Mechanisms for Autonomous Management of Networks and Services: 4th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2010, Zurich, Switzerland, June 23-25, 2010. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The International Conference on Autonomous Infrastructure, Management and Se- rity (AIMS 2010) was a single-track event integrating regular conference paper s- sions, tutorials, keynotes, and a PhD student workshop into a highly interactive event. The main goal of AIMS is to look beyond borders and to stimulate the exchange of ideas across different communities and among PhD students. AIMS 2010 collocated the International Summer School in Network and Service Management (ISSNSM 2010). This unique summer school offers hands-on learning experiences in network and service management topics, which requires attendees to work in practical on-site courses combined with preceding short tutorial-like teaching sessions. AIMS 2010––which took place during June 23–25, 2010, in Zürich, Switzerland and was hosted by the Communication Systems Group CSG, Department of Inform- ics IFI, of the University of Zürich UZH––followed the already established tradition of an unusually vivid and interactive conference series in terms of the fourth conf- ence, after successful instantiations in Oslo, Norway 2007, Bremen, Germany 2008, and Enschede, The Netherlands 2009. AIMS 2010 focused especially on autonomous management aspects of modern networks and their services. The set of mechanisms, peer-to-peer-based schemes, scalability aspects, and autonomous approaches are of major interest. In particular the design, monitoring, management, and protection of networked systems in an efficient, secure, and autonomic manner are key to comm- cially viable and successful networks and services.

Author(s): Metin Feridun (auth.), Burkhard Stiller, Filip De Turck (eds.)
Series: Lecture Notes in Computer Science 6155 : Computer Communication Networks and Telecommunications
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 179
Tags: Computer Communication Networks; Software Engineering; Information Systems Applications (incl. Internet); Algorithm Analysis and Problem Complexity; Operating Systems; Programming Techniques

Front Matter....Pages -
Facing Complexity in Systems Management....Pages 1-1
Modeling User Behavior in P2P Live Video Streaming Systems through a Bayesian Network....Pages 2-13
OMAN – A Management Architecture for P2P Service Overlay Networks....Pages 14-25
Towards a P2P-Based Deployment of Network Management Information....Pages 26-37
On the Combined Behavior of Autonomous Resource Management Agents....Pages 38-49
Autonomous Resource-Aware Scheduling of Large-Scale Media Workflows....Pages 50-64
An Autonomic Testing Framework for IPv6 Configuration Protocols....Pages 65-76
Researching Multipath TCP Adoption....Pages 77-80
Report- and Reciprocity-Based Incentive Mechanisms for Live and On-Demand P2P Video Streaming....Pages 81-84
Model-Driven Service Level Management....Pages 85-88
Managing Risks at Runtime in VoIP Networks and Services....Pages 89-92
Towards Dynamic and Adaptive Resource Management for Emerging Networks....Pages 93-97
Adaptive Underwater Acoustic Communications....Pages 98-101
Probabilistic Fault Diagnosis in the MAGNETO Autonomic Control Loop....Pages 102-105
Modelling Cloud Computing Infrastructure....Pages 106-109
Towards an Autonomic Network Architecture for Self-healing in Telecommunications Networks....Pages 110-113
LearnIT: Enhanced Search and Visualization of IT Projects....Pages 114-117
Strategies for Network Resilience: Capitalising on Policies....Pages 118-122
Automatic Link Numbering and Source Routed Multicast....Pages 123-134
Mining NetFlow Records for Critical Network Activities....Pages 135-146
Implementation of a Stream-Based IP Flow Record Query Language....Pages 147-158
Towards Flexible and Secure Distributed Aggregation....Pages 159-162
Intrusion Detection in SCADA Networks....Pages 163-166
Cybermetrics: User Identification through Network Flow Analysis....Pages 167-170
Distributed Architecture for Real-time Traffic Analysis....Pages 171-174
Scalable Service Performance Monitoring....Pages 175-178
Back Matter....Pages -