Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
International Journal of Network Management
John Wiley & Sons, Inc.
 
   
 
Options:
 
  1-10 of 36 reviews Date Reviewed 
  Federated management of the future Internet: status and challenges
Famaey J., De Turck F. International Journal of Network Management 22(6): 508-528, 2012.  Type: Article

This survey paper is intended for researchers interested in various future Internet platforms. The authors address the possible challenges of shifting the current state-of-the-art Internet from static negotiations between different net...

May 22 2013
  A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks
Wu S., Zhu Y., Pu Q. International Journal of Network Management 21(5): 384-401, 2011.  Type: Article

There has been tremendous growth in low-power mobile wireless network devices in recent years. With that growth has come the need for a secure roaming authentication scheme for these devices, so that mobile users can seamlessly and sec...

Aug 23 2012
  An epistemic event-based correlation approach for managing pervasive networks
Ganapathy V., Pissinou N., Makki S., Ali B. International Journal of Network Management 22(1): 81-94, 2012.  Type: Article

Administrators of ubiquitous networks require effective decision-making models for determining the status of a computer network. When subnetwork components fail, determining the overall performance of a ubiquitous network is a difficul...

Aug 21 2012
  Video-on-demand (VoD) deployment over hospitality networks
Salah K., Hamodi J., Baig Z., Al-Haidari F. International Journal of Network Management 22(1): 65-80, 2012.  Type: Article

The installation of integrated data, voice, and video-on-demand (VoD) services over Internet protocol (IP) networks offers exciting benefits and raises important questions. Banks, hotels, and hospitals, with many branches in different ...

Jul 24 2012
  Detection accuracy of network anomalies using sampled flow statistics
Kawahara R., Ishibashi K., Mori T., Kamiyama N., Harada S., Hasegawa H., Asano S. International Journal of Network Management 21(6): 513-535, 2011.  Type: Article

The identification of anomalies in network traffic is still a challenging task. The authors investigate this issue by measuring traffic at the flow level and collecting flow statistics through packet sampling. They use an analytical mo...

Jul 23 2012
  Incentive-rewarding mechanism to stimulate activities in social networking services
Yogo K., Shinkuma R., Konishi T., Itaya S., Doi S., Yamada K., Takahashi T. International Journal of Network Management 22(1): 1-11, 2012.  Type: Article

As social networks continue to grow, and considering both the number of users and the amount of contributions, links, uploads, and content between them, the challenge of stimulating activity in social networking services becomes import...

May 29 2012
  Mechanisms and analysis for supporting multicast traffic by using multilayer multistage interconnection networks
Garofalakis J., Stergiou E. International Journal of Network Management 21(2): 130-146, 2011.  Type: Article

Multistage interconnection networks (MINs) have been studied by many researchers, and there is a wealth of information on them available. MINs are frequently used in switching, multiprocessing, high-performance computing, and communica...

Dec 22 2011
   A hybrid approach to operating system discovery based on diagnosis
Gagnon F., Esfandiari B. International Journal of Network Management 21(2): 106-119, 2011.  Type: Article

This paper focuses on operating system discovery (OSD), the process of recognizing a host via network traffic. The authors classify existing methods and tools into two broad categories, active and passive, and then demonstrate that the...

Oct 28 2011
  An immunological approach for file recovery over JXTA peer-to-peer framework
Nassef M., Badr A., Farag I. International Journal of Network Management 20(4): 181-197, 2010.  Type: Article

Since the ENIAC general-purpose computer was invented in 1946, the idea of learning from humans and mimicking human processes using computers has been very interesting and appealing to researchers. The authors of this paper attempt to ...

Dec 8 2010
  Characterizing user-level network virtualization: performance, overheads and limits
Tsugawa M., Fortes J. International Journal of Network Management 20(3): 149-166, 2010.  Type: Article

Cloud computing is now a very hot topic. One key concept of cloud computing is virtualization. Applications, processes, storage, and central processing units (CPUs) can all be virtualized. For them to work properly in this environment,...

Oct 12 2010
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy