Search
w/in this Title
for Titles
All Reviews
International Journal of Network Management
John Wiley & Sons, Inc.
Options:
Date Reviewed
Title
Author
Publisher
Published Date
Descending Order
Ascending Order
1-10 of 36 reviews
Date Reviewed
Federated management of the future Internet: status and challenges
Famaey J., De Turck F. International Journal of Network Management 22(6): 508-528, 2012. Type: Article
This survey paper is intended for researchers interested in various future Internet platforms. The authors address the possible challenges of shifting the current state-of-the-art Internet from static negotiations between different net...
May 22 2013
A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks
Wu S., Zhu Y., Pu Q. International Journal of Network Management 21(5): 384-401, 2011. Type: Article
There has been tremendous growth in low-power mobile wireless network devices in recent years. With that growth has come the need for a secure roaming authentication scheme for these devices, so that mobile users can seamlessly and sec...
Aug 23 2012
An epistemic event-based correlation approach for managing pervasive networks
Ganapathy V., Pissinou N., Makki S., Ali B. International Journal of Network Management 22(1): 81-94, 2012. Type: Article
Administrators of ubiquitous networks require effective decision-making models for determining the status of a computer network. When subnetwork components fail, determining the overall performance of a ubiquitous network is a difficul...
Aug 21 2012
Video-on-demand (VoD) deployment over hospitality networks
Salah K., Hamodi J., Baig Z., Al-Haidari F. International Journal of Network Management 22(1): 65-80, 2012. Type: Article
The installation of integrated data, voice, and video-on-demand (VoD) services over Internet protocol (IP) networks offers exciting benefits and raises important questions. Banks, hotels, and hospitals, with many branches in different ...
Jul 24 2012
Detection accuracy of network anomalies using sampled flow statistics
Kawahara R., Ishibashi K., Mori T., Kamiyama N., Harada S., Hasegawa H., Asano S. International Journal of Network Management 21(6): 513-535, 2011. Type: Article
The identification of anomalies in network traffic is still a challenging task. The authors investigate this issue by measuring traffic at the flow level and collecting flow statistics through packet sampling. They use an analytical mo...
Jul 23 2012
Incentive-rewarding mechanism to stimulate activities in social networking services
Yogo K., Shinkuma R., Konishi T., Itaya S., Doi S., Yamada K., Takahashi T. International Journal of Network Management 22(1): 1-11, 2012. Type: Article
As social networks continue to grow, and considering both the number of users and the amount of contributions, links, uploads, and content between them, the challenge of stimulating activity in social networking services becomes import...
May 29 2012
Mechanisms and analysis for supporting multicast traffic by using multilayer multistage interconnection networks
Garofalakis J., Stergiou E. International Journal of Network Management 21(2): 130-146, 2011. Type: Article
Multistage interconnection networks (MINs) have been studied by many researchers, and there is a wealth of information on them available. MINs are frequently used in switching, multiprocessing, high-performance computing, and communica...
Dec 22 2011
A hybrid approach to operating system discovery based on diagnosis
Gagnon F., Esfandiari B. International Journal of Network Management 21(2): 106-119, 2011. Type: Article
This paper focuses on operating system discovery (OSD), the process of recognizing a host via network traffic. The authors classify existing methods and tools into two broad categories, active and passive, and then demonstrate that the...
Oct 28 2011
An immunological approach for file recovery over JXTA peer-to-peer framework
Nassef M., Badr A., Farag I. International Journal of Network Management 20(4): 181-197, 2010. Type: Article
Since the ENIAC general-purpose computer was invented in 1946, the idea of learning from humans and mimicking human processes using computers has been very interesting and appealing to researchers. The authors of this paper attempt to ...
Dec 8 2010
Characterizing user-level network virtualization: performance, overheads and limits
Tsugawa M., Fortes J. International Journal of Network Management 20(3): 149-166, 2010. Type: Article
Cloud computing is now a very hot topic. One key concept of cloud computing is virtualization. Applications, processes, storage, and central processing units (CPUs) can all be virtualized. For them to work properly in this environment,...
Oct 12 2010
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy