Sciweavers

Share
NOMS
2010
IEEE
228views Communications» more  NOMS 2010»
8 years 8 months ago
DA VINCI: A tool to improve VoIP call routing configurations
As IP telephony becomes a critical part of the enterprise network infrastructure, there is an increasing need for tools to help manage VoIP systems. In this paper, we introduce DA ...
Kunwadee Sripanidkulchai, Shu Tao, Zon-Yin Shae
NOMS
2010
IEEE
195views Communications» more  NOMS 2010»
8 years 8 months ago
Optimized network configuration parameter assignment based on graph coloring
The trend for future mobile networks is to move away from Network Elements (NEs) delivered with specially tailored configurations towards off-the-shelf products. The configurations...
Tobias Bandh, Georg Carle, Henning Sanneck, Lars-C...
NOMS
2010
IEEE
201views Communications» more  NOMS 2010»
8 years 8 months ago
Checkpoint-based fault-tolerant infrastructure for virtualized service providers
Crash and omission failures are common in service providers: a disk can break down or a link can fail anytime. In addition, the probability of a node failure increases with the num...
Iñigo Goiri, Ferran Julià, Jordi Gui...
NOMS
2010
IEEE
171views Communications» more  NOMS 2010»
8 years 8 months ago
Operator and radio resource sharing in multi-carrier environments
—Today’s mobile networks prevent users from freely accessing all available networks. Instead, seamless network composition could present a win-win situation for both users and ...
Pongsakorn Teeraparpwong, Per Johansson, Harsha V....
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
8 years 8 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
NOMS
2010
IEEE
163views Communications» more  NOMS 2010»
8 years 8 months ago
DReaM-Cache: Distributed Real-Time Transaction Memory Cache to support two-factor authentication services and its reliability
—PhoneFactor is a two-factor authentication service that combines the knowledge-based authenticator with an objectbased authenticator in which the object-based authenticator has ...
Haiyang Qian, Chandra Sekhar Surapaneni, Marsh Ray...
NOMS
2010
IEEE
152views Communications» more  NOMS 2010»
8 years 8 months ago
Kahuna: Problem diagnosis for Mapreduce-based cloud computing environments
Jiaqi Tan, Xinghao Pan, Eugene Marinelli, Soila Ka...
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
8 years 8 months ago
Performance-driven task co-scheduling for MapReduce environments
—MapReduce is a data-driven programming model proposed by Google in 2004 which is especially well suited for distributed data analytics applications. We consider the management o...
Jorda Polo, David Carrera, Yolanda Becerra, Malgor...
NOMS
2010
IEEE
195views Communications» more  NOMS 2010»
8 years 8 months ago
Using linked data for systems management
—Integration of data from multiple sources makes it possible to build effective systems management solutions. Despite the expected benefits, data integration remains a challenge....
Metin Feridun, Axel Tanner
NOMS
2010
IEEE
125views Communications» more  NOMS 2010»
8 years 8 months ago
WIND: A scalable and lightweight network topology service for peer-to-peer applications
Abstract—We present an Internet-scale network topology information (NTI) service named WIND for localizing P2P traffic. Central to WIND are the two simple ideas: 1) obtaining NT...
Hongqiang Liu, Yongqiang Xiong, CongXiao Bao, Xing...
books