanaka
Design of SDN based end-to-end routing over multiple domains for mobility management
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Misumi Hata
,
Mustafa Soylu
,
Satoru Izumi
,
Toru Abe
,
Takuo Suganuma
Duopoly price competition in secondary spectrum markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xianwei Li
,
Bo Gu
,
Cheng Zhang
,
Zhi Liu
,
Kyoko Yamori
,
Yoshiaki Tanaka
Performance evaluation of selective flow monitoring in the ONOS controller
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Anh Nguyen-Ngoc
,
Stanislav Lange
,
Thomas Zinner
,
Michael Seufert
,
Phuoc Tran-Gia
,
Nieke Aerts
,
David Hock
NeuRoute: Predictive dynamic routing for software-defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Abdelhadi Azzouni
,
Raouf Boutaba
,
Guy Pujolle
Detailed program
Freely available from IEEE.
pp. 1-15
Papers by title
Freely available from IEEE.
pp. 1-7
Showing 95 out of 95