메뉴 건너뛰기




Volumn 65, Issue , 2014, Pages 84-98

Network monitoring: Present and future

Author keywords

Design; Management; Measurements; Monitoring; Network configuration

Indexed keywords

BUDGET CONTROL; DESIGN; DIGITAL STORAGE; MANAGEMENT; MEASUREMENT;

EID: 84898076824     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2014.03.007     Document Type: Short Survey
Times cited : (92)

References (122)
  • 1
    • 84898078252 scopus 로고    scopus 로고
    • Agilent Technologies WhitePaper 2005 (accessed 12.08.13)
    • Evaluating high availability mechanisms, Agilent Technologies WhitePaper, 2005. < http://cp.literature.agilent.com/litweb/pdf/5989-4388EN.pdf > (accessed 12.08.13).
    • Evaluating High Availability Mechanisms
  • 6
    • 54949110925 scopus 로고    scopus 로고
    • Advanced network monitoring brings life to the awareness plane
    • A. Kind, X. Dimitropoulos, S. Denazis, and B. Claise Advanced network monitoring brings life to the awareness plane IEEE Commun. Mag. 46 10 2008 140 146
    • (2008) IEEE Commun. Mag. , vol.46 , Issue.10 , pp. 140-146
    • Kind, A.1    Dimitropoulos, X.2    Denazis, S.3    Claise, B.4
  • 7
    • 4444380999 scopus 로고    scopus 로고
    • A survey of fault localization techniques in computer networks
    • M. Steinder, and A.S. Sethi A survey of fault localization techniques in computer networks Elsevier Sci. Comput. Programming 53 2 2004 165 194
    • (2004) Elsevier Sci. Comput. Programming , vol.53 , Issue.2 , pp. 165-194
    • Steinder, M.1    Sethi, A.S.2
  • 10
    • 0033098398 scopus 로고    scopus 로고
    • Using policies for effective network management
    • M.J. Wright Using policies for effective network management Int. J. Network Manage 9 2 1999 118 125
    • (1999) Int. J. Network Manage , vol.9 , Issue.2 , pp. 118-125
    • Wright, M.J.1
  • 12
    • 0035439338 scopus 로고    scopus 로고
    • IP network configuration for intradomain traffic-engineering
    • A. Feldmann, and J. Rexford IP network configuration for intradomain traffic-engineering IEEE Network Mag. 15 5 2001 46 57
    • (2001) IEEE Network Mag. , vol.15 , Issue.5 , pp. 46-57
    • Feldmann, A.1    Rexford, J.2
  • 13
    • 84894553762 scopus 로고    scopus 로고
    • Detecting BGP configuration faults with static analysis
    • May
    • N. Feamster, H. Balakrishnan, Detecting BGP configuration faults with static analysis, in: Proc. USENIX NSDI, May 2005, pp. 43-56.
    • (2005) Proc. USENIX NSDI , pp. 43-56
    • Feamster, N.1    Balakrishnan, H.2
  • 15
    • 84865741324 scopus 로고    scopus 로고
    • Improving manageability through reorganization of routing-policy configurations
    • S. Lee, T. Wong, and H.S. Kim Improving manageability through reorganization of routing-policy configurations Elsevier Comput. Networks 56 14 2012 3192 3205
    • (2012) Elsevier Comput. Networks , vol.56 , Issue.14 , pp. 3192-3205
    • Lee, S.1    Wong, T.2    Kim, H.S.3
  • 16
    • 77249113828 scopus 로고    scopus 로고
    • Correlation, visualization, and usability analysis of routing policy configurations
    • S. Lee, and H.S. Kim Correlation, visualization, and usability analysis of routing policy configurations IEEE Trans. Netw. Serv. Manage. 7 1 2010 28 41
    • (2010) IEEE Trans. Netw. Serv. Manage. , vol.7 , Issue.1 , pp. 28-41
    • Lee, S.1    Kim, H.S.2
  • 17
    • 0042474068 scopus 로고    scopus 로고
    • Cing: Measuring network-internal delays using only existing infrastructure
    • March
    • K.G. Anagnostakis, M. Greenwald, R.S. Ryger, cing: measuring network-internal delays using only existing infrastructure, in: Proc. IEEE INFOCOM, March 2003, pp. 2112-2121.
    • (2003) Proc. IEEE INFOCOM , pp. 2112-2121
    • Anagnostakis, K.G.1    Greenwald, M.2    Ryger, R.S.3
  • 18
    • 84898061146 scopus 로고    scopus 로고
    • Clink (accessed 12.08.13)
    • Clink, < http://allendowney.com/research/clink/ > (accessed 12.08.13).
  • 19
    • 21844452970 scopus 로고    scopus 로고
    • Locating internet bottlenecks: Algorithms, measurements, and implications
    • October
    • N. Hu, L. Li, Z.M. Mao, P. Steenkiste, J. Wang, Locating internet bottlenecks: algorithms, measurements, and implications, in: Proc. ACM SIGCOMM, October 2004, pp. 41-54.
    • (2004) Proc. ACM SIGCOMM , pp. 41-54
    • Hu, N.1    Li, L.2    Mao, Z.M.3    Steenkiste, P.4    Wang, J.5
  • 20
    • 0344152271 scopus 로고    scopus 로고
    • Bandwidth estimation: Metrics, measurement techniques, and tools
    • November/December 2003
    • R.S. Prasad, M. Murray, C. Dovrolis, and k. claffy Bandwidth estimation: metrics, measurement techniques, and tools IEEE Network Mag. 17 6 2003 27 35 November/December 2003
    • (2003) IEEE Network Mag. , vol.17 , Issue.6 , pp. 27-35
    • Prasad, R.S.1    Murray, M.2    Dovrolis, C.3    Claffy, K.4
  • 21
    • 33748757209 scopus 로고    scopus 로고
    • Sprobe: A fast technique for measuring bottleneck bandwidth in uncooperative environments
    • June
    • S. Saroiu, P.K. Gummadi, S.D. Gribble, Sprobe: a fast technique for measuring bottleneck bandwidth in uncooperative environments, in: Proc. IEEE INFOCOM, June 2002.
    • (2002) Proc. IEEE INFOCOM
    • Saroiu, S.1    Gummadi, P.K.2    Gribble, S.D.3
  • 22
    • 0036922145 scopus 로고    scopus 로고
    • An adaptive architecture for monitoring and failure analysis of high-speed networks
    • B. Floering, B. Brothers, Z. Kalbarczyk, R.K. Iyer, An adaptive architecture for monitoring and failure analysis of high-speed networks, in: Proc. IEEE/IFIP DSN, 2002.
    • (2002) Proc. IEEE/IFIP DSN
    • Floering, B.1    Brothers, B.2    Kalbarczyk, Z.3    Iyer, R.K.4
  • 24
  • 25
    • 84857369823 scopus 로고    scopus 로고
    • Every microsecond counts: Tracking fine-grain latencies with a lossy difference aggregator
    • August
    • R. Kompella, K. Levchenko, A.C. Snoeren, G. Varghese, Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator, in: Proc. ACM SIGCOMM, August 2009.
    • (2009) Proc. ACM SIGCOMM
    • Kompella, R.1    Levchenko, K.2    Snoeren, A.C.3    Varghese, G.4
  • 32
    • 84898062973 scopus 로고    scopus 로고
    • (accessed 12.08.13)
    • RRDTool. < http://oss.oetiker.ch/rrdtool/ > (accessed 12.08.13).
    • RRDTool
  • 33
  • 34
    • 0035360861 scopus 로고    scopus 로고
    • Trajectory sampling for direct traffic observation
    • N.G. Duffield, and M. Grossglauser Trajectory sampling for direct traffic observation IEEE/ACM Trans. Networking 9 3 2001 280 292
    • (2001) IEEE/ACM Trans. Networking , vol.9 , Issue.3 , pp. 280-292
    • Duffield, N.G.1    Grossglauser, M.2
  • 39
    • 84898066917 scopus 로고    scopus 로고
    • (accessed 12.08.13)
    • CIM Standards, < http://www.dmtf.org/standards/cim/ > (accessed 12.08.13).
    • CIM Standards
  • 40
    • 84888901561 scopus 로고    scopus 로고
    • (ipfix), (accessed 12.08.13)
    • IP Flow Information Export (ipfix), < http://datatracker.ietf.org/wg/ ipfix/charter/ > (accessed 12.08.13).
    • IP Flow Information Export
  • 42
    • 0036577573 scopus 로고    scopus 로고
    • A scalable monitoring approach based on aggregation and refinement
    • Y. Lin, and M.C. Chan A scalable monitoring approach based on aggregation and refinement IEEE J. Sel. Areas Commun. 20 4 2002 677 690
    • (2002) IEEE J. Sel. Areas Commun. , vol.20 , Issue.4 , pp. 677-690
    • Lin, Y.1    Chan, M.C.2
  • 44
    • 0141552473 scopus 로고    scopus 로고
    • FlowScan: A network traffic flow reporting and visualization tool
    • D. Plonka, FlowScan: a network traffic flow reporting and visualization tool, in: Proc. USENIX LISA, 2000.
    • (2000) Proc. USENIX LISA
    • Plonka, D.1
  • 45
    • 85126497569 scopus 로고    scopus 로고
    • NAF: The NetSA aggregated flow tool suite
    • B. Trammell, C. Gates, NAF: the NetSA aggregated flow tool suite, in: Proc. USENIX LISA, 2006.
    • (2006) Proc. USENIX LISA
    • Trammell, B.1    Gates, C.2
  • 46
    • 0141775801 scopus 로고    scopus 로고
    • The OSU flow-tools package and CISCO NetFlow logs
    • S. Romig, The OSU flow-tools package and CISCO NetFlow logs, in: Proc. USENIX LISA, 2000.
    • (2000) Proc. USENIX LISA
    • Romig, S.1
  • 47
    • 84898072286 scopus 로고    scopus 로고
    • Thresh - A data-directed SNMP threshold poller
    • J. Sellens, Thresh - a data-directed SNMP threshold poller, in: Proc. USENIX LISA, 2000.
    • (2000) Proc. USENIX LISA
    • Sellens, J.1
  • 48
    • 77249134925 scopus 로고    scopus 로고
    • NetViewer: A network traffic visualization and analysis tool
    • S.S. Kim, A.L. Reddy, NetViewer: a network traffic visualization and analysis tool, in: Proc. USENIX LISA, 2005.
    • (2005) Proc. USENIX LISA
    • Kim, S.S.1    Reddy, A.L.2
  • 49
    • 84898079193 scopus 로고    scopus 로고
    • RTG: A scalable SNMP statistics architecture for service providers
    • R. Beverly, RTG: A Scalable SNMP Statistics Architecture for Service Providers, in: Proc. USENIX LISA, 2002.
    • (2002) Proc. USENIX LISA
    • Beverly, R.1
  • 52
    • 70450263491 scopus 로고    scopus 로고
    • Spatio-temporal compressive sensing and internet traffic matrices
    • Y. Zhang, M. Roughan, W. Willinger, and L. Qiu Spatio-temporal compressive sensing and internet traffic matrices ACM SIGCOMM CCR 39 4 2009 267 278
    • (2009) ACM SIGCOMM CCR , vol.39 , Issue.4 , pp. 267-278
    • Zhang, Y.1    Roughan, M.2    Willinger, W.3    Qiu, L.4
  • 54
    • 0041513496 scopus 로고    scopus 로고
    • Long-term forecasting of Internet backbone traffic: Observations and initial models
    • K. Papagiannaki, N. Taft, Z.L. Zhang, C. Diot, Long-term forecasting of Internet backbone traffic: observations and initial models, in: Proc. IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Papagiannaki, K.1    Taft, N.2    Zhang, Z.L.3    Diot, C.4
  • 57
    • 84898080004 scopus 로고    scopus 로고
    • Toward the accurate identification of network applications
    • March
    • A. Moore, K Papagiannaki, Toward the Accurate Identification of Network Applications, in: Proc. PAM, March 2001.
    • (2001) Proc. PAM
    • Moore, A.1    Papagiannaki, K.2
  • 59
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, scalable in-network identification of p2p traffic using application signatures
    • S. Sen, O. Spatscheck, D. Wang, Accurate, scalable in-network identification of p2p traffic using application signatures, in: Proc. WWW, 2004.
    • (2004) Proc. WWW
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 60
    • 51249116516 scopus 로고    scopus 로고
    • Lightweight, payload-based traffic classification: An experimental evaluation
    • F. Risso, M. Baldi, O. Morandi, A. Baldini, P. Monclus, Lightweight, payload-based traffic classification: an experimental evaluation, in: Proc. IEEE ICC, 2008.
    • (2008) Proc. IEEE ICC
    • Risso, F.1    Baldi, M.2    Morandi, O.3    Baldini, A.4    Monclus, P.5
  • 61
    • 57849161672 scopus 로고    scopus 로고
    • Early recognition of encrypted application
    • L. Bernaille, R. Teixeira, Early recognition of encrypted application, in: Proc. PAM, 2007.
    • (2007) Proc. PAM
    • Bernaille, L.1    Teixeira, R.2
  • 63
    • 33645792808 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • K. Xu, Z. Zhang, S. Bhattacharyya, Profiling internet backbone traffic: behavior models and applications, in: Proc. ACM SIGCOMM, 2005.
    • (2005) Proc. ACM SIGCOMM
    • Xu, K.1    Zhang, Z.2    Bhattacharyya, S.3
  • 65
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for Internet traffic classification using machine learning
    • T. Nguyen, and G. Armitage A survey of techniques for Internet traffic classification using machine learning IEEE Commun. Surv. Tutorials 10 4 2008 56 76
    • (2008) IEEE Commun. Surv. Tutorials , vol.10 , Issue.4 , pp. 56-76
    • Nguyen, T.1    Armitage, G.2
  • 67
    • 38549084831 scopus 로고    scopus 로고
    • Accurate classification of the Internet traffic based on the SVM Method
    • Z. Li, R. Yuan, X. Guan, Accurate classification of the Internet traffic based on the SVM Method, in: Proc. IEEE ICC, 2007.
    • (2007) Proc. IEEE ICC
    • Li, Z.1    Yuan, R.2    Guan, X.3
  • 68
    • 84869166587 scopus 로고    scopus 로고
    • Internet traffic classification using Bayesian analysis techniques
    • A.W. Moore, D. Zuev, Internet traffic classification using Bayesian analysis techniques, in: Proc. ACM SIGMETRICS, 2005.
    • (2005) Proc. ACM SIGMETRICS
    • Moore, A.W.1    Zuev, D.2
  • 69
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • C. Estan, S. Savage, G. Varghese, Automatically inferring patterns of resource consumption in network traffic, in: Proc. ACM SIGCOMM, 2003.
    • (2003) Proc. ACM SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 70
    • 33744469859 scopus 로고    scopus 로고
    • Data mining techniques for effective and scalable traffic analysis
    • M. Baldi, E. Baralis, F. Risso, Data mining techniques for effective and scalable traffic analysis, in: Proc. IEEE/IFIP IM, 2005.
    • (2005) Proc. IEEE/IFIP im
    • Baldi, M.1    Baralis, E.2    Risso, F.3
  • 71
    • 70849095357 scopus 로고    scopus 로고
    • What's going on? Learning communication rules in edge networks
    • S. Kandula, R. Chandra, D. Katabi, What's going on? Learning communication rules in edge networks, in: Proc. ACM SIGCOMM, 2008.
    • (2008) Proc. ACM SIGCOMM
    • Kandula, S.1    Chandra, R.2    Katabi, D.3
  • 73
    • 84877759417 scopus 로고    scopus 로고
    • Measurement methods for fast and accurate blackhole identification with binary tomography
    • I. Cunha, R. Teixeira, N. Feamster, C. Diot, Measurement methods for fast and accurate blackhole identification with binary tomography, in: Proc. ACM IMC, 2009.
    • (2009) Proc. ACM IMC
    • Cunha, I.1    Teixeira, R.2    Feamster, N.3    Diot, C.4
  • 74
    • 84876261476 scopus 로고    scopus 로고
    • Towards highly reliable enterprise network services via inference of multi-level dependencies
    • P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. Maltz, and M. Zhang Towards highly reliable enterprise network services via inference of multi-level dependencies ACM. SIGCOMM CCR 37 4 2007 13 24
    • (2007) ACM. SIGCOMM CCR , vol.37 , Issue.4 , pp. 13-24
    • Bahl, P.1    Chandra, R.2    Greenberg, A.3    Kandula, S.4    Maltz, D.5    Zhang, M.6
  • 85
  • 86
    • 84864236415 scopus 로고    scopus 로고
    • Tracking configuration changes proactively in large IT environments
    • April
    • M. Soni, V.R. Madduri, M. Gupta, P. De, Tracking configuration changes proactively in large IT environments, in: Proc. IEEE/IFIP NOMS, April 2012.
    • (2012) Proc. IEEE/IFIP NOMS
    • Soni, M.1    Madduri, V.R.2    Gupta, M.3    De, P.4
  • 87
    • 0344236478 scopus 로고    scopus 로고
    • MRTG: The multi router traffic grapher
    • T. Oetiker, MRTG: the Multi Router Traffic Grapher, in: Proc. USENIX LISA, 1998.
    • (1998) Proc. USENIX LISA
    • Oetiker, T.1
  • 88
    • 84898081341 scopus 로고    scopus 로고
    • (accessed 12.08.13)
    • SNAPP, < http://sourceforge.net/projects/snapp/ > (accessed 12.08.13).
    • SNAPP
  • 90
    • 85126497886 scopus 로고    scopus 로고
    • Visualizing NetFlows for security at line speed: The SIFT tool suite
    • W. Yurcik, Visualizing NetFlows for security at line speed: the SIFT tool suite, in: Proc. USENIX LISA, 2005.
    • (2005) Proc. USENIX LISA
    • Yurcik, W.1
  • 94
    • 34547880763 scopus 로고    scopus 로고
    • A-GAP: An adaptive protocol for continuous network monitoring with accuracy objectives
    • A.G. Prieto, and R. Stadler A-GAP: an adaptive protocol for continuous network monitoring with accuracy objectives IEEE Trans. Netw. Serv. Manage. 4 1 2007 2 12
    • (2007) IEEE Trans. Netw. Serv. Manage. , vol.4 , Issue.1 , pp. 2-12
    • Prieto, A.G.1    Stadler, R.2
  • 95
    • 0036577143 scopus 로고    scopus 로고
    • Efficient reactive monitoring
    • M. Dilman, and D. Raz Efficient reactive monitoring IEEE J. Sel. Areas Commun. 20 4 2002 668 676
    • (2002) IEEE J. Sel. Areas Commun. , vol.20 , Issue.4 , pp. 668-676
    • Dilman, M.1    Raz, D.2
  • 98
    • 33750338078 scopus 로고    scopus 로고
    • Robust monitoring of link delays and faults in IP networks
    • Y. Bejerano, and R. Rastogi Robust monitoring of link delays and faults in IP networks IEEE/ACM Trans. Networking 14 5 2006 1092 1103
    • (2006) IEEE/ACM Trans. Networking , vol.14 , Issue.5 , pp. 1092-1103
    • Bejerano, Y.1    Rastogi, R.2
  • 100
    • 0043016367 scopus 로고    scopus 로고
    • Distributed network monitoring with bounded link utilization in IP networks
    • L. Li, M. Thottan, B. Yao, S. Paul, Distributed network monitoring with bounded link utilization in IP networks, in: Proc. IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Li, L.1    Thottan, M.2    Yao, B.3    Paul, S.4
  • 101
    • 84862782056 scopus 로고    scopus 로고
    • Measurement-aware monitor placement and routing: A joint optimization approach for network-wide measurements
    • G. Huang, C. Chang, C. Chuah, and B. Lin Measurement-aware monitor placement and routing: a joint optimization approach for network-wide measurements IEEE Trans. Netw. Serv. Manage. 9 1 2012 48 59
    • (2012) IEEE Trans. Netw. Serv. Manage. , vol.9 , Issue.1 , pp. 48-59
    • Huang, G.1    Chang, C.2    Chuah, C.3    Lin, B.4
  • 102
    • 12844258126 scopus 로고    scopus 로고
    • In-service QoS monitoring of real-time applications using SM MIB
    • Y. Choi, and I. Hwang In-service QoS monitoring of real-time applications using SM MIB Int. J. Network Manage. 15 1 2005 31 42
    • (2005) Int. J. Network Manage. , vol.15 , Issue.1 , pp. 31-42
    • Choi, Y.1    Hwang, I.2
  • 103
    • 0032099158 scopus 로고    scopus 로고
    • Using RMON matrix group extensions to analyze internetworking problems
    • G.A. Winters, D.A. Muntz, and T.J. Teorey Using RMON matrix group extensions to analyze internetworking problems J. Netw. Syst. Manage. 6 2 1998 179 196
    • (1998) J. Netw. Syst. Manage. , vol.6 , Issue.2 , pp. 179-196
    • Winters, G.A.1    Muntz, D.A.2    Teorey, T.J.3
  • 106
    • 0036576792 scopus 로고    scopus 로고
    • Exploiting agent mobility for large-scale network monitoring
    • A. Liotta, G. Pavlou, and G. Knight Exploiting agent mobility for large-scale network monitoring IEEE Network Mag. 16 3 2002 3 15
    • (2002) IEEE Network Mag. , vol.16 , Issue.3 , pp. 3-15
    • Liotta, A.1    Pavlou, G.2    Knight, G.3
  • 107
  • 109
  • 110
    • 84859074608 scopus 로고    scopus 로고
    • On multi-gigabit packet capturing with multi-core commodity hardware
    • N. Bonelli, A.D. Pietro, S. Giordano, G. Procissi, On multi-gigabit packet capturing with multi-core commodity hardware, in: Proc. PAM, 2012.
    • (2012) Proc. PAM
    • Bonelli, N.1    Pietro, A.D.2    Giordano, S.3    Procissi, G.4
  • 111
    • 84864188519 scopus 로고    scopus 로고
    • Scalable analysis of network measurements with Hadoop and Pig
    • April
    • T. Samak, D. Gunter, V. Hendrix, Scalable analysis of network measurements with Hadoop and Pig, in: Proc. IEEE/IFIP NOMS, April 2012.
    • (2012) Proc. IEEE/IFIP NOMS
    • Samak, T.1    Gunter, D.2    Hendrix, V.3
  • 112
    • 37549003336 scopus 로고    scopus 로고
    • Mapreduce: Simplified data processing on large clusters
    • J. Dean, and S. Ghemawat Mapreduce: simplified data processing on large clusters Commun. ACM 51 1 2008 107 113
    • (2008) Commun. ACM , vol.51 , Issue.1 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 113
    • 85002655794 scopus 로고    scopus 로고
    • Stream-monitoring with BlockMon: Convergence of network measurements and data analytics platforms
    • April 2013
    • D. Simoncelli, M. Dusi, F. Gringoli, and S. Niccolini "Stream-monitoring with BlockMon: convergence of network measurements and data analytics platforms" ACM SIGCOMM CCR 43 2 2013 30 35 April 2013
    • (2013) ACM SIGCOMM CCR , vol.43 , Issue.2 , pp. 30-35
    • Simoncelli, D.1    Dusi, M.2    Gringoli, F.3    Niccolini, S.4
  • 115
    • 84898067329 scopus 로고    scopus 로고
    • (accessed 12.08.13)
    • Storm, < http://storm-project.net > (accessed 12.08.13).
    • Storm
  • 119
    • 84895058956 scopus 로고    scopus 로고
    • DAPA: Diagnosing application performance anomalies for virtualized infrastructure
    • H. Kang, X. Zhu, J.L. Wong, DAPA: diagnosing application performance anomalies for virtualized infrastructure, in: Proceedings of USENIX Hot-ICE, 2012.
    • (2012) Proceedings of USENIX Hot-ICE
    • Kang, H.1    Zhu, X.2    Wong, J.L.3
  • 120
    • 84898068299 scopus 로고    scopus 로고
    • Synergy2Cloud: Introducing cross-sharing of application experiences into the cloud management cycle
    • F. Dinu, T.S. Eugene Ng, Synergy2Cloud: introducing cross-sharing of application experiences into the cloud management cycle, in: Proceedings of USENIX Hot-ICE, 2012.
    • (2012) Proceedings of USENIX Hot-ICE
    • Dinu, F.1    Eugene Ng, T.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.