ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2012 IEEE Network Operations and Management Symposium
Latest Publications
TOTAL DOCUMENTS
208
(FIVE YEARS 0)
H-INDEX
15
(FIVE YEARS 0)
Published By IEEE
9781467302692, 9781467302678, 9781467302685
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Closed loop performance management for service delivery systems
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6211883
◽
2012
◽
Cited By ~ 3
Author(s):
Yixin Diao
◽
A. Heching
Keyword(s):
Service Delivery
◽
Performance Management
◽
Closed Loop
◽
Delivery Systems
◽
Service Delivery Systems
Download Full-text
Multi-task overlapping coalition formation mechanism in wireless sensor network
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6211974
◽
2012
◽
Author(s):
Xiao-fei Bao
◽
Yang Yang
◽
Xue-song Qiu
Keyword(s):
Wireless Sensor Network
◽
Sensor Network
◽
Formation Mechanism
◽
Coalition Formation
◽
Wireless Sensor
Download Full-text
ValidMaker: A tool for managing device configurations using logical constraints
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6212037
◽
2012
◽
Cited By ~ 2
Author(s):
S. Halle
◽
E. L. Ngoupe
◽
G. Nijdam
◽
O. Cherkaoui
◽
P. Valtchev
◽
...
Keyword(s):
Logical Constraints
Download Full-text
Optimization for time-driven link sleeping reconfigurations in ISP backbone networks
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6211902
◽
2012
◽
Cited By ~ 11
Author(s):
F. Francois
◽
Ning Wang
◽
K. Moessner
◽
S. Georgoulas
Keyword(s):
Backbone Networks
Download Full-text
On stochastic risk ordering of network services for proactive security management
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6212020
◽
2012
◽
Cited By ~ 1
Author(s):
M. Amezziane
◽
E. Al-Shaer
◽
M. Q. Ali
Keyword(s):
Security Management
◽
Network Services
◽
Proactive Security
◽
Stochastic Risk
Download Full-text
Graph clustering based provisioning algorithm for virtual network embedding
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6212045
◽
2012
◽
Cited By ~ 4
Author(s):
Tae-Ho Lee
◽
Shahnaza Tursunova
◽
Tae-Sang Choi
Keyword(s):
Graph Clustering
◽
Virtual Network
◽
Virtual Network Embedding
◽
Network Embedding
Download Full-text
Should users be entitled to use and control the devices of their choice on networks?
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6212026
◽
2012
◽
Cited By ~ 1
Author(s):
S. Jordan
◽
G. Shaffer
Keyword(s):
And Control
Download Full-text
Fault detection in MANETs
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6211981
◽
2012
◽
Author(s):
W. A. Mamun
◽
H. Lutfiyya
◽
D. Kidston
◽
Li Li
Keyword(s):
Fault Detection
Download Full-text
SeCoA: Autonomous semantic service composition algorithm in symbiotic networks
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6211957
◽
2012
◽
Cited By ~ 1
Author(s):
T. De Pauw
◽
B. Volckaert
◽
V. Ongenae
◽
F. De Turck
Keyword(s):
Service Composition
◽
Semantic Service
Download Full-text
RegSOP: A registry for service oriented programming with behavior based discovery
2012 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2012.6211983
◽
2012
◽
Author(s):
A. Kumar
◽
H. Chauhan
◽
D. Janakiram
Keyword(s):
Service Oriented
◽
Behavior Based
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close