Tutorials
| Tutorial 1 - IETF and the Operations and Management Area Bert Wijnen (Lucent Technologies) |
| Tutorial 2 - Medium and Long Term Strategy in Telecommunication
Networks Guy Pujolle (Paris 6 University) |
| Tutorial 3 - Towards Autonomic Network Management Marcus Brunner (NEC Europe) |
Invited Speeches
| On Deriving Unknown Vulnerabilities from Zero-Day Exploits Felix Wu (UC Davis) |
| Mobile Peer-to-Peer Networking: the Operator's Perspective Antonio Liotta (University of Essex) |
Panels
| What are the new management challenges to come? What are the management trends worth following? Chair: Liane Margarida Rockenbach Tarouco (Federal University of Rio Grande do Sul) |
| The past, the present and the future of network operations and
management research in Latin America: a panoramic view Chair: José Marcos Silva Nogueira (Federal University of Minas Gerais) |
Technical Session 1 - Mobile and Wireless
| A Prototype-based Evaluation of IP Technologies for Mobile VPNs Antonio Liotta (University of Essex), Daniel H. Tyrode-Goilo (University of Surrey), Adetola Oredope (University of Essex) |
| Evaluating the Impact on Data Reception and Energy Consumption of Mobile Devices using IPSec to securely access WiFi Networks Fernando Luis da Costa Junior, Luciano Gaspary, Jorge Barbosa, Gerson Cavalheiro, Luciano Pfitscher (UNISINOS), José Dirceu G. Ramos (Hewlett-Packard Computadores) |
| Extension and Evaluation of the RSVP version 2 Protocol in Infra-Structured Mobile Networks Paulo Ziemer, Paulo Cesar Vidal (Military Engineering Institute - IME) |
| Defining a Wireless Sensor Network Management Protocol Fabrício Silva, Linnyer Ruiz, Thais Braga, José Marcos Nogueira, Antonio Alfredo Ferreira Loureiro (UFMG) |
Technical Session 2 - Security
| Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment Bruno Bogaz Zaperlão, Leonardo de Souza Mendes (UNICAMP) Mario Proença Jr. (Universidade Estadual de Londrina) |
| Implementation of a formal security policy refinement
process in WBEM architecture Romain Laborde, Michel Kamel, François Barrere, Abdelmalek Benzekri (Université Paul Sabatier - IRIT/SIERA), |
| Optimization of Firewall Filtering Rules by a Thorough
Rewriting Yi Zhang, Yong Zhang, Weinong Wang (Shanghai JiaoTong University) |
| An Integrated and Automated Network Management and Operation System Diego Kreutz, Benhur Stein (UFSM) |
Technical Session 3 - Policy-Based Management
| Semantic Ordering in Policy-based Management Andrei Majidian (British Telecommunications plc) |
| A Notification Correlation Architecture Based on Policies and Web Services Evandro Della Vecchia Pereira, Lisandro Zambenedetti Granville, Maria Janilce Bosquiroli Almeida, Liane Tarouco (UFRGS) |
| Policy-based Grooming in Optical Networks Fábio Verdi, Cláudio Carvalho, Mauricio Magalhães, Edmundo Madeira (UNICAMP) |
| Smooth TCP Elvis Vieira, Michael Bauer (The University of Western Ontario) |
Technical Session 4 - Monitoring and Measurement
| Monitoring based on statistical analysis for evaluating
speech quality of calls in VoIP environment Ana Flávia Lima, Francisco Ribeiro, Maiquel Sampaio de Melo (UFC), Leandro Carvalho, Regeane Aguiar (UFAM), José Neuman de Souza (UFC) Edjair Souza Mota (UFAM) |
| Measurement Based Admission Control for a Class-based QoS Framework Thomas Bohnert, Edmundo Monteiro (University of Coimbra) |
| Using Metaheuristics for Topological Design of Service Overlay Networks Sibelius Vieira (Catholic University of Goias) |
| Investigating the Performance of Video-on-Demand Systems Over WLANs Using Generic Association Control Leonardo Pinho, Claudio Amorim (UFRJ) |
| A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo (IBM) |
| Distribution of Network Management Policies with Emphasis
on Quality of Service Aujor Andrade, Carlos Westphall (UFSC) |
| Design and Implementation of a GUI for the Layerd Network Topology and Connections in an ATM Network Kim Dae-Woo, Cho Suk-Hyoung, Ann Chi-Hong (Korea Telecom) |
| Towards True Self-Managing Systems: The Autonomic Computing Approach Marcelo Perazolo (IBM) |
| Call Accounting in a VoIP Infrastructure João Carlos da Costa, Paulo de Aguiar Rodrigues, Rodrigo Moreira Silveira, Marcelo Lobo da Costa (UFRJ) |
| Distribution and Coordination of Policies for Large-scale Service Management Nigel Sheridan-Smith, Tim O Neill, John Leaney (University of Technology) Mark Hunter (Alcatel Australia) |
| MUAT: An Environment for Accounting and Characterization of the Use of Computational Grids Glauco Ludwig, Luciano Gaspary, Gerson Cavalheiro (UNISINOS) |
| Policy-Based Management of the inter-Domain communications Security Mustapha El Hamzaoui, Abderrahim Sekkaki, Bahloul Bensassi (University Hassan II) |
| Policy-based Resolution of the Diffie-Hellman protocol vulnerability Mustapha El Hamzaoui, Abderrahim Sekkaki, Bahloul Bensassi (University Hassan II) |
| A Set of Tools to Generate Intelligent Agents for Fault
Prediction in Optical Rerouting Carlos Goncalves (CEFET-CE) Carlos Vieira (UFC) Mauro Oliveira (CEFET-CE) Rossana Andrade (UFC) |
| Policy Engineering for Security Management of Organization Information Systems Yi Zhang,Yong Zhang, Weinong Wang (Shangai Jiaotong University) |
| User-centric Quality of Service Management in UMTS Karim Yaici (University of Surrey) Antonio Liotta (University of Essex) Haris Zisimopoulos, Tony Sammut (Vodafone) |
| A Study of Security Policy Making Adaptable to Users' Environments
Based on International Standards Guillermo Ramirez Caceres, Yoshimi Teshigawara (Soka University) |