Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CNSM
CNSM 2018
Generate Citations
2018 14th International Conference on Network and Service Management (CNSM)
Nov. 5 2018 to Nov. 9 2018
Rome, Italy
Table of Contents
CNSM 2018 Committees
Freely available from IEEE.
pp. iii-iii
Reviewers
Freely available from IEEE.
pp. iv-vi
Reviewers
Freely available from IEEE.
pp. vii-vii
Table of Contents
Freely available from IEEE.
pp. viii-xiii
CNSM 2018 Index
Freely available from IEEE.
pp. xiv-xix
Reviewers
Freely available from IEEE.
pp. xxv-xxv
Reviewers
Freely available from IEEE.
pp. xxvii-xxvii
Network Performance Monitoring with Flexible Models of Multi-Point Passive Measurements
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Daniel Perdices
,
David Muelas
,
Luis de Pedro
,
Jorge E. López de Vergara
INTCollector: A High-performance Collector for In-band Network Telemetry
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-18
by
Nguyen Van Tu
,
Jonghwan Hyun
,
Ga Yeon Kim
,
Jae-Hyoung Yoo
,
James Won-Ki Hong
A Fair Share for All: Novel Adaptation Logic for QoE Fairness of HTTP Adaptive Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-27
by
Michael Seufert
,
Nikolas Wehner
,
Pedro Casas
,
Florian Wamser
A Machine Learning Approach for IEEE 802.11 Channel Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-36
by
Olivier Jeunen
,
Patrick Bosch
,
Michiel Van Herwegen
,
Karel Van Doorselaer
,
Nick Godman
,
Steven Latré
Cross-Network Behavioral Clustering for Managed Security Service Providers
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Georgios Gkroumas
,
Ilias Kotinas
,
Kostas Giotis
,
Theocharis Tsigkritis
,
Paris Mermigkas
Predicting Distributions of Service Metrics using Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-53
by
Forough Shahab Samani
,
Rolf Stadler
Combined Control and Data Plane Robustness of SDN Networks against Malicious Node Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-62
by
Dorabella Santos
,
Amaro de Sousa
,
Carmen Mas Machuca
SDX-based security collaboration: Extending the security reach beyond network domains
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-71
by
Kristina Dzeparoska
,
Hadi Bannazadeh
,
Alberto Leon-Garcia
All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-80
by
Marc-Oliver Pahl
,
François-Xavier Aubet
On the Practical Detection of the Top-k Flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-89
by
Jalil Moraney
,
Danny Raz
P4NFV: An NFV Architecture with Flexible Data Plane Reconfiguration
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-98
by
Mu He
,
Arsany Basta
,
Andreas Blenk
,
Nemanja Deric
,
Wolfgang Kellerer
A Northbound Interface for Software-based Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-107
by
Daphne Tuncer
,
Marinos Charalambides
,
Gioacchino Tangari
,
George Pavlou
On Improving Service Chains Survivability Through Efficient Backup Provisioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-115
by
Saifeddine Aidi
,
Mohamed Faten Zhani
,
Yehia Elkhatib
Trade-offs in Cache-enabled Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-124
by
Davit Harutyunyan
,
Abbas Bradai
,
Roberto Riggio
Available Bandwidth vs. Achievable Throughput Measurements in 4G Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-133
by
Giuseppe Aceto
,
Fabio Palumbo
,
Valerio Persico
,
Antonio Pescape
Dynamic Network Slicing for LoRaWAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-142
by
Samir Dawaliby
,
Abbas Bradai
,
Yannis Pousset
,
Roberto Riggio
Congestion-Constrained Virtual Link Embedding with Uncertain Demands
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-151
by
Fatemeh Hosseini
,
Alexander James
,
Majid Ghaderi
UNiS: A User-space Non-intrusive Workflow-aware Virtual Network Function Scheduler
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-160
by
Anthony
,
Shihabur Rahman Chowdhury
,
Tim Bai
,
Raouf Boutaba
,
Jérôme François
Adaptive Flag-Based Signaling for Distributed Spectrum Assignment in Elastic Optical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-169
by
Amer Al-Baidhani
,
Gokhan Sahin
,
Donald Ucci
Adaptive Service Deployment using In-Network Mediation
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-176
by
Abdessalam Elhabbash
,
Gordon S. Blair
,
Gareth Tyson
,
Yehia Elkhatib
Potential Traffic Savings by Leveraging Proximity of Communication Groups in Mobile Messaging
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-183
by
Michael Seufert
,
Anika Schwind
,
Marco Waigand
,
Tobias Hoßfeld
Service Placement for Hybrid Clouds Environments based on Realistic Network Measurements
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-190
by
Walter Cerroni
,
Luca Foschini
,
Genady Ya. Grabarnik
,
Larisa Shwartz
,
Mauro Tortonesi
Tackling Virtual Infrastructure Allocation in Cloud Data Centers: a GPU-Accelerated Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-197
by
Lucas L. Nesi
,
Maurício A. Pillon
,
Marcos D. de Assunção
,
Charles C. Miers
,
Guilherme P. Koslovski
lightMEC: A Vendor-Agnostic Platform for Multi-access Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-204
by
Tejas Subramanya
,
Giovanni Baggio
,
Roberto Riggio
Reproducing Popularity Dynamics of YouTube Videos
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-211
by
Noriaki Kamiyama
,
Masayuki Murata
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-218
by
Peter Orosz
,
Balazs Nagy
,
Pal Varga
,
Mitch Gusat
Passive Monitoring of HTTPS Service Use
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-225
by
Pierre-Olivier Brissaud
,
Jérôme François
,
Isabelle Chrisment
,
Thibault Cholez
,
Olivier Bettan
Bitforest: a Portable and Efficient Blockchain-Based Naming System
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-232
by
Yuhao Dong
,
Woojung Kim
,
Raouf Boutaba
In-Network QoE and KPI Monitoring of Mobile YouTube Traffic: Insights for Encrypted iOS Flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-239
by
Irena Oršolić
,
Petra Rebernjak
,
Mirko Sužnjević
,
Lea Skorin-Kapov
Understand Your Chains and Keep Your Deadlines: Introducing Time-constrained Profiling for NFV
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-246
by
Manuel Peuster
,
Holger Karl
Load balancing and flow management under user mobility in heterogeneous wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-253
by
Tom De Schepper
,
Steven Latré
,
Jeroen Famaey
Consistent SDN Rule Update with Reduced Number of Scheduling Rounds
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-260
by
Mahdi Dolati
,
Ahmad Khonsari
,
Majid Ghaderi
Proactive Access Point Driven Handovers in IEEE 802.11 Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-267
by
Ensar Zeljković
,
Johann M. Marquez-Barja
,
Andreas Kassler
,
Roberto Riggio
,
Steven Latré
Revive: A Reliable Software Defined Data Plane Failure Recovery Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-274
by
Israat Haque
,
MA Moyeen
Latency Modelling in IEEE 802.11 Systems with non-IEEE 802.11 Interfering Source
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-280
by
Patrick Bosch
,
Steven Latré
,
Chris Blondia
ARCD: a Solution for Root Cause Diagnosis in Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-284
by
Maha Mdini
,
Gwendal Simon
,
Alberto Blanc
,
Julien Lecoeuvre
eDoS Mitigation for Autonomic Management on Multi-Tier IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-289
by
Rajsimman Ravichandiran
,
Hadi Bannazadeh
,
Alberto Leon-Garcia
Towards Dynamic Fog Resource Provisioning for Smart City Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-294
by
José Santos
,
Tim Wauters
,
Bruno Volckaert
,
Filip De Turck
Overcoming Network and Security Management Platform Gaps in Federated Software Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-299
by
Michael Steinke
,
Wolfgang Hommel
XMPP as a scalable multi-tenants isolation solution for ONOS-based Software-Defined Cloud Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-303
by
Tomasz Osinski
,
Abdulhalim Dandoush
Log Analysis via Space-time Pattern Matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-307
by
Anne Bouillard
,
Marc-Olivier Buob
,
Maxime Raynal
,
Achille Salaün
Outlier Detection for Distributed Services using Multi-Frequency Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-312
by
Lu Xu
,
Zhongzhi Luan
,
Carol J Fung
,
Guang Wei
,
Depei Quian
Blockchain-based Infrastructure Sharing in 5G Small Cell Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-317
by
Babak Mafakheri
,
Tejas Subramanya
,
Leonardo Goratti
,
Roberto Riggio
Mapping the allocation of resources for 5G slices to the k-MUTEX with n instances of m resources problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-322
by
Guillaume Fraysse
,
Jonathan Lejeune
,
Julien Sopena
,
Pierre Sens
An Overview of A Load Balancer Architecture for VNF chains Horizontal Scaling
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-327
by
Jiefei Ma
,
Windhya Rankothge
,
Christian Makaya
,
Mariceli Morales
,
Franck Le
,
Jorge Lobo
SDN Hypervisors: How Much Does Topology Abstraction Matter?
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-332
by
Nemanja Đerić
,
Amir Varasteh
,
Arsany Basta
,
Andreas Blenk
,
Wolfgang Kellerer
An Experimental Testbed for Managing BAN Services at the Network Edge
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-337
by
Laura Galluccio
,
Christian Grasso
,
Sebastiano Milardo
,
Giovanni Schembra
,
Elisabetta Sciacca
SMARTHO: A Network Initiated Handover in NG-RAN using P4-based Switches
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-342
by
Phanindra Palagummi
,
Krishna M. Sivalingam
Beauty is in the Eye of the Smartphone Holder A Data Driven Analysis of YouTube Mobile QoE
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-347
by
Nikolas Wehner
,
Sarah Wassermann
,
Pedro Casas
,
Michael Seufert
,
Florian Wamser
Impact of Device Diversity on Crowdsourced Mobile Coverage Maps
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-352
by
Mah-Rukh Fida
,
Mahesh K. Marina
A Method of Transport Abstraction for 5G Radio Access Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-357
by
Akiko Nagasawa
,
Yukio Hirano
,
Kenichi Nakura
,
Takeshi Suehiro
,
Hiromu Sato
,
Seiji Kozaki
,
Kazuyuki Ishida
Elastic Services for Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-362
by
Jonathan Fürst
,
Mauricio Fadel Argerich
,
Bin Cheng
,
Apostolos Papageorgiou
An Adaptive Policy Approach to Video Quality Assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-367
by
Joseph McNamara
,
Sven der van Meer
,
Liam Fallon
,
John Keeney
,
Enda Fallon
Virtual Network Embedding with Formal Reachability Assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-372
by
Guido Marchetto
,
Riccardo Sisto
,
Jalolliddin Yusupov
,
Adlen Ksentini
Towards Application of Cuckoo Filters in Network Security Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-377
by
Jan Grashöfer
,
Florian Jacob
,
Hannes Hartenstein
Enabling Virtual Reality for the Tactile Internet: Hurdles and Opportunities
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-383
by
Maria Torres Vega
,
Taha Mehmli
,
Jeroen van der Hooft
,
Tim Wauters
,
Filip De Turck
Preferred Path Routing (PPR) Graphs - Beyond Signaling Of Paths To Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-390
by
Toerless Eckert
,
Yingzhen Qu
,
Uma Chunduri
Bandwidth Constrained Distributed Inter-domain Path Selection (DIPS)
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-394
by
Rui Meng
,
Bin Da
,
Zhe Chen
,
Chuang Wang
,
Sheng Jiang
Chasing Linux Jitter Sources for Uncompressed Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-401
by
Arthur Toussaint
,
Mohammed Hawari
,
Thomas Clausen
Design and Implementation of eBPF-based Virtual TAP for Inter-VM Traffic Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-407
by
Jibum Hong
,
Seyeon Jeong
,
Jae-Hyoung Yoo
,
James Won-Ki Hong
Flexible failure detection and fast reroute using eBPF and SRv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-413
by
Mathieu Xhonneux
,
Olivier Bonaventure
Performance of IPv6 Segment Routing in Linux Kernel
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
Ahmed Abdelsalam
,
Pier Luigi Ventre
,
Andrea Mayer
,
Stefano Salsano
,
Pablo Camarillo
,
Francois Clad
,
Clarence Filsfils
Zero-Loss Virtual Machine Migration with IPv6 Segment Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Yoann Desmouceaux
,
Mark Townsley
,
Thomas Heide Clausen
Proposal and Investigation of a Scalable NFV Orchestrator Based on Segment Routing Data/Control Plane
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-431
by
V. Eramo
,
F. G. Lavacca
,
T. Catena
,
M. Polverini
,
A. Cianfrani
Performance of Service Function Chaining on the OpenStack Cloud Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-437
by
Davide Borsatti
,
Gianluca Davoli
,
Gianluca Davoli
,
Chiara Contoli
,
Franco Callegati
Towards Reduced-State Service Chaining with Source Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-443
by
Chrysa Papagianni
,
Panagiotis Papadimitriou
,
John S. Baras
Showing 73 out of 73