Default Cover Image

2018 14th International Conference on Network and Service Management (CNSM)

Nov. 5 2018 to Nov. 9 2018

Rome, Italy

Table of Contents

CNSM 2018 CommitteesFreely available from IEEE.pp. iii-iii
ReviewersFreely available from IEEE.pp. iv-vi
ReviewersFreely available from IEEE.pp. vii-vii
Table of ContentsFreely available from IEEE.pp. viii-xiii
CNSM 2018 IndexFreely available from IEEE.pp. xiv-xix
ReviewersFreely available from IEEE.pp. xxv-xxv
ReviewersFreely available from IEEE.pp. xxvii-xxvii
INTCollector: A High-performance Collector for In-band Network TelemetryFull-text access may be available. Sign in or learn about subscription options.pp. 10-18
Predicting Distributions of Service Metrics using Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 45-53
Combined Control and Data Plane Robustness of SDN Networks against Malicious Node AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 54-62
SDX-based security collaboration: Extending the security reach beyond network domainsFull-text access may be available. Sign in or learn about subscription options.pp. 63-71
All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 72-80
On the Practical Detection of the Top-k FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 81-89
P4NFV: An NFV Architecture with Flexible Data Plane ReconfigurationFull-text access may be available. Sign in or learn about subscription options.pp. 90-98
A Northbound Interface for Software-based NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 99-107
On Improving Service Chains Survivability Through Efficient Backup ProvisioningFull-text access may be available. Sign in or learn about subscription options.pp. 108-115
Trade-offs in Cache-enabled Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 116-124
Available Bandwidth vs. Achievable Throughput Measurements in 4G Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 125-133
Dynamic Network Slicing for LoRaWANFull-text access may be available. Sign in or learn about subscription options.pp. 134-142
Congestion-Constrained Virtual Link Embedding with Uncertain DemandsFull-text access may be available. Sign in or learn about subscription options.pp. 143-151
Adaptive Flag-Based Signaling for Distributed Spectrum Assignment in Elastic Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 161-169
Adaptive Service Deployment using In-Network MediationFull-text access may be available. Sign in or learn about subscription options.pp. 170-176
lightMEC: A Vendor-Agnostic Platform for Multi-access Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 198-204
Reproducing Popularity Dynamics of YouTube VideosFull-text access may be available. Sign in or learn about subscription options.pp. 205-211
Low False Alarm Ratio DDoS Detection for ms-scale Threat MitigationFull-text access may be available. Sign in or learn about subscription options.pp. 212-218
Passive Monitoring of HTTPS Service UseFull-text access may be available. Sign in or learn about subscription options.pp. 219-225
Bitforest: a Portable and Efficient Blockchain-Based Naming SystemFull-text access may be available. Sign in or learn about subscription options.pp. 226-232
Understand Your Chains and Keep Your Deadlines: Introducing Time-constrained Profiling for NFVFull-text access may be available. Sign in or learn about subscription options.pp. 240-246
Load balancing and flow management under user mobility in heterogeneous wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 247-253
Consistent SDN Rule Update with Reduced Number of Scheduling RoundsFull-text access may be available. Sign in or learn about subscription options.pp. 254-260
Proactive Access Point Driven Handovers in IEEE 802.11 NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 261-267
Revive: A Reliable Software Defined Data Plane Failure Recovery SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 268-274
Latency Modelling in IEEE 802.11 Systems with non-IEEE 802.11 Interfering SourceFull-text access may be available. Sign in or learn about subscription options.pp. 275-280
ARCD: a Solution for Root Cause Diagnosis in Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 280-284
eDoS Mitigation for Autonomic Management on Multi-Tier IoTFull-text access may be available. Sign in or learn about subscription options.pp. 285-289
Towards Dynamic Fog Resource Provisioning for Smart City ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 290-294
Overcoming Network and Security Management Platform Gaps in Federated Software NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 295-299
XMPP as a scalable multi-tenants isolation solution for ONOS-based Software-Defined Cloud NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 300-303
Log Analysis via Space-time Pattern MatchingFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Outlier Detection for Distributed Services using Multi-Frequency PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 308-312
Blockchain-based Infrastructure Sharing in 5G Small Cell NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 313-317
An Overview of A Load Balancer Architecture for VNF chains Horizontal ScalingFull-text access may be available. Sign in or learn about subscription options.pp. 323-327
SDN Hypervisors: How Much Does Topology Abstraction Matter?Full-text access may be available. Sign in or learn about subscription options.pp. 328-332
SMARTHO: A Network Initiated Handover in NG-RAN using P4-based SwitchesFull-text access may be available. Sign in or learn about subscription options.pp. 338-342
Impact of Device Diversity on Crowdsourced Mobile Coverage MapsFull-text access may be available. Sign in or learn about subscription options.pp. 348-352
A Method of Transport Abstraction for 5G Radio Access NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 353-357
Elastic Services for Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 358-362
An Adaptive Policy Approach to Video Quality AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 363-367
Virtual Network Embedding with Formal Reachability AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 368-372
Towards Application of Cuckoo Filters in Network Security MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 373-377
Enabling Virtual Reality for the Tactile Internet: Hurdles and OpportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 378-383
Preferred Path Routing (PPR) Graphs - Beyond Signaling Of Paths To NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 384-390
Bandwidth Constrained Distributed Inter-domain Path Selection (DIPS)Full-text access may be available. Sign in or learn about subscription options.pp. 391-394
Chasing Linux Jitter Sources for Uncompressed VideoFull-text access may be available. Sign in or learn about subscription options.pp. 395-401
Design and Implementation of eBPF-based Virtual TAP for Inter-VM Traffic MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 402-407
Flexible failure detection and fast reroute using eBPF and SRv6Full-text access may be available. Sign in or learn about subscription options.pp. 408-413
Performance of IPv6 Segment Routing in Linux KernelFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
Zero-Loss Virtual Machine Migration with IPv6 Segment RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Performance of Service Function Chaining on the OpenStack Cloud PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 432-437
Towards Reduced-State Service Chaining with Source RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 438-443
Showing 73 out of 73