default search action
International Journal of Network Management, Volume 15
Volume 15, Number 1, January 2005
- Gilbert Held:
From the editor: a new year and a new journal. 1 - Jung-Shian Li, Chung-Wen Ma:
Improving fairness of TCP Vegas. 3-10 - Ahsan Habib, Sonia Fahmy, Bharat K. Bhargava:
Monitoring and controlling QoS network domains. 11-29 - Yong-Hoon Choi, Ik-Soon Hwang:
In-service QoS monitoring of real-time applications using SM MIB. 31-42 - Jangwon Lee, Gustavo de Veciana:
Scalable multicast based filtering and tracing framework for defeating distributed DoS attacks. 43-60 - Debby Koren:
Are we ready for IPv6? Is IPv6 ready for us? 61-66 - Gilbert Held:
Focus on firetide hotpoint wireless mesh routers. 67-71
Volume 15, Number 2, March/April 2005
- Gilbert Held:
From the editor: doing business with MCI. 73-74 - Kevin Curran, Stephen Annesley:
Transcoding media for bandwidth constrained mobile devices. 75-88 - Kevin Curran, Connor Duffy:
Understanding and reducing web delays. 89-102 - Idir Fodil, Guy Pujolle:
Roaming and service management in public wireless networks using an innovative policy management architecture. 103-121 - Kevin Curran, Colman Morrissey, Colm Fagan, Colm Murphy, Brian O'Donnell, Gerry Fitzpatrick, Stephen Condit:
Monitoring hacker activity with a Honeynet. 123-134 - Jiann-Liang Chen, Wen-Hao Chen, Sy-Yen Kuo:
All-IPv6 service interworking gateway. 135-147
Volume 15, Number 3, May 2005
- Gilbert Held:
From the editor: a first for the FCC. 149 - Zalal Uddin Mohammad Abusina, Salahuddin Muhammad Salim Zabir, Ashir Ahmed, Debasish Chakraborty, Takuo Suganuma, Norio Shiratori:
An engineering approach to dynamic prediction of network performance from application logs. 151-162 - Yen-Cheng Chen, Yao-Jung Chan, Cheung-Wo She:
Enabling location-based services in wireless LAN hotspots. 163-175 - Bruno Quoitin, Cristel Pelsser, Olivier Bonaventure, Steve Uhlig:
A performance evaluation of BGP-based traffic engineering. 177-191 - Yuh-Min Tseng:
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. 193-202 - Nizar Bouabdallah, Guy Pujolle:
Optical resources provisioning: multipoint-to-point lightpaths mapping in all-optical networks. 203-212 - Gilbert Held:
Focus on the Cisco Aironet 802.11 a/b/g wireless LAN client adapter. 213-216
Volume 15, Number 4, July 2005
- Ken Christensen:
From the associate editor: a special issue on a rapidly expanding field. 217-218 - Athanassios Boulis, Sanjay Jha:
Guest editorial: network management in new realms: wireless sensor networks. 219-221 - Nithya Ramanathan, Eddie Kohler, Deborah Estrin:
Towards a debugging system for sensor networks. 223-234 - Pedro José Marrón, Andreas Jürgen Lachenmann, Daniel Minder, Matthias Gauger, Olga Saukh, Kurt Rothermel:
Management and configuration issues for sensor networks. 235-253 - Matthew Wolenetz, Rajnish Kumar, JunSuk Shin, Umakishore Ramachandran:
A simulation-based study of wireless sensor network middleware. 255-267 - Christophe Dugas:
Configuring and managing a large-scale monitoring network: solving real world challenges for ultra-low-powered and long-range wireless mesh networks. 269-282 - Chih-Chieh Han, Ram Kumar, Roy Shea, Mani B. Srivastava:
Sensor network software update management: a survey. 283-294
Volume 15, Number 5, September 2005
- Gilbert Held:
From the editor: public versus private WiFi. 295 - Chamara Gunaratne, Kenneth J. Christensen, Bruce Nordman:
Managing energy consumption costs in desktop PCs and LAN switches with proxying, split TCP connections, and scaling of link speed. 297-310 - Chi-Yuan Chang, Wei-Ming Chen, Han-Chieh Chao, Tak-Goa Tsuei, Hong Bin Liu:
IP layer load balance using fuzzy logic under IPv6 anycast mechanism. 311-319 - Faouzi Kamoun:
Toward best maintenance practices in communications network management. 321-334 - Remi Badonnel, Radu State, Olivier Festor:
Management of mobile ad hoc networks: information model and probe-based architecture. 335-347 - Jing Wu, Michel Savoie, Scott Campbell, Hanxi Zhang, Gregor von Bochmann, Bill St. Arnaud:
Customer-managed end-to-end lightpath provisioning. 349-362 - Ali Haj Bakry, Saad Haj Bakry:
Enterprise resource planning: a review and a STOPE view. 363-370 - Gilbert Held:
Hardware spotlight: focus on blue secure intrusion protection system. 371-374
Volume 15, Number 6, November 2005
- Gilbert Held:
From the editor: do books matter? 375 - Adel Abdennour:
Short-term MPEG-4 video traffic prediction using ANFIS. 377-392 - Ashwini K. Pandey, Hiroshi Fujinoki:
Study of MANET routing protocols by GloMoSim simulator. 393-410 - Tin Yu Wu, Han-Chieh Chao, Tak-Goa Tsuei, Yufeng Li:
A measurement study of network efficiency for TWAREN IPv6 backbone. 411-419 - Yen-Wen Chen:
Study of LSP arrangement schemes in label switch networks. 421-431 - Gilbert Held:
Software spotlight: focus on network instruments' observer 10. 433-440
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.