<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="program.xsl"?>
<program>
  <session>
    <code>MCK</code>
    <sessiontitle>Mini-Conference Keynote</sessiontitle>
    <sessionsubtitle>Managing Network Devices with Redfish and YANG</sessionsubtitle>
    <sessionspeaker>John Leung (Intel) and Matsuki Yoshino (Hitachi) </sessionspeaker>
        <sessionspeakerurl>https://www.cnsm-conf.org/2017/keynotes.html</sessionspeakerurl>
    <sessiondetails/>
    <date>27 November 2017</date>
    <range>09:30-10:30</range>
    <starttime>2017-11-27T09:30:00+09:00</starttime>
    <endtime>2017-11-27T10:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Shingo Ata (Osaka City University, Japan)</chair>
    <papers/>
  </session>

  <session>
    <code>CB</code>
    <sessiontitle>Coffee break</sessiontitle>
    <sessiondetails/>
    <range>10:30-11:00</range>
    <room>Room: Lobby, B1F, Bldg.27</room>
    <chairs/>
    <papers/>
  </session>

  <session>
    <code>MC1</code>
    <sessiontitle>Mini-Conference Session 1</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>11:00-12:30</range>
    <starttime>2017-11-27T11:00:00+09:00</starttime>
    <endtime>2017-11-27T12:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Takuya Asaka (Tokyo Metropolitan University, Japan)</chair>
    <papers>
      <paper>
        <starttime>11:00</starttime>
        <endtime>11:18</endtime>
        <paperid>1570375159</paperid>
        <sessionid>MC1.1</sessionid>
        <papertitle>Applicability and Limitations of a Simple WiFi Hotspot Model for Cities</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Offloading mobile Internet data via WiFi has emerged as an omnipresent trend. WiFi networks are already widely deployed by many private and public institutions (e.g., libraries, cafes, restaurants) but also by commercial services to provide alternative Internet access for their customers and to mitigate the load on mobile networks. Moreover, smart cities start to install WiFi infrastructure for current and future civic services, e.g., based on sensor networks or the Internet of Things. A simple model for the distribution of WiFi hotspots in an urban environment is presented. The hotspot locations are modeled with a uniform distribution of the angle and an exponential distribution of the distance, which is truncated to the city limits. We compare the characteristics of this model in detail to the real distributions. Moreover, we show the applicability and the limitations of this model, and the results suggest that the model can be used in scenarios, which do not require an accurate spatial collocation of the hotspots, such as offloading potential, coverage, or signal strength. Finally, the applicability of the model is studied in a performance evaluation of public WiFi offloading for HTTP adaptive video streaming.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Michael </givenname>
              <mi/>
              <surname>Seufert</surname>
            </name>
            <id>857079</id>
            <affiliation>University of Würzburg</affiliation>
            <country>Germany</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Christian </givenname>
              <mi/>
              <surname>Moldovan</surname>
            </name>
            <id>1222927</id>
            <affiliation>University of Duisburg-Essen</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Valentin </givenname>
              <mi/>
              <surname>Burger</surname>
            </name>
            <id>505861</id>
            <affiliation>University of Wuerzburg</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Tobias </givenname>
              <mi/>
              <surname>Hoßfeld</surname>
            </name>
            <id>118152</id>
            <affiliation>University of Duisburg-Essen</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>11:18</starttime>
        <endtime>11:36</endtime>
        <paperid>1570378350</paperid>
        <sessionid>MC1.2</sessionid>
        <papertitle>Wireless LAN Access Point Deployment and Pricing with Location-Based Advertising</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>In order to improve the quality of service (QoS) for mobile users (MUs) and save investment cost for deploying new cellular base station, mobile network operators (MNOs) are deploying wireless local area network (LAN) access points (APs) to offload MU's traffic from cellular network to wireless LAN. However, offloading too much traffic from cellular network may impair MNO's profit since the cellular network price is higher than that of wireless LAN, whose price is low or even zero. Therefore, how to deploy wireless LAN APs to offload traffic without impairing MNO's profit is a critical problem for MNOs. As far as the authors understand, existing studies about deployment of wireless LAN APs do not consider MNO's profit and are usually in a heuristic manner. In this paper, we study the location-based advertising (LBA) leveraged wireless LAN deployment, where MNO may also collect revenue by selling LBA service in different locations to advertisers. We formulate MNO's profit maximization problem by considering different MU's demand in different locations, wireless LAN price for MUs, and revenue from LBA service. Extensive simulations are conducted to validate our analytical results.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Cheng </givenname>
              <mi/>
              <surname>Zhang</surname>
            </name>
            <id>524025</id>
            <affiliation>Waseda University</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Zhi </givenname>
              <mi/>
              <surname>Liu</surname>
            </name>
            <id>533679</id>
            <affiliation>Shizuoka University</affiliation>
            <country>Japan</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Bo </givenname>
              <mi/>
              <surname>Gu</surname>
            </name>
            <id>827267</id>
            <affiliation>Kogakuin University</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kyoko </givenname>
              <mi/>
              <surname>Yamori</surname>
            </name>
            <id>166307</id>
            <affiliation>Asahi University</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Yoshiaki </givenname>
              <mi/>
              <surname>Tanaka</surname>
            </name>
            <id>92747</id>
            <affiliation>Waseda University</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>11:36</starttime>
        <endtime>11:54</endtime>
        <paperid>1570378445</paperid>
        <sessionid>MC1.3</sessionid>
        <papertitle>Two-way Communication with Wait-slot Scheme for Neighbor Discovery Process in Dense Bluetooth Low Energy Networks</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Bluetooth Low Energy (BLE) Beacon technology is well on the way to becoming the future of business due to its inexpensive and low-power properties. All communications in BLE networks must involve neighbor discovery process (NDP) in the first place since a BLE device needs to create a connection or exchange information with its neighbors. Thus, the performance of the discovery latency is a challenging issue to be addressed for integrating BLE into the Beacon application development as the number of BLE devices increases. In this paper, we propose a two-way communication with wait-slot scheme (TCWS) to minimize the probability of collision occurring on the response frames of BLE devices and improve the latency of NDP. We formulate the state transition diagram for analyzing the performance of our proposed scheme. The results show that TCWS provides much better performance in terms of the probability of collision and the discovery latency in dense BLE networks.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Ting-Ting </givenname>
              <mi/>
              <surname>Yang</surname>
            </name>
            <id>1499473</id>
            <affiliation>National Chung-Hsing University</affiliation>
            <country>Taiwan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Tseng </givenname>
              <mi/>
              <surname>Hsueh-Wen</surname>
            </name>
            <id>12901</id>
            <affiliation>National Chung-Hsing University</affiliation>
            <country>Taiwan</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>11:54</starttime>
        <endtime>12:12</endtime>
        <paperid>1570382487</paperid>
        <sessionid>MC1.4</sessionid>
        <papertitle>High-end LTE Service Evolution in Korea: 4 Years of Nationwide Mobile Network Measurements</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>This paper provides a temporal cellular and WiFi networks analysis from a nationwide crowdsourcing measurement study. Our dataset consists of 2.98M user-initiated quality tests on 3G/LTE/WiFi involving 157K mobile devices from Nov. 2012 to July 2016 (187 weeks) in South Korea. Our analysis explains changes in QoS from the user perspective, not Mobile Network Operators (MNO). We revealed that WiFi shows twice higher compounded quarterly growth rate for download throughput against LTE. Yet, LTE and WiFi show almost no difference in absolute download throughput value as of mid 2016. Second, LTE delivers relatively low latency, less-varying loss rate, and higher throughput in overall. Finally, the result shows that the evolution for the high-end LTE services has been faster than user adoption, where the majority of the LTE users stays below 75 Mbps of throughput.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Jonghwan </givenname>
              <mi/>
              <surname>Hyun</surname>
            </name>
            <id>868609</id>
            <affiliation>POSTECH</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Youngjoon </givenname>
              <mi/>
              <surname>Won</surname>
            </name>
            <id>118053</id>
            <affiliation>Hanyang University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kenjiro </givenname>
              <mi/>
              <surname>Cho</surname>
            </name>
            <id>15696</id>
            <affiliation>IIJ</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Romain </givenname>
              <mi/>
              <surname>Fontugne</surname>
            </name>
            <id>286137</id>
            <affiliation>Internet Initiative Japan Inc.</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Jaeyoon </givenname>
              <mi/>
              <surname>Chung</surname>
            </name>
            <id>558361</id>
            <affiliation>Princeton University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>James </givenname>
              <mi>W.</mi>
              <surname>Hong</surname>
            </name>
            <id>2797</id>
            <affiliation>POSTECH</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>

  <session>
    <code>Lunch</code>
    <sessiontitle>Lunch</sessiontitle>
    <sessiondetails/>
    <range>12:30-14:00</range>
    <room>Restaurant Mori-no-Kaze, 15F, Bldg.26</room>
    <chairs/>
    <papers/>
  </session>

  <session>
    <code>MC2</code>
    <sessiontitle>Mini-Conference Session 2</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>14:00-15:30</range>
    <starttime>2017-11-27T14:00:00+09:00</starttime>
    <endtime>2017-11-27T15:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Kazuhiko Kinoshita (Tokushima University, Japan)</chair>
    <papers>
      <paper>
        <starttime>14:00</starttime>
        <endtime>14:18</endtime>
        <paperid>1570375144</paperid>
        <sessionid>MC2.1</sessionid>
        <papertitle>An Adaptive Scaling Mechanism for Managing Performance Variations in Network Functions Virtualization: A Case Study in an NFV-based EPC</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>The scaling is a fundamental task that allows addressing performance variations in Network Functions Virtualization (NFV). In the literature, several approaches propose scaling mechanisms that differ in the utilized technique (e.g., reactive, predictive and machine learning-based). The scaling in NFV must be accurate both at the time and the number of instances to be scaled, aiming at avoiding unnecessary procedures of provisioning and releasing of resources; however, achieving a high accuracy is a non-trivial task. In this paper, we propose for NFV an adaptive scaling mechanism based on Q-Learning and Gaussian Processes that are utilized by an agent to carry out an improvement strategy of a scaling policy, and therefore, to make better decisions for managing performance variations. We evaluate our mechanism by simulations, in a case study in a virtualized Evolved Packet Core, corroborating that it is more accurate than approaches based on static threshold rules and Q-Learning without a policy improvement strategy.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Carlos </givenname>
              <mi>Hernán</mi>
              <surname>Tobar Arteaga</surname>
            </name>
            <id>1507099</id>
            <affiliation>University of Cauca</affiliation>
            <country>Colombia</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Fulvio </givenname>
              <mi/>
              <surname>Risso</surname>
            </name>
            <id>3211</id>
            <affiliation>Politecnico di Torino</affiliation>
            <country>Italy</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Oscar Mauricio </givenname>
              <mi/>
              <surname>Caicedo Rendon</surname>
            </name>
            <id>655707</id>
            <affiliation>University of Cauca</affiliation>
            <country>Colombia</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>14:18</starttime>
        <endtime>14:36</endtime>
        <paperid>1570375262</paperid>
        <sessionid>MC2.2</sessionid>
        <papertitle>Delay-aware VNF Placement and Chaining based on a Flexible Resource Allocation Approach</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Network Function Virtualization (NFV) is a promising technology that is receiving significant attention in both academic and the industry. NFV paradigm proposes to decouple Network Functions (NFs) from dedicated hardware equipment, offering a better sharing of physical resources and providing more flexibility to network operators. However, in such environment, efficient management mechanisms are crucial to address the problem of Placement and Chaining of Virtual Network Functions (PC-VNF). In this paper, we introduce a PC-VNF model based on a flexible resource allocation approach that takes into account service requirements. Thus, beyond connectivity and resource utilization, specific requirements in terms of latency, throughput, and errors must be respected when deploying network services such as 5G services (broadband communication, mission critical communications, massive IoT, etc.). The end-to-end performance needs to meet the user expectations as well as service requirements to provide the desired QoS/QoE. Our main goal is to determine the optimal VNF placement minimizing resource consumption while providing specific latency (i.e., end-to-end delay) and avoiding violation of Service Level Agreements (SLA) by constraining allocated resources to a given VNF to reach its required performance. Results show that our approach achieves the required latency with better resources utilization compared to the classical approaches, with a reduction of up to 40% of resources consumption and a higher rate of accepted requests by recovering 15 to 60 % of the rejected requests.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Abdelhamid </givenname>
              <mi/>
              <surname>Alleg</surname>
            </name>
            <id>1454447</id>
            <affiliation>CNRS-LaBRI UMR 5800, University Bordeaux, Bordeaux-INP</affiliation>
            <country>France</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Toufik </givenname>
              <mi/>
              <surname>Ahmed</surname>
            </name>
            <id>12447</id>
            <affiliation>CNRS-LaBRI UMR 5800, University Bordeaux, Bordeaux-INP</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Mohamed </givenname>
              <mi/>
              <surname>Mosbah</surname>
            </name>
            <id>1529319</id>
            <affiliation>LaBRI/ Bordeaux University &amp; LaBRI</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Roberto </givenname>
              <mi/>
              <surname>Riggio</surname>
            </name>
            <id>146926</id>
            <affiliation>FBK CREATE-NET</affiliation>
            <country>Italy</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Raouf </givenname>
              <mi/>
              <surname>Boutaba</surname>
            </name>
            <id>5035</id>
            <affiliation>University of Waterloo</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>14:36</starttime>
        <endtime>14:54</endtime>
        <paperid>1570378939</paperid>
        <sessionid>MC2.3</sessionid>
        <papertitle>MD-IDN: Multi-Domain Intent-Driven Networking in Software-Defined Infrastructures</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Intent-Driven Networking is recently gaining interest, with all major SDN control platforms now providing an intent Northbound Interface (NBI) as a high-level abstraction for network management. With these frameworks network operators can conveniently define ``what needs to be done'', rather than ``how it should be done''. Current IDN frameworks pose two main limitations that affect deployment in production grade and multi-domain networks. They are mainly concerned with a single network domain, and thus enabling end-to-end network intents over a multi-domain and large-scale setup is still a challenge. Furthermore, these frameworks do not consider any differentiation between user intents and provider intents, and a limited set of intent classes are available for both. In this paper we present MD-IDN, which provides an intent framework for the users of multi-domain cloud infrastructures. We first propose a graph-based abstraction model for user-defined intents and a generic intent compilation process. Then, we propose compilation algorithms to achieve scalability in multi-domain networks: First, user-defined intents get processed over an abstracted multi-graph of network domains and their interconnections, and a set of local intents will be generated for each of the involved domains. Afterwards, the local intents will be compiled and installed in local regions in parallel. MD-IDN is deployed as a public service in the SAVI Testbed over more than ten data centers spanning across Canada. In multi-domain environments, our experiments show that MD-IDN outperforms current practices that compile intents over a flat network topology.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Saeed </givenname>
              <mi/>
              <surname>Arezoumand</surname>
            </name>
            <id>1485254</id>
            <affiliation>University of Toronto</affiliation>
            <country>Canada</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Kristina </givenname>
              <mi/>
              <surname>Dzeparoska</surname>
            </name>
            <id>1511216</id>
            <affiliation>University of Toronto</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Hadi </givenname>
              <mi/>
              <surname>Bannazadeh</surname>
            </name>
            <id>869349</id>
            <affiliation>University of Toronto</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Alberto </givenname>
              <mi/>
              <surname>Leon-Garcia</surname>
            </name>
            <id>393083</id>
            <affiliation>University of Toronto</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>14:54</starttime>
        <endtime>15:12</endtime>
        <paperid>1570381680</paperid>
        <sessionid>MC2.4</sessionid>
        <papertitle>Efficient Big Link Allocation Scheme in Virtualized Software-defined Networking</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>We propose an efficient resource allocation scheme for big links in virtualized software-defined networking. Network virtualization based on software-defined networking provides big link concept to facilitate simple network management - big link maps a set of switches and links into a single virtual link. However, this paper reports an issue of the big link in that there is severe performance degradation in virtualized SDN environments. We find the cause: the existing network hypervisors do not consider the network traffic when allocating physical resources to a big link. To address this issue, we design big link allocation scheme (BAS) that considers network traffic when allocating and reallocating resources to a big link. A prototype implementation is done with OpenVirteX, and experiments demonstrate that big link with BAS achieves four times greater throughput than that of the big link without BAS. Moreover, by including a timer in OpenVirteX, the BAS decreases unnecessary resource reallocations, which reduces overhead.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Wontae </givenname>
              <mi/>
              <surname>Jeong</surname>
            </name>
            <id>1513835</id>
            <affiliation>Korea University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Gyeongsik </givenname>
              <mi/>
              <surname>Yang</surname>
            </name>
            <id>1508888</id>
            <affiliation>Korea University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Seong-Mun </givenname>
              <mi/>
              <surname>Kim</surname>
            </name>
            <id>793849</id>
            <affiliation>Korea University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Chuck </givenname>
              <mi/>
              <surname>Yoo</surname>
            </name>
            <id>1151361</id>
            <affiliation>Korea University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:12</starttime>
        <endtime>15:30</endtime>
        <paperid>1570382322</paperid>
        <sessionid>MC2.5</sessionid>
        <papertitle>BFD-based Link Latency Measurement in Software Defined Networking</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>5G networks offer various network services based on software-defined networking and network function virtualization. However, certain services are sensitive to link latency which is why it is consistently observed to provide high-quality services. Previous studies have proposed two approaches to this task: measuring latency using probe packets and link-layer discovery protocol (LLDP) packets. However, these are subject to several limitations such as flow rule pre-configuration, influence of control plane traffic, and need for calibration. In this study, a bidirectional forwarding detection-based (BFD) approach is proposed. This measures latency at the data plane with a simply implemented echo mode in Open vSwitch. We evaluate and compare the proposed approach to that of the LLDP-based method in terms of single link latency, path latency, and error rate. In addition, we verify that the control plane throughput affects link latency according to the increased number of switches. As a result, the proposed approach is able to resolve these limitations and provide accurate link latency measurement.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Seong-Mun </givenname>
              <mi/>
              <surname>Kim</surname>
            </name>
            <id>793849</id>
            <affiliation>Korea University</affiliation>
            <country>Korea</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Gyeongsik </givenname>
              <mi/>
              <surname>Yang</surname>
            </name>
            <id>1508888</id>
            <affiliation>Korea University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Chuck </givenname>
              <mi/>
              <surname>Yoo</surname>
            </name>
            <id>1151361</id>
            <affiliation>Korea University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Sung-Gi </givenname>
              <mi/>
              <surname>Min</surname>
            </name>
            <id>161085</id>
            <affiliation>Korea University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>MC3</code>
    <sessiontitle>Mini-Conference Session 3</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>16:00-17:30</range>
    <starttime>2017-11-27T16:00:00+09:00</starttime>
    <endtime>2017-11-27T17:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Yehia Elkhatib (Lancaster University, United Kingdom (Great Britain))</chair>
    <papers>
      <paper>
        <starttime>16:00</starttime>
        <endtime>16:18</endtime>
        <paperid>1570373793</paperid>
        <sessionid>MC3.1</sessionid>
        <papertitle>Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks?</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Multipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed so that multiple paths could be taken by a same connection on the way towards an Internet destination. Recently, the Multipath Transmission Control Protocol (MPTCP) extension has been standardized and is undergoing rapid adoption in many different use-cases, from mobile to fixed access networks, from data-centers to core networks. Among its major benefits - i.e., reliability thanks to backup path rerouting; and throughput increase thanks to link aggregation and confidentiality being more difficult to intercept a full connection - the latter has attracted lower attention. How effective would be to use MPTCP to exploit multiple Internet-scale paths and decrease the probability of Man-in-the-Middle (MITM) attacks is a question which we try to answer. By analyzing the Autonomous System (AS) level graph, we identify which countries and regions show a higher level of robustness against MITM AS-level attacks, for example due to core cable tapping or route hijacking practices.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Duy </givenname>
              <mi/>
              <surname>Nguyen</surname>
            </name>
            <id>1211913</id>
            <affiliation>UPMC</affiliation>
            <country>France</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Dung Chi </givenname>
              <mi/>
              <surname>Phung</surname>
            </name>
            <id>1403357</id>
            <affiliation>LIP6</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Stefano </givenname>
              <mi/>
              <surname>Secci</surname>
            </name>
            <id>154796</id>
            <affiliation>University Pierre et Marie Curie - Paris 6</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Benevid </givenname>
              <mi/>
              <surname>Felix</surname>
            </name>
            <id>1337637</id>
            <affiliation>UFPR</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Michele </givenname>
              <mi/>
              <surname>Nogueira</surname>
            </name>
            <id>185036</id>
            <affiliation>Federal University of Parana (UFPR)</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>16:18</starttime>
        <endtime>16:36</endtime>
        <paperid>1570378921</paperid>
        <sessionid>MC3.2</sessionid>
        <papertitle>A lightweight snapshot-based DDoS detector</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Despite the efforts made from both the research community and the industry in inventing new methods to deal with distributed denial of service attacks, they stay a major threat in the Internet network. Those attacks are numerous, and can prevent, in most serious cases, the targeted system from answering any request from its clients.&#13;
&#13;
Detecting such attacks means dealing with several difficulties, such as their distributed nature or the several evasions techniques available to the attackers. The detection process has also a cost, which includes both the resources needed to perform the detection and the work of the network administrator.&#13;
&#13;
In this paper we introduce AATAC, an unsupervised DDoS detector that focuses on reducing the computational resources needed to process the traffic. It models the traffic using a set of regularly created snapshots. Each new snapshot is compared to this model using a k-NN based measure to detect significant deviations toward the usual traffic profile. Those snapshots are also used to provide the network administrator with an explicit and dynamic view of the traffic when an anomaly occurs.&#13;
&#13;
Our evaluation shows that AATAC is able to efficiently process real traces with low computational resources requirements, while achieving an efficient detection producing a low number of false- positive.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Gilles </givenname>
              <mi/>
              <surname>Roudière</surname>
            </name>
            <id>1155545</id>
            <affiliation>LAAS-CNRS</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Philippe </givenname>
              <mi/>
              <surname>Owezarski</surname>
            </name>
            <id>1601</id>
            <affiliation>LAAS-CNRS</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>16:36</starttime>
        <endtime>16:54</endtime>
        <paperid>1570382393</paperid>
        <sessionid>MC3.3</sessionid>
        <papertitle>Assessing the Value of Containers for NFVs: A Detailed Network Performance Study</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Since its introduction in 2012, telecommunications operators have been applying the Network Function Virtualization principle to their core infrastructure, leading to more agile and cost-efficient deployments. While these Virtualized Network Functions (VNFs) are traditionally implemented using Virtual Machines (VMs), efforts are starting to shift to containerized VNF implementations, further improving agility and cost-efficiency. Furthermore, telecom applications often require extreme networking performance in terms of throughput and latency. While research has shown that containers outperform VMs on this front, it is currently unclear how the choice of container provider influences network performance. In this paper we compare the networking performance of Linux container implementations Docker, rkt and LXC. Throughput and latency are evaluated for single-host host, bridge (or NAT) and macvlan network configurations. This is, to the best of our knowledge, the first comparison featuring all three major Linux container implementations. We show that LXC performs best, with Docker and rkt showing throughputs of respectively up to 35% and 58% lower. Of the considered networking implementations, the macvlan network performs best. While it experiences a significant performance degradation when many containers are chained together, a single container using macvlan can outperform even a bare metal implementation when enough CPU resources are available.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Jakob </givenname>
              <mi/>
              <surname>Struye</surname>
            </name>
            <id>1514231</id>
            <affiliation>University of Antwerp</affiliation>
            <country>Belgium</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Bart </givenname>
              <mi/>
              <surname>Spinnewyn</surname>
            </name>
            <id>1293425</id>
            <affiliation>University of Antwerp &amp; iMinds</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kathleen </givenname>
              <mi/>
              <surname>Spaey</surname>
            </name>
            <id>1085569</id>
            <affiliation>iMinds / University of Antwerp</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kristiaan </givenname>
              <mi/>
              <surname>Bonjean</surname>
            </name>
            <id>1514720</id>
            <affiliation>Newtec</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Steven </givenname>
              <mi/>
              <surname>Latré</surname>
            </name>
            <id>1059359</id>
            <affiliation>University of Antwerp - imec</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>16:54</starttime>
        <endtime>17:12</endtime>
        <paperid>1570382779</paperid>
        <sessionid>MC3.4</sessionid>
        <papertitle>Modeling and Analyzing Power System Failures on Cloud Services</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Many enterprises rely on cloud infrastructure to host their critical applications (such as trading, banking transaction, airline reservation system, and credit card authorization). The unavailability of these applications may lead to severe consequences that go beyond the financial losses, reaching the cloud provider reputation too. However, to maintain high availability in a cloud data center is a difficult task due to its complexity. The power subsystem is crucial for the entire operation of the data center because it supplies power for all other subsystems, including IT components and cooling equipment. Some studies have already proposed models to evaluate the availability of the power subsystem, but none of them are based on standard redundancy models. Standards guide cloud providers regarding availability, points of failure, and watts per square foot based on components' redundancy. This paper proposes RBD and Petri Net models based on the TIA-942 standard to estimate the availability of the data center power subsystem and analyze how failures on power subsystem impact the availability of critical applications. These models are important to resource planning and decision making by the cloud providers, because they may identify which components they ought to invest in order to improve the availability level.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Daniel </givenname>
              <mi/>
              <surname>Rosendo</surname>
            </name>
            <id>1463169</id>
            <affiliation>Federal University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Patricia </givenname>
              <mi>Takako</mi>
              <surname>Endo</surname>
            </name>
            <id>658125</id>
            <affiliation>University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Guto </givenname>
              <mi/>
              <surname>Leoni</surname>
            </name>
            <id>1470597</id>
            <affiliation>Federal University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Demis </givenname>
              <mi/>
              <surname>Gomes</surname>
            </name>
            <id>1470594</id>
            <affiliation>Federal University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Glauco </givenname>
              <mi>Estácio</mi>
              <surname>Gonçalves</surname>
            </name>
            <id>204160</id>
            <affiliation>Federal Rural University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>André </givenname>
              <mi>L. C.</mi>
              <surname>Moreira</surname>
            </name>
            <id>243281</id>
            <affiliation>Federal University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Judith </givenname>
              <mi/>
              <surname>Kelner</surname>
            </name>
            <id>85367</id>
            <affiliation>Federal University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Djamel </givenname>
              <mi>Hadj</mi>
              <surname>Sadok</surname>
            </name>
            <id>85365</id>
            <affiliation>Federal University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Mozhgan </givenname>
              <mi/>
              <surname>Mahloo</surname>
            </name>
            <id>1470596</id>
            <affiliation>Ericsson Research</affiliation>
            <country>Sweden</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>17:12</starttime>
        <endtime>17:30</endtime>
        <paperid>1570382822</paperid>
        <sessionid>MC3.5</sessionid>
        <papertitle>Tracking the Bad Guys: An Efficient Forensic Methodology To Trace Multi-step Attacks Using Core Attack Graphs</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>In this paper, we describe an efficient methodology to guide investigators during network forensic analysis. To this end, we introduce the concept of core attack graph, a compact representation of the main routes an attacker can take towards specific network targets. Such compactness allows forensic investigators to focus their efforts on critical nodes that are more likely to be part of attack paths, thus reducing the overall number of nodes (devices, network privileges) that need to be examined. Nevertheless, core graphs also allow investigators to hierarchically explore the graph in order to retrieve different levels of summarised information. We have evaluated our approach over different network topologies varying parameters such as network size, density, and forensic evaluation threshold. Our results demonstrate that we can achieve the same level of accuracy provided by standard logical attack graphs while significantly reducing the exploration rate of the network.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Martín </givenname>
              <mi/>
              <surname>Barrère</surname>
            </name>
            <id>690221</id>
            <affiliation>Imperial College London</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Rodrigo </givenname>
              <mi/>
              <surname>Vieira Steiner</surname>
            </name>
            <id>511869</id>
            <affiliation>Imperial College London</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Rabih </givenname>
              <mi/>
              <surname>Mohsen</surname>
            </name>
            <id>1514785</id>
            <affiliation>Imperial College London</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Emil </givenname>
              <mi/>
              <surname>Lupu</surname>
            </name>
            <id>130674</id>
            <affiliation>Imperial College</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>Opeing</code>
    <sessiontitle>Opening Ceremony</sessiontitle>
    <sessiondetails/>
    <range>09:25-09:30</range>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <date>28 November 2017</date>
    <range>09:30-10:30</range>
    <starttime>2017-11-28T09:30:00+09:00</starttime>
    <endtime>2017-11-28T10:30:00+09:00</endtime>
    <chairs/>
    <papers/>
  </session>
  <session>
    <code>K1</code>
    <sessiontitle>Keynote Session 1</sessiontitle>
    <sessionsubtitle>Data-driven Network Engineering and Management</sessionsubtitle>
    <sessionspeaker>Prof. Rolf Stadler, KTH Royal Institute of Technology, Sweden</sessionspeaker>
    <sessionspeakerurl>https://www.cnsm-conf.org/2017/keynotes.html</sessionspeakerurl>
    <sessiondetails>Rolf Stadler is a professor with the Department of Network and Systems Engineering at KTH Royal Institute of Technology in Stockholm, Sweden. He holds an M.Sc. degree in mathematics and a Ph.D. in computer science from the University of Zurich. Before joining KTH in 2001, he held positions at the IBM Zurich Research Laboratory, Columbia University, and ETH Zürich. His group has made contributions to real-time monitoring, resource management, and self-management for large-scale networks and clouds. His current interests include advanced monitoring techniques, as well as data-driven methods for network engineering and management. Rolf Stadler is currently Editor-in-Chief of IEEE Transactions on Network and Service Management (TNSM).</sessiondetails>
        <range>09:30-10:30</range>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Yoshiaki Kiriha (The University of Tokyo, Japan)</chair>
    <papers/>
  </session>
  <session>
    <code>PS1</code>
    <sessiontitle>Poster Session 1 and Coffee Break</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>10:30-11:30</range>
    <starttime>2017-11-28T10:30:00+09:00</starttime>
    <endtime>2017-11-28T11:30:00+09:00</endtime>
    <room>Lobby, B1F, Bldg.27</room>
    <chairs/>
    <papers>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570368170</paperid>
        <sessionid>PS1.1</sessionid>
        <papertitle>Enforcing free roaming among EU countries: an economic analysis</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Short Papers</trackname>
        <abstract>In October 2015, the European parliament has decided to forbid roaming charges among EU mobile phone users, starting June 2017, as a first step toward the unification of the European digital market. In this paper, we aim at investigating the consequences of such a measure from an economic perspective. In particular, we analyze the effect of the willingness-to-pay heterogeneity among users (also due to wealth heterogeneity), and the fact that the roaming behavior is positively correlated with wealth. Considering a monopolistic operator, we compare the paid-roaming situation (with usage-based pricing) to the envisioned free-roaming from the point of view of the operator and of users. Our analysis suggests that imposing free roaming degrades the revenues of the operator but can also deter some users from subscribing. This is because paid roaming allows some partial market segmentation; hence we conclude that such (apparently beneficial) regulatory decisions must be taken with care.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Patrick </givenname>
              <mi/>
              <surname>Maillé</surname>
            </name>
            <id>94224</id>
            <affiliation>IMT Atlantique</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Bruno </givenname>
              <mi/>
              <surname>Tuffin</surname>
            </name>
            <id>9844</id>
            <affiliation>Inria Rennes - Bretagne Atlantique</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570374552</paperid>
        <sessionid>PS1.2</sessionid>
        <papertitle>Resource-Aware Placement of Softwarised Security Services in Cloud Data Centers</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Virtualizing middleboxes as software for Cloud tenants can eliminate the monolithic processing and static deployment of legacy middleboxes and provide an efficient provisioning for security services. However, inefficient managing of the virtualized security services can reduce the gains of Cloud deployment. We propose a resources-efficient placement of the security functions in the infrastructure of a three-tier Cloud DC by modifying the Best-Fit Decreasing algorithm to solve the problem while satisfying the placement resources and traffic constraints.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Abeer </givenname>
              <mi/>
              <surname>Ali</surname>
            </name>
            <id>1369302</id>
            <affiliation>University of Glasgow</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Christos </givenname>
              <mi/>
              <surname>Anagnostopoulos</surname>
            </name>
            <id>135768</id>
            <affiliation>University of Glasgow</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Dimitrios </givenname>
              <mi>P</mi>
              <surname>Pezaros</surname>
            </name>
            <id>13367</id>
            <affiliation>University of Glasgow</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570375153</paperid>
        <sessionid>PS1.3</sessionid>
        <papertitle>A Path Planning Method of Wireless Sensor Networks Based on Service Priority</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Life-time represents the effective survival time of network, which is significant when measuring the performance of wireless sensor networks (WSNs). Therefore, it is so important to extend network life-time by planning appropriate path based on energy consumption and remaining energy of wireless sensors. In this paper, a path planning method of WSNs based on service priority is proposed, and an improved Dijkstra algorithm is used to solve this problem. This method minimizes the total energy consumption of network while balancing remaining energy of all nodes in network, and through the sacrifice of network delay in exchange for extension of life-time. The simulation results show that our method not only prolongs network life-time compared to shortest-path algorithm but also improves network reliability.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Peng </givenname>
              <mi/>
              <surname>Li</surname>
            </name>
            <id>1507104</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Siya </givenname>
              <mi/>
              <surname>Xu</surname>
            </name>
            <id>1507126</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kang </givenname>
              <mi/>
              <surname>Sun</surname>
            </name>
            <id>1510916</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Qiu </givenname>
              <mi/>
              <surname>Xue-song</surname>
            </name>
            <id>119912</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Feng </givenname>
              <mi/>
              <surname>Qi</surname>
            </name>
            <id>244407</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570375230</paperid>
        <sessionid>PS1.4</sessionid>
        <papertitle>An Autonomic and Policy-based Authorization Framework for OpenFlow Networks</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>The Network Access Control (NAC) management is a critical task, especially in current networks that are composed of many heterogeneous things (Internet of Things) connected to share data, resources and Internet access. The Software-Defined Networking (SDN) simplifies the network design and operation, and offers new opportunities (programmability, flexibility, dynamicity, and standardization) to manage the network. Despite this, the access control management remains a challenge, once managing security policies involves dealing with a large set of access control rules, detecting conflicting policies, defining priorities, delegating rights, and reacting against network state changes and events. This work presents the HACFlow, a novel, autonomic, and policy-based framework for access control management in OpenFlow networks. HACFlow aims to simplify and automate the network management allowing network operators to govern rights of network entities by defining dynamic, fine-grained, and high-level access control policies. We analyzed the performance of HACFlow and compared it against related approaches.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Daniel </givenname>
              <mi/>
              <surname>Rosendo</surname>
            </name>
            <id>1463169</id>
            <affiliation>Federal University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Patricia </givenname>
              <mi>Takako</mi>
              <surname>Endo</surname>
            </name>
            <id>658125</id>
            <affiliation>University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Djamel </givenname>
              <mi>Hadj</mi>
              <surname>Sadok</surname>
            </name>
            <id>85365</id>
            <affiliation>Federal University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Judith </givenname>
              <mi/>
              <surname>Kelner</surname>
            </name>
            <id>85367</id>
            <affiliation>Federal University of Pernambuco</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>TS1</code>
    <sessiontitle>Technical Session 1</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>11:00-12:30</range>
    <starttime>2017-11-28T11:00:00+09:00</starttime>
    <endtime>2017-11-28T12:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Joan Serrat (Universitat Politécnica de Catalunya, Spain)</chair>
    <papers>
      <paper>
        <starttime>11:00</starttime>
        <endtime>11:30</endtime>
        <paperid>1570374275</paperid>
        <sessionid>TS1.1</sessionid>
        <papertitle>Data Driven Selection of DRX for Energy Efficient 5G RAN</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>The number of connected mobile devices is increasing rapidly with&#13;
 more than 10 billion expected by 2022. Their&#13;
 total aggregate energy consumption poses a significant concern to&#13;
 society. The current 3gpp (3rd Generation Partnership&#13;
 Project) LTE/LTE-Advanced standard incorporates an energy saving&#13;
 technique called discontinuous reception (DRX). It is expected that&#13;
 5G will use an evolved variant of this scheme. In general, the&#13;
 single selection of DRX parameters per device is non trivial. This&#13;
 paper describes how to improve energy efficiency of mobile devices&#13;
 by selecting DRX based on the traffic profile per device. Our&#13;
 particular approach uses a two phase data-driven strategy which&#13;
 tunes the selection of DRX parameters based on a smart fast energy&#13;
 model. The first phase involves the off-line selection of viable&#13;
 DRX combinations for a particular traffic mix. The second phase&#13;
 involves an on-line selection of DRX from this viable list. The&#13;
 method attempts to guarantee that latency is not worse than a chosen&#13;
 threshold. Alternatively, longer battery life for a device can be&#13;
 traded against increased latency. We built a live prototype of the&#13;
 system in our lab in order to verify that the technique works and&#13;
 scales on a real LTE system. We also designed a sophisticated&#13;
 traffic generator based on actual user data traces. Complementary method&#13;
 verification has been made by exhaustive off-line simulations on&#13;
 recorded LTE network data. Finally we managed to show significant device &#13;
 energy saving using our approach, which has the aggregated potential over billions of devices, to make a real contribution to green, energy efficient networks.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Diarmuid </givenname>
              <mi/>
              <surname>Corcoran</surname>
            </name>
            <id>1503314</id>
            <affiliation>KTH Royal Institute of Technology</affiliation>
            <country>Sweden</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Loghman </givenname>
              <mi/>
              <surname>Andimeh</surname>
            </name>
            <id>1506926</id>
            <affiliation>Ericsson AB</affiliation>
            <country>Sweden</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Andreas </givenname>
              <mi/>
              <surname>Ermedahl</surname>
            </name>
            <id>1506924</id>
            <affiliation>Ericsson AB</affiliation>
            <country>Sweden</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Per </givenname>
              <mi/>
              <surname>Kreuger</surname>
            </name>
            <id>275656</id>
            <affiliation>Swedish Institute of Computer Science (SICS)</affiliation>
            <country>Sweden</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Christian </givenname>
              <mi/>
              <surname>Schulte</surname>
            </name>
            <id>547433</id>
            <affiliation>KTH Royal Institute of Technology</affiliation>
            <country>Sweden</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>11:30</starttime>
        <endtime>12:00</endtime>
        <paperid>1570375242</paperid>
        <sessionid>TS1.2</sessionid>
        <papertitle>Flexible Functional Split in 5G Networks</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>5G networks are expected to support various applications with diverse requirements in terms of latency, data rates and traffic volume. Cloud-RAN and densely deployed small cells are two of the tools at disposal of Mobile Network Operators to cope with such requirements. In order to mitigate the fronthaul requirements imposed by the Cloud-RAN architecture, several other functional splits, each characterized by a different demarcation point between the centralized and the distributed units, have emerged. However, the appropriate centralization level (i.e., the functional split) selection for the RAN still remains a challenging task, since a number of parameters have to be considered in order to make such a decision. In this paper, a dynamic virtual network embedding (VNE) algorithm is proposed with an approach to flexibly select the appropriate functional splits at RANs of SCs. Given the fronthaul network characteristics, the inter-cell interference is considered as the key performance indicator to BSs for selecting a functional split. The VNE is formulated as an ILP problem whose objective is to minimize the inter-cell interference and fronthaul bandwidth, therefore, energy consumption by dynamically selecting an appropriate functional split for each SC. Finally, a heuristic algorithm is proposed in order to tackle the scalability problem of the ILP algorithm, and the algorithms are compared using a numerical simulator</abstract>
        <authors>
          <author>
            <name>
              <givenname>Davit </givenname>
              <mi/>
              <surname>Harutyunyan</surname>
            </name>
            <id>1413171</id>
            <affiliation>FBK CREATE-NET</affiliation>
            <country>Italy</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Roberto </givenname>
              <mi/>
              <surname>Riggio</surname>
            </name>
            <id>146926</id>
            <affiliation>FBK CREATE-NET</affiliation>
            <country>Italy</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>12:00</starttime>
        <endtime>12:30</endtime>
        <paperid>1570378555</paperid>
        <sessionid>TS1.3</sessionid>
        <papertitle>ORCHESTRA: Virtualized and Programmable Orchestration of Heterogeneous WLANs</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>LANs are employed by a plethora of heterogeneous consumer devices, equipped with the ability to connect to the Internet using a variety of different wireless network technologies. &#13;
Existing solutions and the lower layers of the OSI stack are unfit to cope with this heterogeneity. &#13;
For instance, dynamical inter-technology switching is user- of application-based&#13;
We propose the ORCHESTRA framework to manage the different devices in heterogeneous WLANs and introduce capabilities such as packet-level dynamic and intelligent handovers (both inter- and intra-technology), load balancing, replication, and scheduling. &#13;
The framework consists of a controller that is capable of communicating with both existing SDN and NFV controllers and with devices containing a newly introduced virtual MAC layer.&#13;
We show that the virtual MAC enables transparent and real-time inter-technology handovers and that our solution scales up to two thousands of clients.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Ensar </givenname>
              <mi/>
              <surname>Zeljkovic</surname>
            </name>
            <id>1477722</id>
            <affiliation>University of Antwerp - imec &amp; IDLab</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Tom </givenname>
              <mi/>
              <surname>De Schepper</surname>
            </name>
            <id>1322649</id>
            <affiliation>University of Antwerp - imec</affiliation>
            <country>Belgium</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Patrick </givenname>
              <mi/>
              <surname>Bosch</surname>
            </name>
            <id>1308619</id>
            <affiliation>University of Antwerp - imec</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Ian </givenname>
              <mi/>
              <surname>Vermeulen</surname>
            </name>
            <id>1510680</id>
            <affiliation>University of Antwerp - imec</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Jetmir </givenname>
              <mi/>
              <surname>Haxhibeqiri</surname>
            </name>
            <id>1217833</id>
            <affiliation>Ghent University</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Jeroen </givenname>
              <mi/>
              <surname>Hoebeke</surname>
            </name>
            <id>96034</id>
            <affiliation>Ghent University - imec</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Jeroen </givenname>
              <mi/>
              <surname>Famaey</surname>
            </name>
            <id>508641</id>
            <affiliation>University of Antwerp &amp; Imec</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Steven </givenname>
              <mi/>
              <surname>Latré</surname>
            </name>
            <id>1059359</id>
            <affiliation>University of Antwerp - imec</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>

  <session>
    <code>Lunch</code>
    <sessiontitle>Lunch</sessiontitle>
    <sessiondetails/>
    <range>12:30-14:00</range>
    <room>Restaurant Mori-no-Kaze, 15F, Bldg.26</room>
    <chairs/>
    <papers/>
  </session>

  <session>
    <code>TS2</code>
    <sessiontitle>Technical Session 2</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>14:00-15:30</range>
    <starttime>2017-11-28T14:00:00+09:00</starttime>
    <endtime>2017-11-28T15:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Rolf Stadler (KTH Royal Institute of Technology, Sweden)</chair>
    <papers>
      <paper>
        <starttime>14:00</starttime>
        <endtime>14:30</endtime>
        <paperid>1570374339</paperid>
        <sessionid>TS2.1</sessionid>
        <papertitle>A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>The deployment of encrypted transport protocols imposes new challenges for&#13;
network management. Key in-network functions such as those implemented by&#13;
firewalls and passive measurement devices currently rely on information exposed&#13;
in the transport layer. Encryption, in addition to improving privacy, helps to&#13;
address ossification of network protocols caused by middleboxes that assume&#13;
certain information to be present in the clear. However, ``encrypting it all''&#13;
risks diminishing the utility of these middleboxes for the network management&#13;
tasks for which they were designed. A middlebox cannot use what it cannot see.&#13;
&#13;
We propose an architectural solution to this issue, by introducing a new ``path&#13;
layer'' for transport-independent, in-band signaling between&#13;
endpoints and network elements on the paths, and using this layer to reinforce&#13;
the boundary between the hop-by-hop network layer and the end-to-end transport&#13;
layer. We define a path layer header on top of UDP to provide a common wire&#13;
image for new, encrypted transports. This path layer header provides information&#13;
to a transport-independent state machine that replaces stateful handling&#13;
that today is mainly done based on exposed header flags and fields in TCP; it enables&#13;
explicit measurability of transport layer performance; and offers extensibility&#13;
by sender-to-path and path-to-receiver communications for diagnostics and&#13;
management. This provides not only a replacement for signals that are not&#13;
available with encrypted traffic, but also allows integrity-protected, enhanced&#13;
signaling under endpoint control. We present an implementation&#13;
of this wire image integrated with the QUIC protocol, as well as a basic&#13;
stateful middlebox built on Vector Packet Processing (VPP) provided by FD.io.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Mirja </givenname>
              <mi/>
              <surname>Kuehlewind</surname>
            </name>
            <id>432855</id>
            <affiliation>ETH Zurich</affiliation>
            <country>Switzerland</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Tobias </givenname>
              <mi/>
              <surname>Buehler</surname>
            </name>
            <id>1506268</id>
            <affiliation>ETH Zürich</affiliation>
            <country>Switzerland</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Brian </givenname>
              <mi/>
              <surname>Trammell</surname>
            </name>
            <id>324181</id>
            <affiliation>ETH Zurich</affiliation>
            <country>Switzerland</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Stephan </givenname>
              <mi/>
              <surname>Neuhaus</surname>
            </name>
            <id>1506269</id>
            <affiliation>ZHAW</affiliation>
            <country>Switzerland</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Roman </givenname>
              <mi/>
              <surname>Muentener</surname>
            </name>
            <id>1506270</id>
            <affiliation>ZHAW</affiliation>
            <country>Switzerland</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Gorry </givenname>
              <mi/>
              <surname>Fairhurst</surname>
            </name>
            <id>101005</id>
            <affiliation>University of Aberdeen</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>14:30</starttime>
        <endtime>15:00</endtime>
        <paperid>1570382698</paperid>
        <sessionid>TS2.2</sessionid>
        <papertitle>Real-Time Security Services for SDN-based Datacenters</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>While the scale, frequency and impact of the recent&#13;
cyber- and DoS-attacks have all increased, the traditional security&#13;
management systems are still supervised by human operators in&#13;
the decisional loop. To cope with the new breed of machine-driven&#13;
attacks - particularly the ones designed to overload the humans&#13;
in the loop - the next-generation anomaly detection and attack&#13;
mitigation schema, i.e., the network security management, must&#13;
improve in speed and accuracy by orders of magnitude, hence&#13;
become machine-driven, too. As infrastructure we propose an&#13;
FPGA-accelerated Network Function Virtualization that potentially&#13;
enhances any current multi-Tbps network with SDN-based&#13;
security capabilities of vastly higher performance and scalability.&#13;
As key novelty, we contribute a real-time feedback loop between&#13;
a distributed programmable data plane and a centralized SDN&#13;
controller, coupled via a global N:1 mirror. We validate the&#13;
concept in an actual datacenter network with a new security&#13;
application that can detect and mitigate real-world dDoS attacks,&#13;
with lags from 430 microseconds up to 3 milliseconds - orders&#13;
of magnitude faster than before.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Pál </givenname>
              <mi/>
              <surname>Varga</surname>
            </name>
            <id>283895</id>
            <affiliation>Budapest University of Technology and Economics</affiliation>
            <country>Hungary</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Georgios </givenname>
              <mi/>
              <surname>Kathareios</surname>
            </name>
            <id>1394680</id>
            <affiliation>IBM Research - Zurich</affiliation>
            <country>Switzerland</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Akos </givenname>
              <mi/>
              <surname>Mate</surname>
            </name>
            <id>1478649</id>
            <affiliation>IBM Research - Zurich</affiliation>
            <country>Switzerland</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Rolf </givenname>
              <mi/>
              <surname>Clauberg</surname>
            </name>
            <id>168740</id>
            <affiliation>IBM Research - Zurich</affiliation>
            <country>Switzerland</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Andreea </givenname>
              <mi/>
              <surname>Anghel</surname>
            </name>
            <id>994491</id>
            <affiliation>IBM Research - Zurich</affiliation>
            <country>Switzerland</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Péter </givenname>
              <mi/>
              <surname>Orosz</surname>
            </name>
            <id>1292951</id>
            <affiliation>Budapest University of Technology and Economics</affiliation>
            <country>Hungary</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Balazs </givenname>
              <mi/>
              <surname>Nagy</surname>
            </name>
            <id>1514679</id>
            <affiliation>AITIA International Inc</affiliation>
            <country>Hungary</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Tamás </givenname>
              <mi/>
              <surname>Tóthfalusi</surname>
            </name>
            <id>1292945</id>
            <affiliation>Budapest University of Technology and Economics</affiliation>
            <country>Hungary</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>László </givenname>
              <mi/>
              <surname>Kovács</surname>
            </name>
            <id>1234109</id>
            <affiliation>AITIA International Inc.</affiliation>
            <country>Hungary</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Mitchell </givenname>
              <mi/>
              <surname>Gusat</surname>
            </name>
            <id>9291</id>
            <affiliation>IBM Research - Zurich</affiliation>
            <country>Switzerland</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:00</starttime>
        <endtime>15:30</endtime>
        <paperid>1570382704</paperid>
        <sessionid>TS2.3</sessionid>
        <papertitle>Arena: adaptive real-time update anomaly prediction in cloud systems</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>In current cloud systems, their monitoring relies strongly on rule-based and supervised-learning-based detection methods for anomaly detection. These methods require either some knowledge provided by an expert system or monitoring data to be labeled as a training set. In practice, the system's behavior changes over time. It is difficult to adjust the rules or re-train detection model for these methods. In this paper, we present an Adaptive REal-time update uNsupervised Anomaly prediction system (Arena) for cloud systems. Arena uses a clustering technique based on a density spatial clustering algorithm to identify clusters and outliers. We propose two prediction strategies to improve the ability to predict anomaly and a real-time update strategy by adding new monitoring points into Arena's model. To improve the prediction efficiency and reduce the scale of the model, we adopt a pruning method to remove redundant points. The anomaly data used in the experiments was collected from the Yahoo Lab and the component based system of enterprise T. The experimental results show that our proposed methods can achieve high prediction accuracy compared to existing methods. Real-time update strategy can improve the prediction performance. The pruning method can further reduce the scale of the model and demonstrates the prediction efficiency.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Shaohan </givenname>
              <mi/>
              <surname>Huang</surname>
            </name>
            <id>1228097</id>
            <affiliation>Beihang University</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Carol </givenname>
              <mi>J</mi>
              <surname>Fung</surname>
            </name>
            <id>150276</id>
            <affiliation>Virginia Commonwealth University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Shupeng </givenname>
              <mi/>
              <surname>Zhang</surname>
            </name>
            <id>1470762</id>
            <affiliation>Beihang University</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Guang </givenname>
              <mi/>
              <surname>Wei</surname>
            </name>
            <id>1377726</id>
            <affiliation>Beihang University</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Zhongzhi </givenname>
              <mi/>
              <surname>Luan</surname>
            </name>
            <id>119949</id>
            <affiliation>Beihang University</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Depei </givenname>
              <mi/>
              <surname>Qian</surname>
            </name>
            <id>514789</id>
            <affiliation>Beihang University</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>PS2</code>
    <sessiontitle>Poster Session 2 and Coffee Break</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>15:30-16:00</range>
    <starttime>2017-11-28T15:30:00+09:00</starttime>
    <endtime>2017-11-28T16:00:00+09:00</endtime>
    <room>Lobby, B1F, Bldg.27</room>
    <chairs/>
    <papers>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570374746</paperid>
        <sessionid>PS2.1</sessionid>
        <papertitle>Traffic Optimization in Anonymous Networks</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Short Papers</trackname>
        <abstract>Anonymous communication networks, such as Tor, are facing big challenge how to deliver content to user in low latency and with no interruption. The issues were caused by increased amount of traffic passing by Internet last couple of years. Tor network was originate created mainly to protect users by Traffic Analysis Against. Increasing amount of users and amount of transferred data by Tor network causing latency problems. Also another problem are low-bandwidth nodes in Tor networks which are limiting overall circuit capacity. Conflux, the Tor plugin, is improving effort and decreasing latency time by creating multipaths within Tor circuits. Conflux is splitting traffic dynamically and it load balancing through multipaths to improve throughput and avoid bottlenecks in Tor circuits. Conflux measurement and evaluation proves approximately 30% improvement in expected download time. Based on this fact we can state, it significantly improves the experience of users who watch streaming videos online. This paper is focusing to analyze of network flow and sessions in anonymizing networks, mainly Tor anonymizing network. In part of problem's analyze we're discussing about Conflux tool. The Conflux tool is improving Tor network performance within anonymizing network flows. The problem's analyze discuss about several of methods to measure and verification how effective improve could be in the Tor network. As an output of problem's analyze we're proposing some possibilities to improve Conflux's performance and its deploy to the Tor network. The paper describe solution implementation, setup and configuration Tor client and Tor exit node. We're describing necessary modifications that need to be provided on Tor components.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Patrik </givenname>
              <mi/>
              <surname>Kristel</surname>
            </name>
            <id>1505959</id>
            <affiliation>Slovak University of Technology in Bratislava &amp; Faculty of Informatics and Information Technologies</affiliation>
            <country>Slovakia</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Jan </givenname>
              <mi/>
              <surname>Lucansky</surname>
            </name>
            <id>1505967</id>
            <affiliation>Slovak University of Technology in Bratislava &amp; Faculty of Informatics and Information Technologies</affiliation>
            <country>Slovakia</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Ivan </givenname>
              <mi/>
              <surname>Kotuliak</surname>
            </name>
            <id>270680</id>
            <affiliation>Slovak University of Technology</affiliation>
            <country>Slovakia</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570374867</paperid>
        <sessionid>PS2.2</sessionid>
        <papertitle>Anomaly Detection for OpenStack Services with Process-Related Topological Analysis</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Short Papers</trackname>
        <abstract>OpenStack has become the de-facto standard open source software for managing virtualized infrastructure for NFV, however, operators are facing increased complexity of fault management for OpenStack due to its black-box modular architecture and half-yearly version updates. This hinders operators from promptly identifying the root cause of failure or anomalies in OpenStack services. In this paper, we propose an anomaly detection framework for OpenStack in order to identify the root process of anomalies underlying OpenStack services. The framework utilizes a process relational graph and an anomaly detection technique with a centroid-based clustering algorithm. We demonstrate experiments with regards to two use cases and prove the framework to enable discovery of the root process that is responsible for the anomalous situation.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Tomonobu </givenname>
              <mi/>
              <surname>Niwa</surname>
            </name>
            <id>1506835</id>
            <affiliation>KDDI Research, Inc.</affiliation>
            <country>Japan</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Yuki </givenname>
              <mi/>
              <surname>Kasuya</surname>
            </name>
            <id>1507230</id>
            <affiliation>KDDI Research, Inc.</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Takeshi </givenname>
              <mi/>
              <surname>Kitahara</surname>
            </name>
            <id>141616</id>
            <affiliation>KDDI Research, Inc.</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570375143</paperid>
        <sessionid>PS2.3</sessionid>
        <papertitle>Charting an Intent Driven Network</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>The strong divide between applications and the network control plane is desirable for many reasons; but a downside is that the network is kept in the dark regarding the ultimate purpose(s) of applications and, as a result, is unable to optimise for these. An alternative approach is for applications to declare to the network their abstract intents and assumptions; e.g. &quot;this application requires group multicast&quot;, or &quot;this application will run within a local domain and is latency sensitive&quot;. Such an enriched semantic has the potential to enable the network better to fulfil application intent, while also helping optimise network resource usage across applications. We refer to this approach as intent driven networking (IDN). We sketch an incrementally-deployable design to serve as a stepping stone towards a practical realisation of IDN within today's Internet.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Yehia </givenname>
              <mi/>
              <surname>Elkhatib</surname>
            </name>
            <id>351087</id>
            <affiliation>Lancaster University</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Geoff </givenname>
              <mi/>
              <surname>Coulson</surname>
            </name>
            <id>8440</id>
            <affiliation>Lancaster University</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Gareth </givenname>
              <mi/>
              <surname>Tyson</surname>
            </name>
            <id>830909</id>
            <affiliation>Queen Mary, University of London</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570378721</paperid>
        <sessionid>PS2.4</sessionid>
        <papertitle>Adaptive and Distributed Monitoring Mechanism in Software-Defined Networks</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Network traffic monitoring is an important factor to ensure the controllability and manageability of software-defined network (SDN). The current monitoring mechanism of SDN requires switches to request the controller for instructions to install flow entries for every new incoming flow. For fine-grained monitoring, which requires many flow entries in switches' flow tables, this mechanism creates a non-trivial delay in the forwarding of switches and overhead in the control channel. Our previous work presented SDN-Mon, a monitoring framework that supports fine-grained monitoring for SDN. In this paper, we discuss the aspect of monitoring the flows in a distributed manner. We believe that a distributed monitoring capability enhances the monitoring scalability for SDN. We propose a mechanism that supports SDN to distribute the monitoring load over multiple switches in the network, in which it prevents flows monitoring duplication and balances the monitoring load over switches in the network. With the proposed mechanism, each switch handles much less monitoring load; and the overhead at switches, the control channel, and the controller caused by the monitoring duplication is eliminated. We implement the proposal and integrate it to SDN-Mon to enable a scalable and distributed monitoring capability in SDN. Experimental results show that the proposed mechanism significantly reduces the amount of monitoring load per switch, while the monitoring load is well balanced over switches in the network, with only an acceptable polling and processing overhead.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Xuan Thien </givenname>
              <mi/>
              <surname>Phan</surname>
            </name>
            <id>829675</id>
            <affiliation>The Graduate University for Advanced Studies</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Ignacio </givenname>
              <mi/>
              <surname>Dominguez Martinez-Casanueva</surname>
            </name>
            <id>1485555</id>
            <affiliation>Technical University of Madrid</affiliation>
            <country>Spain</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kensuke </givenname>
              <mi/>
              <surname>Fukuda</surname>
            </name>
            <id>213299</id>
            <affiliation>National Institute of Informatics</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>TS3</code>
    <sessiontitle>Technical Session 3</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>16:00-17:30</range>
    <starttime>2017-11-28T16:00:00+09:00</starttime>
    <endtime>2017-11-28T17:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Roberto Riggio (FBK CREATE-NET, Italy)</chair>
    <papers>
      <paper>
        <starttime>16:00</starttime>
        <endtime>16:30</endtime>
        <paperid>1570374149</paperid>
        <sessionid>TS3.1</sessionid>
        <papertitle>A Software-Defined Firewall Bypass for Congestion Offloading</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>With increasing network bandwidths, stateful firewalls are likely to become communication bottlenecks in networks. To mitigate this problem, we propose to bypass selected traffic around firewalls using software-defined networking (SDN). We discuss various approaches and elaborate the following concept. A controller samples outgoing packets at the firewall using sFlow to detect congestion. In case of congestion, flows already admitted by the firewall are identified and offloaded at an appropriate rate by installing flow-specific bypass rules on an OpenFlow-capable switch. We suggest two different algorithms to select appropriate flows and provide a proof-of-concept implementation in a network testbed using the Ryu controller framework. Experimental results illustrate the system behavior at different load levels with and without offloading. We provide an analytical system model to predict the offloading performance for other system parameters than experimentally evaluated and validate the model with our experimental results. A parameter study suggests that the offloaded traffic rate may be a multiple of the firewall's capacity if the switch supports sufficient flow rules or is able to match for TCP flags.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Florian </givenname>
              <mi/>
              <surname>Heimgaertner</surname>
            </name>
            <id>840687</id>
            <affiliation>University of Tuebingen</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Mark </givenname>
              <mi/>
              <surname>Schmidt</surname>
            </name>
            <id>394439</id>
            <affiliation>University of Tuebingen</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>David </givenname>
              <mi/>
              <surname>Morgenstern</surname>
            </name>
            <id>1485424</id>
            <affiliation>University of Tuebingen</affiliation>
            <country>Germany</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Michael </givenname>
              <mi/>
              <surname>Menth</surname>
            </name>
            <id>5478</id>
            <affiliation>University of Tuebingen</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>16:30</starttime>
        <endtime>17:00</endtime>
        <paperid>1570378588</paperid>
        <sessionid>TS3.2</sessionid>
        <papertitle>An adaptive mechanism for LTE P-GW virtualization using SDN and NFV</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Software Defined Networking (SDN) and Network Function Virtualization (NFV) paradigms have been widely used to redesign the traditional mobile networks. Despite several proposals on the literature, researchers have drawn limited attention to the virtualization of user-plane functions that demand high traffic volume processing, as the case of Long Term Evolution (LTE) mobile gateways. This paper introduces an adaptive mechanism for the user plane virtualization of the LTE Packet Data Network (PDN) GateWay (P-GW), running entirely on top of OpenFlow switches. Using both SDN and NFV concepts, the proposed mechanism employs elastic computing notions to dynamically activate or deactivate the infrastructure switches so the virtualized gateway can adjust to workload changes. This work addresses both software and hardware OpenFlow infrastructure platforms, and simulation results highlight the benefits that can be achieved by the presented mechanism.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Luciano </givenname>
              <mi>Jerez</mi>
              <surname>Chaves</surname>
            </name>
            <id>351649</id>
            <affiliation>University of Campinas</affiliation>
            <country>Brazil</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Islene </givenname>
              <mi>Calciolari</mi>
              <surname>Garcia</surname>
            </name>
            <id>124166</id>
            <affiliation>Universidade Estadual de Campinas</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Edmundo </givenname>
              <mi/>
              <surname>Madeira</surname>
            </name>
            <id>105546</id>
            <affiliation>State University of Campinas</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>17:00</starttime>
        <endtime>17:30</endtime>
        <paperid>1570378701</paperid>
        <sessionid>TS3.3</sessionid>
        <papertitle>An Empirical Study of Software Reliability in SDN Controllers</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Software Defined Networking (SDN) exposes critical networking decisions, such as traffic routing or enforcement of the critical security policies, to a software entity known as the SDN controller. Controller software, as written by humans, is intrinsically prone to bugs, which may impair the network performance as a whole, if activated. Software reliability growth models (SRGM) are often used to estimate and predict the reliability of the software in the operational phase based on the fault report data during the testing phase. These models can be used to predict the number of residual bugs in the software, as well as failure intensity, software reliability and optimal software release time. In this paper we analyze ten releases of ONOS open source controller, whose uncensored fault reports are available online.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Petra </givenname>
              <mi/>
              <surname>Vizarreta</surname>
            </name>
            <id>1345078</id>
            <affiliation>Technical University of Munich</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kishor </givenname>
              <mi>S.</mi>
              <surname>Trivedi</surname>
            </name>
            <id>1141069</id>
            <affiliation>Duke University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Bjarne </givenname>
              <mi>E.</mi>
              <surname>Helvik</surname>
            </name>
            <id>127343</id>
            <affiliation>NTNU - Norwegian University of Science and Technology</affiliation>
            <country>Norway</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Poul </givenname>
              <mi>E.</mi>
              <surname>Heegaard</surname>
            </name>
            <id>6371</id>
            <affiliation>Norwegian University of Science and Technology &amp; NTNU</affiliation>
            <country>Norway</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Wolfgang </givenname>
              <mi/>
              <surname>Kellerer</surname>
            </name>
            <id>95259</id>
            <affiliation>Technische Universität München</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Carmen </givenname>
              <mi/>
              <surname>Mas Machuca</surname>
            </name>
            <id>168744</id>
            <affiliation>Technical University of Munich</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>

  <session>
    <code>WR</code>
    <sessiontitle>Welcome Reception</sessiontitle>
    <sessiondetails/>
    <range>18:00-19:30</range>
    <room>Restaurant Mori-no-Kaze, 15F, Bldg.26</room>
    <chairs/>
    <papers/>
  </session>

  <session>
    <code>KS2</code>
    <sessiontitle>Keynote Session 2</sessiontitle>
    <sessionsubtitle>Network Softwarization for Driving Data Analytics, In-Network Machine Learning and Edge Computing </sessionsubtitle>
    <sessionspeaker>Prof. Akihiro NAKAO, The University of Tokyo</sessionspeaker>
    <sessionspeakerurl>https://www.cnsm-conf.org/2017/keynotes.html</sessionspeakerurl>
    <sessiondetails>Akihiro Nakao received B.S.(1991) in Physics, M.E.(1994) in Information Engineering from the University of Tokyo. He was at IBM Yamato Laboratory, Tokyo Research Laboratory, and IBM Texas Austin from 1994 till 2005. He received M.S.(2001) and Ph.D.(2005) in Computer Science from Princeton University. He has been teaching as an associate professor (2005-2014) and as a professor (2014-present) in Applied Computer Science, at Interfaculty Initiative in Information Studies, Graduate School of Interdisciplinary Information Studies, the University of Tokyo. He has been contributing and leading many projects on Future Internet technologies; PlanetLab, GENI, Vnode, FLARE, and 5G!Pagoda as well as ITU-T FG-IMT2020 Standardization discussion. Moreover, he has been appointed as a chairman of the Network Architecture Committee of 5G Mobile Communication Promotion Forum (5GMF) since Sep., 2014.</sessiondetails>
    <date>29 November 2017</date>
    <range>09:30-10:30</range>
    <starttime>2017-11-29T09:30:00+09:00</starttime>
    <endtime>2017-11-29T10:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Carol Fung (Virginia Commonwealth University, USA)</chair>
    <papers/>
  </session>
  <session>
    <code>PS3</code>
    <sessiontitle>Poster Session 3 and Coffee Break</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>10:30-11:30</range>
    <starttime>2017-11-29T10:30:00+09:00</starttime>
    <endtime>2017-11-29T11:30:00+09:00</endtime>
    <room>Lobby, B1F, Bldg.27</room>
    <chairs/>
    <papers>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570375117</paperid>
        <sessionid>PS3.1</sessionid>
        <papertitle>A Prediction-based Dynamic Resource Management Approach for Network Virtualization</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>In network virtualization environment, multiple virtual networks share the same resource of a physical network. Since the physical resources of a substrate network is limited, it is necessary to improve the utilization of physical resources. Considering the resource requirement of a virtual network may change over its lifetime, we propose a prediction-based resource management mechanism. In order to increase the utilization of the substrate network, we can adjust the resource allocated to the virtual network based on the result of prediction. In our proposed method, the prediction algorithm is based on the double exponential smoothing (DES). Additionally, in order to avoid the result of prediction deviates from the real requirement, we compare our prediction result with the collection of the resource utilization at real time to ensure the correctness of our result. The simulation results show that our approach can increase the utilization of the physical resource and improve the virtual network acceptance ratio while ensuring the requirement of the virtual networks.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Jiacong </givenname>
              <mi/>
              <surname>Li</surname>
            </name>
            <id>1506995</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Ying </givenname>
              <mi/>
              <surname>Wang</surname>
            </name>
            <id>677393</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Zhanwei </givenname>
              <mi/>
              <surname>Wu</surname>
            </name>
            <id>1506913</id>
            <affiliation>Beijing University of Posts and Telecommunications &amp; State Key Laboratory of Networking and Switching Technology</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Sixiang </givenname>
              <mi/>
              <surname>Feng</surname>
            </name>
            <id>1506972</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Qiu </givenname>
              <mi/>
              <surname>Xue-song</surname>
            </name>
            <id>119912</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570375160</paperid>
        <sessionid>PS3.2</sessionid>
        <papertitle>AutoFocus: Automatically Scoping the Impact of Anomalous Service Events</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Tracking down the root cause and impact scope of end-to-end network service anomalies is challenging. We present a generic approach to fully automate this process of localizing the service impact of a network event within a fine-grained multidimensional time series dataset. Our approach begins with a metric definition which models how well an anomaly fits across relevant dimensions. The metric guides AutoFocus, a greedy algorithm we designed to significantly reduce the search space. We evaluate AutoFocus on a real-world multidimensional datasets from a large network operator, using both synthetic event generation as well as case studies. Our evaluation shows that our approach results in accurate trouble isolation, thus helping to automate the process for network operators.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Ren </givenname>
              <mi/>
              <surname>Quinn</surname>
            </name>
            <id>1507141</id>
            <affiliation>University of Utah</affiliation>
            <country>USA</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Zihui </givenname>
              <mi/>
              <surname>Ge</surname>
            </name>
            <id>118181</id>
            <affiliation>AT&amp;T Labs - Research</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>He </givenname>
              <mi/>
              <surname>Yan</surname>
            </name>
            <id>377870</id>
            <affiliation>AT&amp;T Labs - Research</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Jacobus </givenname>
              <mi/>
              <surname>Van der Merwe</surname>
            </name>
            <id>818111</id>
            <affiliation>University of Utah</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570378691</paperid>
        <sessionid>PS3.3</sessionid>
        <papertitle>Distributed-Collaborative Managed Dash Video Services</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>We propose a new distributed-collaborative DASH video service architecture over software defined networks (SDN), where groups of DASH clients sharing a network slice with a reserved throughput collaborate with each other to compute their own fair-share bitrates. The proposed service is managed by the video service provider (VSP) in collaboration with the network service provider (NSP). We observe that quality of service (QoS) reservation alone is not sufficient to supply fair and steady video quality to heterogenous DASH clients sharing a network slice due to the nature of TCP congestion control methods. The proposed distributed-collaborative video streaming service enables each client to share its buffer status with other clients in the same group so that each client can estimate a group-buffer-status aware fair-share bitrate, enforce this rate by TCP receive-window size adaptation over a network slice with a reserved throughput for the group, and perform application-level DASH video rate adaptation that is consistent with this enforced fair bitrate. Experimental results show that the proposed collaborative video service outperforms the traditional competitive DASH clients in terms of (i) overcoming quality fluctuations per client, (ii) providing fairness among multiple DASH clients, and (iii) increasing the total goodput of the reserved slice.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Kemal </givenname>
              <mi/>
              <surname>Sahin</surname>
            </name>
            <id>1352163</id>
            <affiliation>Koc University</affiliation>
            <country>Turkey</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kadir </givenname>
              <mi>Tolga</mi>
              <surname>Bağcı</surname>
            </name>
            <id>584047</id>
            <affiliation>Koc University</affiliation>
            <country>Turkey</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>A. Murat </givenname>
              <mi/>
              <surname>Tekalp</surname>
            </name>
            <id>137925</id>
            <affiliation>Koc University</affiliation>
            <country>Turkey</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570378851</paperid>
        <sessionid>PS3.4</sessionid>
        <papertitle>Network-Integrated Edge Computing Orchestrator for Application Placement</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>In the effort to detach applications from centralized clouds with high latency responses, application providers turn their attention to edge computing solutions that offer low latency and improved user experience. Current application placement solutions use network-related information (e.g., available resources of the nodes, geographical location) as decision basis, but their design, their way of operation, and their placement logic are biased by the assumption that the network cannot be controlled. In this paper, we design an orchestrator that operates within the telecom infrastructure and assumes cooperation with access and core network controllers. As a result, network adjustments can now be requested which leads to an orchestrator that has interfaces to lower network layers, participates in the provisioning of network resources, and solves an optimization problem which, contrary to the state of the art, performs component-by-component placement and does not assume a known or fixed degree of replication of the applications. To solve this new problem, we develop appropriate heuristics, including one based on pre-computed shortest paths, which runs in polynomial time (i.e., much faster than the exponential time of an exhaustive search) and finds the optimal solution in more than 99% of the tested scenarios (i.e., significantly higher than the ca. 95% achieved by adaptations of known heuristics).</abstract>
        <authors>
          <author>
            <name>
              <givenname>Vasileios </givenname>
              <mi/>
              <surname>Karagiannis</surname>
            </name>
            <id>1511102</id>
            <affiliation>NEC Laboratories Europe</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Apostolos </givenname>
              <mi/>
              <surname>Papageorgiou</surname>
            </name>
            <id>544981</id>
            <affiliation>NEC Laboratories Europe</affiliation>
            <country>Germany</country>
            <presenter>1</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570378871</paperid>
        <sessionid>PS3.5</sessionid>
        <papertitle>Large-scale Antennas Analysis of Untrusted Relay System with Cooperative Jamming</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Short Papers</trackname>
        <abstract>In Rayleigh fading channels, a novel full-duplex destination jamming with optimal antenna selection (FDJ-OAS) scheme is proposed to improve the secrecy performance of the untrusted relay system with multiple-antenna destination. The traditional half-duplex destination jamming scheme and the non-jamming scheme both combined with OAS are presented to compare with FDJ-OAS. The approximate closed-form expressions of ergodic achievable secrecy rate and optimal power allocation factor for FDJ-OAS are significantly derived in the large-scale antennas analysis. Furthermore, simulation results show that, the analytical curves match well with the simulation curves, and the FDJ-OAS is superior to the other two schemes.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Xing </givenname>
              <mi/>
              <surname>Tan</surname>
            </name>
            <id>1487264</id>
            <affiliation>Huaqiao University</affiliation>
            <country>P.R. China</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Rui </givenname>
              <mi/>
              <surname>Zhao</surname>
            </name>
            <id>514126</id>
            <affiliation>Huaqiao University</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>YuanJian </givenname>
              <mi/>
              <surname>Li</surname>
            </name>
            <id>1487268</id>
            <affiliation>HuaQiao University</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>TS4</code>
    <sessiontitle>Technical Session 4</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>11:00-12:30</range>
    <starttime>2017-11-29T11:00:00+09:00</starttime>
    <endtime>2017-11-29T12:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Kiyohito Yoshihara (KDDI Research Inc., Japan)</chair>
    <papers>
      <paper>
        <starttime>11:00</starttime>
        <endtime>11:30</endtime>
        <paperid>1570374541</paperid>
        <sessionid>TS4.1</sessionid>
        <papertitle>Resource Provisioning for IoT application services in Smart Cities</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>In the last years, traffic over wireless networks has been increasing exponentially, due to the impact of Internet of Things (IoT) and Smart Cities. Current networks must adapt to and cope with the specific requirements of IoT applications since resources can be requested on-demand simultaneously by multiple devices on different locations. One of these requirements is low latency, since even a small delay for an IoT application such as health monitoring or emergency service can drastically impact their performance. To deal with this limitation, the Fog computing paradigm has been introduced, placing cloud resources on the edges of the network to decrease the latency. However, deciding which edge cloud location and which physical hardware will be used to allocate a specific resource related to an IoT application is not an easy task. Therefore, in this paper, an Integer Linear Programming (ILP) formulation for the IoT application service placement problem is proposed, which considers multiple optimization objectives such as low latency and energy efficiency. Solutions for the resource provisioning of IoT applications within the scope of Antwerp's City of Things testbed have been obtained. The result of this work can serve as a benchmark in future research related to placement issues of IoT application services in Fog Computing environments since the model approach is generic and applies to a wide range of IoT use cases.</abstract>
        <authors>
          <author>
            <name>
              <givenname>José </givenname>
              <mi/>
              <surname>Santos</surname>
            </name>
            <id>1500073</id>
            <affiliation>Ghent University - imec, IDLab</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Tim </givenname>
              <mi/>
              <surname>Wauters</surname>
            </name>
            <id>114405</id>
            <affiliation>Ghent University - iMinds</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Bruno </givenname>
              <mi/>
              <surname>Volckaert</surname>
            </name>
            <id>1503169</id>
            <affiliation>Ghent University-imec &amp; IBBT</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Filip </givenname>
              <mi/>
              <surname>De Turck</surname>
            </name>
            <id>97039</id>
            <affiliation>Ghent University - imec</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>11:30</starttime>
        <endtime>12:00</endtime>
        <paperid>1570378855</paperid>
        <sessionid>TS4.2</sessionid>
        <papertitle>vFetch: Video Prefetching using Pseudo Subscriptions and User Channel Affinity in YouTube</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Video streaming is responsible for the largest portion of traffic in fixed and mobile networks. Yet, forecasts expect this amount to grow further. Especially for mobile devices connected to cellular networks, high QoE video streaming can&#13;
be a challenge as the user data volume is metered and limited and the connection quality may vary severely. A way to mitigate this issue is through prefetching videos that the user is likely to watch in advance on the user's smartphone, e.g., while he is connected to WiFi. However, this approach can only be efficient if only the videos that are interesting for the respective user are prefetched which constitutes a major estimation and prediction challenge. To this end, this paper presents three contributions: First, a user study was conducted to analyze the&#13;
users' video request behavior and to draw valuable insights for prefetching. Second, we propose a novel privacy-preserving prefetching framework denoted vFetch that prefetches videos w.r.t. the user's affinity of YouTube channels. Third, a trace-based evaluation and parameter study is conducted, demonstrating vFetch's efficiency with a hit rate of ∼50% for a 50 GB cache.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Christian </givenname>
              <mi/>
              <surname>Koch</surname>
            </name>
            <id>1018155</id>
            <affiliation>Technische Universität Darmstadt</affiliation>
            <country>Germany</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Benedikt </givenname>
              <mi/>
              <surname>Lins</surname>
            </name>
            <id>1511119</id>
            <affiliation>Technische Universität Darmstadt</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Amr </givenname>
              <mi/>
              <surname>Rizk</surname>
            </name>
            <id>299472</id>
            <affiliation>Technische Universität Darmstadt</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Ralf </givenname>
              <mi/>
              <surname>Steinmetz</surname>
            </name>
            <id>1894</id>
            <affiliation>Technische Universität Darmstadt</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>David </givenname>
              <mi/>
              <surname>Hausheer</surname>
            </name>
            <id>99597</id>
            <affiliation>OVGU Magdeburg</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>12:00</starttime>
        <endtime>12:30</endtime>
        <paperid>1570378940</paperid>
        <sessionid>TS4.3</sessionid>
        <papertitle>Scheduling Service Function Chains for Ultra-Low Latency Network Services</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>The fifth generation (5G) of cellular networks is&#13;
emerging as the key enabler of killer real-time applications, such&#13;
as tactile Internet, augmented and virtual reality, tele-driving,&#13;
autonomous driving, etc., providing them with the much needed&#13;
ultra-reliable and ultra-low latency services. Such applications&#13;
are expected to take full advantages of recent developments in&#13;
the areas of cloud and edge computing, and exploit emerging&#13;
industrial initiatives such as Software Defined Networks (SDN)&#13;
and Network Function Virtualization (NFV). Often, these 5G&#13;
applications require network functions (e.g., IDSs, load balancers,&#13;
etc.) to cater for their end-to-end services. This paper focuses on&#13;
chaining network functions and services for these applications,&#13;
and in particular considers those delay sensitive ones. Here,&#13;
we account for services with deadlines and formulate the joint&#13;
problem of network function mapping, routing and scheduling&#13;
mathematically and highlight its complexity. Then, we present&#13;
an efficient method for solving these sub-problems sequentially&#13;
and validate its performance numerically. We also propose and&#13;
characterize the performance of a Tabu search-based approach&#13;
that we design to solve the problem. Our numerical evaluation&#13;
reveals the efficiency of our sequential method and the scalability&#13;
of our Tabu-based algorithm.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Hyame </givenname>
              <mi/>
              <surname>Alameddine</surname>
            </name>
            <id>1352481</id>
            <affiliation>Concordia University</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Long </givenname>
              <mi/>
              <surname>Qu</surname>
            </name>
            <id>920015</id>
            <affiliation>Ningbo University</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Chadi </givenname>
              <mi/>
              <surname>Assi</surname>
            </name>
            <id>85439</id>
            <affiliation>Concordia University</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>

  <session>
    <code>Lunch</code>
    <sessiontitle>Lunch</sessiontitle>
    <sessiondetails/>
    <range>12:30-14:00</range>
    <room>Restaurant Mori-no-Kaze, 15F, Bldg.26</room>
    <chairs/>
    <papers/>
  </session>

  <session>
    <code>TS5</code>
    <sessiontitle>Technical Session 5</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>14:00-15:30</range>
    <starttime>2017-11-29T14:00:00+09:00</starttime>
    <endtime>2017-11-29T15:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Chadi Assi (Concordia University, Canada)</chair>
    <papers>
      <paper>
        <starttime>14:00</starttime>
        <endtime>14:30</endtime>
        <paperid>1570375233</paperid>
        <sessionid>TS5.1</sessionid>
        <papertitle>Measuring Exposure in DDoS Protection Services</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Denial-of-Service attacks have rapidly gained in popularity over the last decade. The increase in frequency, size, and complexity of attacks has made DDoS Protection Services (DPS) an attractive mitigation solution to which the protection of services can be outsourced. Despite a thriving market and increasing adoption of DPS, protection services can be bypassed, and direct attacks can be launched against the origin of a target. Misconfigurations in the Domain Name System (DNS), one of the mechanisms on which many DPS are built, may actually leak the origin of a target, which defeats the purpose of outsourcing protection. We perform a large-scale analysis of this phenomenon by using three large data sets that cover a 16-month period: a data set of active DNS measurements; a DNS-based data set that focuses on DPS adoption; and a data set of DoS attacks inferred from backscatter traffic to a sizable darknet. We analyze nearly 11k protected Web sites on Alexa's top 1M, for eight leading DPS providers. Our results show that 40% of these Web sites expose the origin in the DNS. Moreover, we show that the origin of 19% of these Web sites is targeted after outsourcing protection.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Mattijs </givenname>
              <mi/>
              <surname>Jonker</surname>
            </name>
            <id>1205157</id>
            <affiliation>University of Twente</affiliation>
            <country>The Netherlands</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Anna </givenname>
              <mi/>
              <surname>Sperotto</surname>
            </name>
            <id>237065</id>
            <affiliation>Twente University</affiliation>
            <country>The Netherlands</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>14:30</starttime>
        <endtime>15:00</endtime>
        <paperid>1570382814</paperid>
        <sessionid>TS5.2</sessionid>
        <papertitle>Android Malicious Application Detection Using Support Vector Machine and Active Learning</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>The increasing popularity of Android phones and its open app market system have caused the proliferation of malicious Android apps. The increasing sophistication and diversity of the malicious Android apps render the conventional malware detection techniques ineffective, which results in a large number of malicious applications remaining undetected. This calls for more effective techniques for detection and classification of Android malware. Hence, in this paper, we present an Android malicious application detection framework based on the Support Vector Machine (SVM) and Active Learning technologies. In our approach, we extract applications' activities while in execution and map them into a feature set, we then attach timestamps to some features in the set. We show that our novel use of time-dependent behavior tracking can significantly improve the malware detection accuracy. In particular, we build an active learning model using Expected error reduction query strategy to integrate new informative instances of Android malware and retrain the model to be able to do adaptive online learning. We evaluate our model through a set of experiments on the DREBIN benchmark malware dataset. Our evaluation results show that the proposed approach can accurately detect malicious applications and improve updatability against new malware.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Bahman </givenname>
              <mi/>
              <surname>Rashidi</surname>
            </name>
            <id>1332073</id>
            <affiliation>Virginia Commonwealth University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Carol </givenname>
              <mi>J</mi>
              <surname>Fung</surname>
            </name>
            <id>150276</id>
            <affiliation>Virginia Commonwealth University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Elisa </givenname>
              <mi/>
              <surname>Bertino</surname>
            </name>
            <id>925357</id>
            <affiliation>Purdue University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:00</starttime>
        <endtime>15:30</endtime>
        <paperid>1570382923</paperid>
        <sessionid>TS5.3</sessionid>
        <papertitle>Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Online social network (OSN) discussion groups are exerting significant effects on political dialogue. In the absence of access control mechanisms, any user can contribute to any OSN thread. Individuals can exploit this characteristic to execute targeted attacks, which increases the potential for subsequent malicious behaviors such as phishing and malware distribution. These kinds of actions will also disrupt bridges among the media, politicians, and their constituencies. &#13;
&#13;
For the concern of Security Management, blending malicious cyber attacks with online social interactions has introduced a brand new challenge. In this paper we describe our proposal for a novel approach to studying and understanding the strategies that attackers use to spread malicious URLs across Facebook discussion groups. We define and analyze problems tied to predicting the potential for attacks focused on threads created by news media organizations. We use a mix of macro static features and the micro dynamic evolution of posts and threads to identify likely targets with greater than 90% accuracy. One of our secondary goals is to make such predictions within a short (10 minute) time frame. It is our hope that the data and analyses presented in this paper will support a better understanding of attacker strategies and footprints, thereby developing new system management methodologies in handing cyber attacks on social networks.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Chun-Ming </givenname>
              <mi/>
              <surname>Lai</surname>
            </name>
            <id>1514781</id>
            <affiliation>University of California, Davis</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Xiaoyun </givenname>
              <mi/>
              <surname>Wang</surname>
            </name>
            <id>1514900</id>
            <affiliation>University of California, Davis</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Yunfeng </givenname>
              <mi/>
              <surname>Hong</surname>
            </name>
            <id>963169</id>
            <affiliation>UC Davis, Davis California</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Yu-Cheng </givenname>
              <mi/>
              <surname>Lin</surname>
            </name>
            <id>1514901</id>
            <affiliation>University of California, Davis</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Shyhtsun Felix </givenname>
              <mi/>
              <surname>Wu</surname>
            </name>
            <id>96781</id>
            <affiliation>University of California, Davis</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Patrick </givenname>
              <mi/>
              <surname>McDaniel</surname>
            </name>
            <id>120041</id>
            <affiliation>Pennsylvania State University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Hasan </givenname>
              <mi/>
              <surname>Cam</surname>
            </name>
            <id>14640</id>
            <affiliation>Army Research Laboratory</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>PS4</code>
    <sessiontitle>Poster Session 4 and Coffee Break</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>15:30-16:00</range>
    <starttime>2017-11-29T15:30:00+09:00</starttime>
    <endtime>2017-11-29T16:00:00+09:00</endtime>
    <room>Lobby, B1F, Bldg.27</room>
    <chairs/>
    <papers>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570375312</paperid>
        <sessionid>PS4.1</sessionid>
        <papertitle>A Model-based Application Autonomic Manager with Fine Granular Bandwidth Control</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Horizontal scaling is one of the common adaptation actions when an application on cloud is overloaded. However, this practice increases the operational cost and instability of applications degrading user experience due to reconfiguration. A faster and less costly approach for the application is to dynamically adjust the soft resources, such as bandwidth.&#13;
&#13;
In this paper, we propose and implement a machine learning based autonomic manager that controls the bandwidth rates allocated to each scenario of a web application on an overlay network to postpone scaling out for as long as possible. Through experiments on Amazon AWS cloud, the autonomic manager is able to quickly meet the Service level Agreement (SLA) and reduce the SLA violations by 56% compared to a previous heuristic-based approach.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Nasim </givenname>
              <mi/>
              <surname>Beigi</surname>
            </name>
            <id>1293261</id>
            <affiliation>York University</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Mark </givenname>
              <mi/>
              <surname>Shtern</surname>
            </name>
            <id>918425</id>
            <affiliation>York University</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Marin </givenname>
              <mi/>
              <surname>Litoiu</surname>
            </name>
            <id>430348</id>
            <affiliation>York University</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570378730</paperid>
        <sessionid>PS4.2</sessionid>
        <papertitle>Risk Prediction of the SCADA Communication Network Based on Entropy-Gray Model</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>The power SCADA system is designed to ensure the safe operation of the power system. The SCADA communication network as an information exchange carrier between remote terminal units and master stations, is the key part of the SCADA system, and it has a high requirement for security. However, due to the wide distribution of the network and the interconnected network structure, it is susceptible to risks. So there is an urgent need for accurate and real-time risk prediction. In this paper, we propose a risk prediction model based on entropy-gray model, where the gray model is used to predict the values of the network risk indexes, and the entropy method is to determine the weight of those risk indexes. Finally, the overall risk value of the network is decided with analytic hierarchy process. Simulation results show that the proposed entropy-gray method can achieve accurate and timely risk prediction.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Meng </givenname>
              <mi/>
              <surname>Li</surname>
            </name>
            <id>1510773</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Li </givenname>
              <mi/>
              <surname>Wenjing</surname>
            </name>
            <id>558889</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Peng </givenname>
              <mi/>
              <surname>Yu</surname>
            </name>
            <id>534337</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Fanqin </givenname>
              <mi/>
              <surname>Zhou</surname>
            </name>
            <id>1075885</id>
            <affiliation>Beijing University of Posts and Telecommunications</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570378854</paperid>
        <sessionid>PS4.3</sessionid>
        <papertitle>Connectivity Extraction in Cloud Infrastructures</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>For management and security purposes, cloud&#13;
providers should know the connectivity graph between virtual&#13;
machines. Since traditional methods used in physical networks&#13;
produce incomplete results and are hardly usable in the Cloud,&#13;
we propose to use information provided by a Cloud Management&#13;
Software and an SDN controller, to compute the connectivity&#13;
graph in those environments. Our approach shows an exact,&#13;
complete and up-to-date connectivity graphs computation on a&#13;
representative infrastructure, in reasonable time.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Pernelle </givenname>
              <mi/>
              <surname>Mensah</surname>
            </name>
            <id>1511099</id>
            <affiliation>Nokia Bell Labs &amp; Centrale Supelec Rennes - Inria</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Eric </givenname>
              <mi/>
              <surname>Totel</surname>
            </name>
            <id>1511105</id>
            <affiliation>Centrale Supelec Rennes</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Samuel </givenname>
              <mi/>
              <surname>Dubus</surname>
            </name>
            <id>497903</id>
            <affiliation>Nokia Bell Labs</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Waël </givenname>
              <mi/>
              <surname>Kanoun</surname>
            </name>
            <id>1511107</id>
            <affiliation>Nokia Bell Labs</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Christine </givenname>
              <mi/>
              <surname>Morin</surname>
            </name>
            <id>118971</id>
            <affiliation>INRIA &amp; IRISA</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Guillaume </givenname>
              <mi/>
              <surname>Piolle</surname>
            </name>
            <id>1511109</id>
            <affiliation>Centralesupélec &amp; Inria</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570382645</paperid>
        <sessionid>PS4.4</sessionid>
        <papertitle>Enhanced Fast BSS Transition on Enterprise WLAN with SDN-based Distribution System</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Currently, most mobile Internet devices are using WLANs as a primary broadband wireless access network for various broadband mobile Internet services, such as Video on Demand (VoD), webcasting, and on-line games. One of the challenges in QoS-aware realtime mobile multimedia service provisioning through WLANs is QoS-aware fast BSS (Basic Service Set) transition. Since most WiFi access points (APs) do not provide fast BSS transition (FT), changing currently connected AP to another takes several seconds during which mobile services are disrupted. Besides, as most mobile Internet devices are simply connecting to the access point (AP) of the strongest signal without consideration of the currently available resource at the target AP, WLANs are not providing optimal throughput with load balancing and efficient QoS provisioning. In this paper, we propose a enhanced fast BSS transition scheme for seamless mobile broadband multimedia service provisioning and load balancing. The proposed scheme is based on i) cognitive management of WLAN ESS with SDN-based distribution system to allow checking for resource availability before selecting a candidate target AP, ii) QoS-aware roaming/handover with resource request over distribution system(DS), and iii) proactive flow updates of SDN-based distribution system. The traffic loads of individual APs in the ESS (extended service set) are periodically measured and collected by ESS-CM (control and management) server. If a mobile station needs to transit to other AP, it provides the signal strengths of neighbor APs to the ESS-CM, obtains the traffic information of neighbor APs from ESS-CM, and performs the over-the-DS fast BSS transition request/response and the FT-Confirm/ACK handshaking with resource request in advance through the wired-DS. The proposed scheme had been implemented and evaluated in real IEEE 802.11n testbed environment, and the performance measurements showed enhanced QoS provisioning with minimized service disruption time and packet loss compared with existing approaches.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Hyungdong </givenname>
              <mi/>
              <surname>Hwang</surname>
            </name>
            <id>954201</id>
            <affiliation>Graduate School, Yeungnam University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Young-Tak </givenname>
              <mi/>
              <surname>Kim</surname>
            </name>
            <id>12366</id>
            <affiliation>Yeungnam University</affiliation>
            <country>Korea</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>TS6</code>
    <sessiontitle>Technical Session 6</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>16:00-17:30</range>
    <starttime>2017-11-29T16:00:00+09:00</starttime>
    <endtime>2017-11-29T17:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Noriaki Kamiyama (Fukuoka University, Japan)</chair>
    <papers>
      <paper>
        <starttime>16:00</starttime>
        <endtime>16:30</endtime>
        <paperid>1570375147</paperid>
        <sessionid>TS6.1</sessionid>
        <papertitle>Fill-in the Gaps: Spatial-Temporal Models for Missing Data</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Effective workload characterization and prediction are instrumental for efficiently and proactively managing large systems. System management primarily relies on the workload information provided by underlying system tracing mechanisms that record system-related events in log files. However, such tracing mechanisms may temporarily fail due to various reasons, yielding ``holes'' in data traces. This missing data phenomenon significantly impedes the effectiveness of data analysis. In this paper, we study real-world data traces collected from over 80K virtual machines (VMs) hosted on 6K physical boxes in the data centers of a service provider. We discover that the usage series of VMs co-located on the same physical box exhibit strong correlation with one another, and that most VM usage series show temporal patterns. By taking advantage of the observed spatial and temporal dependencies, we propose a data-filling method to predict the missing data in the VM usage series. Detailed evaluation using trace data in the wild shows that the proposed method is sufficiently accurate as it achieves an average of 20\% absolute percentage errors. We also illustrate its usefulness via a use case.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Ji </givenname>
              <mi/>
              <surname>Xue</surname>
            </name>
            <id>1236925</id>
            <affiliation>College of William and Mary, USA</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Bin </givenname>
              <mi/>
              <surname>Nie</surname>
            </name>
            <id>1507115</id>
            <affiliation>College of William and Mary</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Evgenia </givenname>
              <mi/>
              <surname>Smirni</surname>
            </name>
            <id>120686</id>
            <affiliation>College of William and Mary</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>16:30</starttime>
        <endtime>17:00</endtime>
        <paperid>1570375180</paperid>
        <sessionid>TS6.2</sessionid>
        <papertitle>Programmable Residues Defined Networks for Edge Data Centres</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Edge Data Centres (EDC) are often managed by a single administrative entity with logically centralized control. The architectural split of control and data planes and the new control plane abstractions have been touted as Software-Defined Networking (SDN), where the OpenFlow protocol is one common choice for the standardized programmatic interface to data plane devices. However, in the design of an SDN architecture, there is no clear distinction between functional network parts such as core and edge elements. It means that all switches require to support lookups over hundreds of bits with complex actions that have to be specified by multiple tables. In this paper, we propose a new programmable architecture for EDC networks, named Residual Defined Networks (RDN). In RDN, a controller defines a network policy (e.g. connectivity protection) setting flow entries at the edges. The edge switches assign a route-ID to select any existing path. A route is defined as the remainder of the division (Residue) between a route-ID and a set of switch-IDs within RDN core. In case of failures, emergency routes are compactly encoded as programmable residues forwarding paths written into the packets. RDN scalability is evaluated considering 2-tier Clos topologies which cover mostly EDC deployments supporting up to 2304 servers. A RDN proof-of-concept prototype is implemented in Mininet for network emulation. Also, to increase the accuracy on latency measures, we implement RDN in NetFPGA that is validated in a testbed with 10Gbps Ethernet boards. RDN offers ultra-fast failure recovery (sub-milliseconds carrier grade), achieves low latency with RDN switching time per hop 0.6us and no jitter within the RDN core.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Magnos </givenname>
              <mi/>
              <surname>Martinello</surname>
            </name>
            <id>374881</id>
            <affiliation>Federal University of Espirito Santo</affiliation>
            <country>Brazil</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Alextian </givenname>
              <mi/>
              <surname>Liberato</surname>
            </name>
            <id>1255975</id>
            <affiliation>Federal Institute of Science and Technology of Espírito Santo</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Arash </givenname>
              <mi/>
              <surname>Beldachi</surname>
            </name>
            <id>1454591</id>
            <affiliation>University of Bristol</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Koteswararao </givenname>
              <mi/>
              <surname>Kondepu</surname>
            </name>
            <id>298532</id>
            <affiliation>Sculoa Superiore Sant'Anna</affiliation>
            <country>Italy</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Roberta </givenname>
              <mi/>
              <surname>Gomes</surname>
            </name>
            <id>355177</id>
            <affiliation>UFES</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Rodolfo </givenname>
              <mi>S</mi>
              <surname>Villaca</surname>
            </name>
            <id>115893</id>
            <affiliation>Federal University of Espirito Santo (UFES)</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Moises </givenname>
              <mi>R. N.</mi>
              <surname>Ribeiro</surname>
            </name>
            <id>99456</id>
            <affiliation>Federal Universty of Espirito Santo</affiliation>
            <country>Brazil</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Yan </givenname>
              <mi/>
              <surname>Yan</surname>
            </name>
            <id>1034879</id>
            <affiliation>University of Bristol</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Emilio </givenname>
              <mi/>
              <surname>Hugues-Salas</surname>
            </name>
            <id>1060771</id>
            <affiliation>University of Bristol</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Dimitra </givenname>
              <mi/>
              <surname>Simeonidou</surname>
            </name>
            <id>89127</id>
            <affiliation>University of Bristol</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>17:00</starttime>
        <endtime>17:30</endtime>
        <paperid>1570381637</paperid>
        <sessionid>TS6.3</sessionid>
        <papertitle>Cost-effective replica management in fault-tolerant cloud environments</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Cloud providers rely on fault-tolerance mechanisms to realize high-availability services on best-effort infrastructure. Service replication limits the data-loss caused by failure, at the expense of additional operational costs. Recently, cloud environments are becoming increasingly heterogeneous and dynamic, by the incorporation of (very) unreliable and resource-constrained devices. In this paper, we investigate how to devise an economically viable replication strategy, for a given service on a particular cloud environment. Previous work either focused on finding replication strategies for stateless services, ignoring recovery processes and correlated failures, or considered system dynamics, while lacking Service Level Agreement (SLA)-awareness. We approach the replica management problem as a run-time revenue maximization problem. Our proposed dynamic programming algorithm can generate the optimal replication strategy over the application's life-time. Through extensive simulations, we show that our algorithm significantly improves provider revenue over a wide range of cloud- and SLA-conditions, and adapt its strategy to evolving operating conditions. The results show that coupling dynamic failure models with SLA-awareness can lead to a significantly improved provider revenue.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Bart </givenname>
              <mi/>
              <surname>Spinnewyn</surname>
            </name>
            <id>1293425</id>
            <affiliation>University of Antwerp &amp; iMinds</affiliation>
            <country>Belgium</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Juan Felipe </givenname>
              <mi/>
              <surname>Botero</surname>
            </name>
            <id>323523</id>
            <affiliation>Universidad de Antioquia</affiliation>
            <country>Colombia</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Steven </givenname>
              <mi/>
              <surname>Latré</surname>
            </name>
            <id>1059359</id>
            <affiliation>University of Antwerp - imec</affiliation>
            <country>Belgium</country>
            <presenter>1</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>

  <session>
    <code>OP</code>
    <sessiontitle>Opera Evening</sessiontitle>
    <sessionspeakerurl>https://www.cnsm-conf.org/2017/OperaEvening.pdf</sessionspeakerurl>
    <sessiondetails>Baritone: Yuma Shimizu; Piano: Shiho Fujikawa</sessiondetails>
    <range>18:00-18:45</range>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chairs/>
    <papers/>
  </session>

  <session>
    <code>GD</code>
    <sessiontitle>Gala Dinner</sessiontitle>
    <sessiondetails/>
    <range>19:15-21:30</range>
    <room>Diamond Room, 2F, Rihga Royal Hotel Tokyo</room>
    <chairs/>
    <papers/>
  </session>

  <session>
    <code>KS3</code>
    <sessiontitle>Keynote Session 3</sessiontitle>
    <sessionsubtitle>Networking Grand Challenges for 5G/IoT Advanced Applications and Platforms in US Ignite in 5G/IoT era</sessionsubtitle>
    <sessionspeaker>Dr. Glenn Ricart, US Ignite, Founder and CTO</sessionspeaker>
    <sessionspeakerurl>https://www.cnsm-conf.org/2017/keynotes.html</sessionspeakerurl>
    <sessiondetails>Glenn Ricart brings forty years of innovation in computer networking and related fields to US Ignite. Glenn is an Internet pioneer who implemented the first Inter-net interconnection point (the FIX in College Park, Maryland) and was recognized for this achievement by being inducted into the Internet Hall of Fame in August 2013. In one of his previous roles where he was academic CIO at the University of Maryland, his campus implemented the first institution-wide TCP/IP (Internet) network in 1983 using low-cost PDP-11 routers (&quot;Fuzballs&quot;) with software devised at the University of Maryland. Glenn was principal investigator of SURAnet, the first regional TCP/IP (Internet) network of academic and commercial institutions. Glenn's formal education includes degrees from Case Institute of Technology and Case Western Reserve University, and his Ph.D. in Computer Science is from the University of Maryland, College Park. His inventions have resulted in more than a dozen patents. Dr. Ricart has served on the boards of three public companies, CACI, the SCO Organization, and First USA Financial Services, in addition to numerous non-profits</sessiondetails>
    <date>30 November 2017</date>
    <range>09:30-10:30</range>
    <starttime>2017-11-30T09:30:00+09:00</starttime>
    <endtime>2017-11-30T10:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Steven Latré (University of Antwerp - imec, Belgium)</chair>
    <papers/>
  </session>
  <session>
    <code>PS5</code>
    <sessiontitle>Poster Session 5 and Coffee Break</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>10:30-11:30</range>
    <starttime>2017-11-30T10:30:00+09:00</starttime>
    <endtime>2017-11-30T11:30:00+09:00</endtime>
    <room>Lobby, B1F, Bldg.27</room>
    <chairs/>
    <papers>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570382816</paperid>
        <sessionid>PS5.1</sessionid>
        <papertitle>IPv6-specific Misconfigurations in the DNS</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>With the Internet transitioning from IPv4 to IPv6, the number of IPv6-specific DNS records (AAAA) increases. Misconfigurations in these records often go unnoticed, as most systems are provided with connectivity over both IPv4 and IPv6, and automatically fall back to IPv4 in case of connection problems. With IPv6-only networks on the rise, such misconfigurations result in servers or services rendered unreachable. Using long-term active DNS measurements over multiple zones, we qualify and quantify these IPv6-specific misconfigurations. Applying pattern matching on AAAA records revealed which configuration mistakes occur most, the distribution of faulty records per DNS operator, and how these numbers evolved over time. We show that more than 97% of invalid records can be categorized into one of our ten defined main configuration mistakes. Furthermore, we show that while the number and ratio of invalid records decreased over the last two years, the number of DNS operators with at least one faulty AAAA record increased. This emphasizes the need for easily applicable checks in DNS management systems, for which we provide recommendations in the conclusions of this work.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Luuk </givenname>
              <mi/>
              <surname>Hendriks</surname>
            </name>
            <id>1122847</id>
            <affiliation>University of Twente</affiliation>
            <country>The Netherlands</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Pieter-Tjerk </givenname>
              <mi/>
              <surname>de Boer</surname>
            </name>
            <id>139057</id>
            <affiliation>University of Twente</affiliation>
            <country>The Netherlands</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Aiko </givenname>
              <mi/>
              <surname>Pras</surname>
            </name>
            <id>6777</id>
            <affiliation>University of Twente</affiliation>
            <country>The Netherlands</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570378886</paperid>
        <sessionid>PS5.2</sessionid>
        <papertitle>Control Plane Latency Reduction for Service Chaining in Mobile Edge Computing System</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Software-Defined Networking and Network Function Virtualization technologies are utilized to construct service chains cheaply and elastically. In Mobile Edge Computing platform, cloud servers can be deployed near to base stations. Migrating service functions of service chains to edge can reduce network latency or save unnecessary bandwidth consumption between edge and cloud datacenter. However, the control plane latency of SDN/NFV Mobile Edge Computing Platform is subject to the scalability of flow table in SDN switches due to flow table overflow problem. In this paper, we proposed Hash-based Group Management scheme to reduce the number of maintained flow entries by assigning users into groups and design a hash-based structure to efficiently maintain the group information. In our simulation results, the proposed scheme can reduce the number of maintain flow entries and table overflow ratio to improve the control plane latency.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Chi-Hsiang </givenname>
              <mi/>
              <surname>Hung</surname>
            </name>
            <id>1345844</id>
            <affiliation>National Chiao Tung University</affiliation>
            <country>Taiwan</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Yao-Chou </givenname>
              <mi/>
              <surname>Hsieh</surname>
            </name>
            <id>1511127</id>
            <affiliation>National Chiao Tung University</affiliation>
            <country>Taiwan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Li-Chun </givenname>
              <mi/>
              <surname>Wang</surname>
            </name>
            <id>118401</id>
            <affiliation>National Chiao Tung University</affiliation>
            <country>Taiwan</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570378961</paperid>
        <sessionid>PS5.3</sessionid>
        <papertitle>Identification of Communication Devices from Analysis of Traffic Patterns</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Recently, variety of communication devices such as printers, IP telephones, network cameras are used widely, with the support of networking in consumer electronics. As a spread of IoT (Internet of Things), the number of embed devices are significantly increasing, however, such devices have lack of capability on security. It is therefore desirable that a network identifies these devices to take appropriate operations. In this paper, we propose an identification method of communication devices from monitoring patterns of traffic, here we use statistical metrics such as packet inter-arrival time or packet size, and we apply a machine learning for the identification. Through evaluations using real traffic, we show that our method can achieve over 90% of identification to 9 commiunication devices.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Hiroki </givenname>
              <mi/>
              <surname>Kawai</surname>
            </name>
            <id>1511238</id>
            <affiliation>OsakaCityUniversity</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Shingo </givenname>
              <mi/>
              <surname>Ata</surname>
            </name>
            <id>14463</id>
            <affiliation>Osaka City University</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Ikuo </givenname>
              <mi/>
              <surname>Oka</surname>
            </name>
            <id>14474</id>
            <affiliation>Osaka City University</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Nobuyuki </givenname>
              <mi/>
              <surname>Nakamura</surname>
            </name>
            <id>15319</id>
            <affiliation>OKI Electric Industry Co., Ltd.</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570382753</paperid>
        <sessionid>PS5.4</sessionid>
        <papertitle>Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Cyber defense today heavily depends on expensive and proprietary hardware deployed at fixed locations. Network functions virtualization (NFV) reduces the limitations of these vendor specific hardware by allowing a flexible and dynamic implementation of virtual network functions in virtual machines running on commercial off-the-shelf servers. These network functions can work as a filter to distinguish between a legitimate packet and an attack packet, and can be deployed dynamically to balance the variable attack load. However, allocating resources to these virtual machines is an NP-hard problem. In this work, we propose a solution to this problem and determine the number and placement of the VMs. We design and implement NFVSynth, an automated framework that models the resource specifications, incoming packet processing requirements, and network bandwidth constraints. It uses satisfiability modulo theories (SMT) for modeling this synthesis problem and provides a satisfiable solution. We also present simulated experiments to demonstrate the scalability and usability of the solution.</abstract>
        <authors>
          <author>
            <name>
              <givenname>A h m </givenname>
              <mi/>
              <surname>Jakaria</surname>
            </name>
            <id>1424987</id>
            <affiliation>Tennessee Technological University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Mohammad </givenname>
              <mi>Ashiqur</mi>
              <surname>Rahman</surname>
            </name>
            <id>157268</id>
            <affiliation>Tennessee Tech University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Carol </givenname>
              <mi>J</mi>
              <surname>Fung</surname>
            </name>
            <id>150276</id>
            <affiliation>Virginia Commonwealth University</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>10:30</starttime>
        <endtime>10:30</endtime>
        <paperid>1570382804</paperid>
        <sessionid>PS5.5</sessionid>
        <papertitle>DPR-MAC: Dynamic Polling for Rare Events in Wireless Sensor Networks</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Energy efficiency is the most critical aspect of disaster management/rare event detection Wireless Sensor Networks due to the low probability of event occurrence. For such networks, it is essentially important to guarantee that the nodes be alive when the event occurs as the objective of WSN deployment would not be achieved otherwise. This paper evaluated the influence of using deterministic, exponential and dynamic polling intervals by developing an asynchronous MAC protocol DPR-MAC (Dynamic Polling for Rare events). DPR-MAC has been implemented in Tiny-OS and simulated using Avrora. It has been revealed that exponential and dynamically selected polling intervals can significantly improve the energy performance of DPR-MAC and hence the lifetime of the WSN dedicated for rare event detection applications. Similarly, the transmission delay for the event data is shown to be reduced for DPR-MAC with dynamically selected polling intervals. The results have been compared with SCP-MAC for performance improvement.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Shama </givenname>
              <mi/>
              <surname>Siddiqui</surname>
            </name>
            <id>467289</id>
            <affiliation>Institute of Business Administration</affiliation>
            <country>Pakistan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Anwar </givenname>
              <mi/>
              <surname>Khan</surname>
            </name>
            <id>1387091</id>
            <affiliation>Institute of Business Administration</affiliation>
            <country>Pakistan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Muhammad Sayeed </givenname>
              <mi/>
              <surname>Ghani</surname>
            </name>
            <id>97213</id>
            <affiliation>Institute of Business Administration</affiliation>
            <country>Pakistan</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>TS7</code>
    <sessiontitle>Technical Session 7</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>11:00-12:30</range>
    <starttime>2017-11-30T11:00:00+09:00</starttime>
    <endtime>2017-11-30T12:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Pal Varga (Budapest University of Technology and Economics, Hungary)</chair>
    <papers>
      <paper>
        <starttime>11:00</starttime>
        <endtime>11:30</endtime>
        <paperid>1570375185</paperid>
        <sessionid>TS7.1</sessionid>
        <papertitle>Adaptive Traffic Monitoring for Software Dataplanes</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Network operators have recently been developing multi-Gbps traffic monitoring tools that execute on commodity hardware and are part of the packet-processing pipelines realizing software dataplanes. These solutions allow sophisticated tasks to be performed on a per-packet basis, without relying on sampling or passive trace analysis, by leveraging the processing power available on servers. Although advances in packet capture have enabled intercepting packets from network cards at high rates, bottlenecks can still arise in the monitoring process as a result of concurrent access to shared processor resources, variations of the traffic skew, and unbalanced packet-rate spikes. In this paper we present an adaptive traffic monitoring approach that copes with emerging bottlenecks by timely detecting changes in the operational conditions and reconfiguring monitoring-related operations for subsets of traffic flows. Our solution performs responsive adaptations at the time scale of milliseconds and does not require a significant amount of resources. To demonstrate the capabilities of our approach we implemented it as part of a generic packet-processing pipeline and show that lossless traffic monitoring can be achieved for a wide range of conditions.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Gioacchino </givenname>
              <mi/>
              <surname>Tangari</surname>
            </name>
            <id>1411700</id>
            <affiliation>University College London</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Marinos </givenname>
              <mi/>
              <surname>Charalambides</surname>
            </name>
            <id>830511</id>
            <affiliation>University College London</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Daphne </givenname>
              <mi/>
              <surname>Tuncer</surname>
            </name>
            <id>854477</id>
            <affiliation>University College London</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>George </givenname>
              <mi/>
              <surname>Pavlou</surname>
            </name>
            <id>816589</id>
            <affiliation>University College London</affiliation>
            <country>United Kingdom (Great Britain)</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>11:30</starttime>
        <endtime>12:00</endtime>
        <paperid>1570378519</paperid>
        <sessionid>TS7.2</sessionid>
        <papertitle>GML Learning, A Generic Machine Learning Model for Network Measurements Analysis</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>The application of machine learning models to the analysis of network measurement problems has largely increased in the last decade; however, there is still no clear best-practice or silver bullet approach to address these problems in a general context, and only adhoc and very tailored approaches have been evaluated so far. While deep-learning models have provided a major breakthrough in highly-dimensional problems such as image processing, it is difficult to say today which is the best model or most fitted category of models to address the analysis of large volumes of highly-dimensional data collected in operational networks. In this paper we present a potential solution to fill this gap, exploring the application of ensemble learning models to multiple network measurements analysis problems. Ensemble learning is the process by which multiple models, such as classifiers or experts, are strategically generated and combined to solve a particular problem. Ensemble methods use multiple learning algorithms to obtain better predictive performance than could be obtained from any of the constituent learning algorithms alone. We introduce GML Learning, a generic Machine Learning model for network measurements analysis. The GML model is a generalization of the well-known stacking approach to ensemble learning, and follows the concepts of the Super Learner model. The Super Learner performs asymptotically as well as the best possible weighted combination of the base learners, providing a very powerful approach to tackle multiple problems with the same technique. In addition, it defines an approach to minimize over-fitting likelihood during training, using a variant of cross-validation. We deploy the GML model on top of Big-DAMA, a big data analytics framework for network measurements analysis applications. We test the proposed solution in five different and assorted network measurements analysis problems, including detection of network attacks, detection of smartphone-apps anomalies, QoE prediction in cellular networks, QoE-modeling for video streaming, and Internet-paths dynamics tracking. Results confirm that the GML model provides better results than any of the single baseline models of the stack, as well as to both traditional bagging and boosting ensemble learning approaches. The GML Learning model opens the door for a generalization of a best-practice technique for the analysis of network measurements.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Pedro </givenname>
              <mi/>
              <surname>Casas</surname>
            </name>
            <id>244435</id>
            <affiliation>Austrian Institute of Technology (AIT)</affiliation>
            <country>Austria</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Juan </givenname>
              <mi/>
              <surname>Vanerio</surname>
            </name>
            <id>1189751</id>
            <affiliation>Universidad de la República &amp; ANTEL</affiliation>
            <country>Uruguay</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kensuke </givenname>
              <mi/>
              <surname>Fukuda</surname>
            </name>
            <id>213299</id>
            <affiliation>National Institute of Informatics</affiliation>
            <country>Japan</country>
            <presenter>1</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>12:00</starttime>
        <endtime>12:30</endtime>
        <paperid>1570382656</paperid>
        <sessionid>TS7.3</sessionid>
        <papertitle>Accurate Delay Measurement for Parallel Monitoring of Probe Flows</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>In this paper, we propose an accurate parallel flow monitoring method using active probe packets. Although multiple probe flows are monitored to measure delays on multiple paths in parallel for most measurement applications, information of only one probe flow of the multiple probe flows is utilized to measure an end-to-end delay on a path in conventional active measurement. In addition to information observed by the flow along the path, information of other flows is also utilized for the measurement in the proposed method. Delays on a flow are accurately measured by partially converting the observation results of a flow to those of another flow. Simulations are performed to confirm that the observation results of 72 parallel flows of active measurement are appropriately converted each other in the proposed method. When the 99th-percentile of an end-to-end delay for each flow are measured, the proposed method achieves up to 95% reduction of the error, and the error of the worst flow among all flows are reduced by 28%.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Kohei </givenname>
              <mi/>
              <surname>Watabe</surname>
            </name>
            <id>373971</id>
            <affiliation>Nagaoka University of Technology</affiliation>
            <country>Japan</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Shintaro </givenname>
              <mi/>
              <surname>Hirakawa</surname>
            </name>
            <id>1514626</id>
            <affiliation>Nagaoka University of Technology</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Kenji </givenname>
              <mi/>
              <surname>Nakagawa</surname>
            </name>
            <id>6981</id>
            <affiliation>Nagaoka University of Technology</affiliation>
            <country>Japan</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>

  <session>
    <code>Lunch</code>
    <sessiontitle>Lunch</sessiontitle>
    <sessiondetails/>
    <range>12:30-14:00</range>
    <room>Restaurant Mori-no-Kaze, 15F, Bldg.26</room>
    <chairs/>
    <papers/>
  </session>

  <session>
    <code>TS8</code>
    <sessiontitle>Technical Session 8</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>14:00-15:30</range>
    <starttime>2017-11-30T14:00:00+09:00</starttime>
    <endtime>2017-11-30T15:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chair>Felix Wu (University of Hong Kong, Hong Kong)</chair>
    <papers>
      <paper>
        <starttime>14:00</starttime>
        <endtime>14:30</endtime>
        <paperid>1570378776</paperid>
        <sessionid>TS8.1</sessionid>
        <papertitle>MULE: Multi-Layer Virtual Network Embedding</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Network Virtualization (NV), considered as a key enabler for overcoming the ossification of the Internet allows multiple heterogeneous virtual networks to co-exist over the same substrate network. Resource allocation problems in NV have been extensively studied for single layer substrates such as IP or Optical networks. However, little effort has been put to address the same problem for multi-layer IP-over-Optical networks. The increasing popularity of multi-layer networks for deploying backbones combined with their unique characteristics (e.g., topological flexibility of the IP layer) calls for the need to carefully investigate the resource provisioning problems arising from their virtualization. In this paper, we address the problem of MUlti-Layer virtual network Embedding (MULE) on IP-over-Optical networks. We propose two solutions to MULE: an Integer Linear Program (ILP) formulation for the optimal solution and a heuristic to address the computational complexity of the optimal solution. We demonstrate through extensive simulations that on average our heuristic performs within ~1.47x of optimal solution and incurs ~66% less cost than the state-of-the-art heuristic.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Shihabur Rahman </givenname>
              <mi/>
              <surname>Chowdhury</surname>
            </name>
            <id>341839</id>
            <affiliation>University of Waterloo</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Sara </givenname>
              <mi/>
              <surname>Ayoubi</surname>
            </name>
            <id>975433</id>
            <affiliation>Concordia University</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Reaz </givenname>
              <mi/>
              <surname>Ahmed</surname>
            </name>
            <id>1294721</id>
            <affiliation>University of Waterloo</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Nashid </givenname>
              <mi/>
              <surname>Shahriar</surname>
            </name>
            <id>325615</id>
            <affiliation>University of Waterloo</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Raouf </givenname>
              <mi/>
              <surname>Boutaba</surname>
            </name>
            <id>5035</id>
            <affiliation>University of Waterloo</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Jeebak </givenname>
              <mi/>
              <surname>Mitra</surname>
            </name>
            <id>152639</id>
            <affiliation>Huawei Technologies Canada</affiliation>
            <country>Canada</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Liu </givenname>
              <mi/>
              <surname>Liu</surname>
            </name>
            <id>1426536</id>
            <affiliation>Huawei Technologies Co., Ltd.</affiliation>
            <country>P.R. China</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>14:30</starttime>
        <endtime>15:00</endtime>
        <paperid>1570378924</paperid>
        <sessionid>TS8.2</sessionid>
        <papertitle>Enabling Low Latency and High Reliability for IMS-NFV</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Network Functions Virtualization (NFV) allows service providers to deliver new services to their customers more quickly by adopting software centric network functions implementation over commercial, off-the-shelf hardwares. IP Multimedia Subsystem (IMS) which is one of the most complex NFV instances requires extremely low end-to-end latency (up to 40 msec), and demands system availability as high as five nines.&#13;
We discover that highly modular 3GPP standardized IMS network functions implementation over virtualized platform (1) incurs latencies, and (2) does not tolerate faults. NFV-based IMS modules incur high latencies by creating a feedback loop among each other while executing delay sensitive data-plane traffic. These IMS modules are also susceptible to failure, causing the control-plane to terminate the application session while keeping the data-plane to forward data packets.&#13;
To address these issues, we propose to refactor network function modules. We reduce latencies by pipelining the communication between IMS modules, and achieve fault tolerance by reconfiguring their neighboring modules.&#13;
We build our system prototype of open source 3GPP compliant IMS over OpenStack platform. Our results show that our scheme reduces latencies and failure recovery time upto 12X and 10X, respectively, when compared to the stat-of-the-art 3GPP compliant virtualized IMS implementation.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Muhammad Taqi </givenname>
              <mi/>
              <surname>Raza</surname>
            </name>
            <id>260327</id>
            <affiliation>UCLA &amp; Qualcomm</affiliation>
            <country>USA</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:00</starttime>
        <endtime>15:30</endtime>
        <paperid>1570382299</paperid>
        <sessionid>TS8.3</sessionid>
        <papertitle>Evaluating the Impact of SDN-Induced Frequent Route Changes on TCP Flows</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Traffic engineering technologies such as MPLS have been proposed to adjust the paths of data flows according to network availability. Although the time interval between traffic optimisations is often on the scale of hours or minutes, modern SDN techniques enable reconfiguring the network more frequently. It is argued, however, that changing the paths of TCP flows too often could severely impact their performance by incurring packet loss and reordering. This work analyses and evaluates the impact of frequent route changes on the performance of TCP flows. Experiments carried out on a network testbed show that rerouting a flow can affect its throughput when reassigning it a path either longer or shorter than the original path. Packet reordering has a negligible impact when compared to the increase of RTT. Moreover, constant rerouting influences the performance of the congestion control algorithm. Designed to assess the limits on SDN-induced reconfiguration, a scenario where the traffic is rerouted every 0.1s demonstrates that the throughput can be as low as 35% of that achieved without rerouting.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Radu </givenname>
              <mi/>
              <surname>Carpa</surname>
            </name>
            <id>1154787</id>
            <affiliation>ENS de Lyon</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Marcos </givenname>
              <mi/>
              <surname>Dias de Assunção</surname>
            </name>
            <id>1211949</id>
            <affiliation>Inria</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Laurent </givenname>
              <mi/>
              <surname>Lefevre</surname>
            </name>
            <id>11674</id>
            <affiliation>INRIA</affiliation>
            <country>France</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Olivier </givenname>
              <mi/>
              <surname>Gluck</surname>
            </name>
            <id>393837</id>
            <affiliation>LIP, Ens Lyon</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Jean-Christophe </givenname>
              <mi/>
              <surname>Mignot</surname>
            </name>
            <id>237991</id>
            <affiliation>ENS Lyon</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>PS6</code>
    <sessiontitle>Poster Session 6 and Coffee Break</sessiontitle>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>15:30-16:00</range>
    <starttime>2017-11-30T15:30:00+09:00</starttime>
    <endtime>2017-11-30T16:00:00+09:00</endtime>
    <room>Lobby, B1F, Bldg.27</room>
    <chairs/>
    <papers>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570378853</paperid>
        <sessionid>PS6.1</sessionid>
        <papertitle>Dynamic Algorithm Selection for the Logic of Tasks in IoT Stream Processing Systems</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Various Internet of Things and Industry 4.0 use cases such as city-wide monitoring, Smart Grid control, or machine control, require low-latency distributed processing of continuous data streams. This fact has boosted research on making Stream Processing Frameworks (SPFs) IoT-ready, meaning that their cloud and IoT service management mechanisms (e.g., task placement, load balancing, algorithm selection) need to consider new requirements derived from IoT-specific characteristics, i.e., ultra low latency due to physical interactions. Although various extensions have appeared to optimize such SPF-provided mechanisms, they still lack the modules, data models, and algorithms to properly handle algorithm selection in IoT deployments. The algorithm selection problem refers to selecting dynamically which internal logic a deployed streaming task should use in case of various alternatives. To the best of our knowledge, this work is the first solution that adds this capability to SPFs. Our solution is based on i) architectural extensions of typical SPF middleware, ii) a new schema for characterizing algorithmic performance in the targeted context, and iii) a streaming-specific optimization problem formulation. We implemented our solution as an extension to Apache Storm and demonstrate how it can reduce stream processing latency by up to a factor of 2.9 in the tested scenarios.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Ehsan </givenname>
              <mi/>
              <surname>Poormohammady</surname>
            </name>
            <id>1450633</id>
            <affiliation>RWTH Aachen University</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Jens Helge </givenname>
              <mi/>
              <surname>Reelfs</surname>
            </name>
            <id>1450634</id>
            <affiliation>RWTH Aachen University</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Mirko </givenname>
              <mi/>
              <surname>Stoffers</surname>
            </name>
            <id>903475</id>
            <affiliation>RWTH Aachen University</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Klaus </givenname>
              <mi/>
              <surname>Wehrle</surname>
            </name>
            <id>1476937</id>
            <affiliation>RWTH Aachen</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Apostolos </givenname>
              <mi/>
              <surname>Papageorgiou</surname>
            </name>
            <id>544981</id>
            <affiliation>NEC Laboratories Europe</affiliation>
            <country>Germany</country>
            <presenter>1</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570382817</paperid>
        <sessionid>PS6.2</sessionid>
        <papertitle>Simulation Toolbox for Studying Energy Consumption in Wired Networks</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Networking infrastructures are considered to consume as much energy as terminal end-user equipment or data-centers. While energy consumption of wireless networks is a matter of concern since their beginning, it is not the case for wired networks as they do not rely on batteries, but on plugged equipment. Yet, facing growing consumption, energy-efficient techniques start to be implemented in wired networks. However, measuring the end-to-end energy consumption of wired networking infrastructures remains a real challenge for network operators and scientists. This article presents the ECOFEN (Energy Consumption mOdel For End-to-end Networks) framework which allows to support precise simulation of energy consumption of large-scale complex wired networks. The experimental validation shows that Ecofen provides accurate energy consumption values.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Anne-Cécile </givenname>
              <mi/>
              <surname>Orgerie</surname>
            </name>
            <id>342277</id>
            <affiliation>CNRS &amp; IRISA</affiliation>
            <country>France</country>
            <presenter>1</presenter>
          </author>
          <author>
            <name>
              <givenname>Betsegaw </givenname>
              <mi/>
              <surname>Lemma Amersho</surname>
            </name>
            <id>1514782</id>
            <affiliation>Université Rennes 1</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Timothée </givenname>
              <mi/>
              <surname>Haudebourg</surname>
            </name>
            <id>1452794</id>
            <affiliation>ENS de Rennes</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Martin </givenname>
              <mi/>
              <surname>Quinson</surname>
            </name>
            <id>126594</id>
            <affiliation>ENS Rennes</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Myriana </givenname>
              <mi/>
              <surname>Rifai</surname>
            </name>
            <id>1126541</id>
            <affiliation>I3S/CNRS UMR 7271 Sophia Antipolis</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Dino </givenname>
              <mi/>
              <surname>Lopez Pacheco</surname>
            </name>
            <id>116270</id>
            <affiliation>University Nice Sophia Antipolis (UNS)</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Laurent </givenname>
              <mi/>
              <surname>Lefevre</surname>
            </name>
            <id>11674</id>
            <affiliation>INRIA</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570382601</paperid>
        <sessionid>PS6.3</sessionid>
        <papertitle>Automated Selection of Offloadable Tasks for Mobile Computation Offloading in Edge Computing</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>Mobile computation offloading has attracted much interest because of its potential to relieve mobile devices from heavy computation duties that conflict with their constrained and limited available resources, primarily in terms of battery power. While some offloading solutions have been recently proposed and developed, the relevant technical challenge of how to automatically determine the application tasks that are the best candidates for offloading has not been explored so far. This paper presents an innovative task selection algorithm able to identify the most suitable Android application methods to be dynamically offloaded, on either remote cloud resources or edge nodes with virtualization capabilities, thus providing a crucial support element to leverage the adoption of mobile offloading techniques for apps of industrial interest. In particular, the proposed solution can parse every kind of Android application, without a-priori knowledge and in a completely autonomous way, and can classify all the encountered Android methods depending on their probable suitability for offloading, by adopting a very fine-grained and multi-steps analyzer approach. The reported experimental results show the effectiveness of our novel task selection algorithm when applied to the top 250 most downloaded Android apps on Google Play Store: our algorithm has demonstrated an excellent capability to identify offloadable methods and a consequent significant saving for the execution of mobile apps in terms of cyclomatic complexity.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Alessandro </givenname>
              <mi/>
              <surname>Zanni</surname>
            </name>
            <id>1388648</id>
            <affiliation>University of Bologna</affiliation>
            <country>Italy</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Se-young </givenname>
              <mi/>
              <surname>Yu</surname>
            </name>
            <id>903255</id>
            <affiliation>Université Pierre et Marie Curie</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Paolo </givenname>
              <mi/>
              <surname>Bellavista</surname>
            </name>
            <id>431136</id>
            <affiliation>University of Bologna</affiliation>
            <country>Italy</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Rami </givenname>
              <mi/>
              <surname>Langar</surname>
            </name>
            <id>109848</id>
            <affiliation>University Paris Est Marne-la-Vallée</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Stefano </givenname>
              <mi/>
              <surname>Secci</surname>
            </name>
            <id>154796</id>
            <affiliation>University Pierre et Marie Curie - Paris 6</affiliation>
            <country>France</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
      <paper>
        <starttime>15:30</starttime>
        <endtime>15:30</endtime>
        <paperid>1570382829</paperid>
        <sessionid>PS6.4</sessionid>
        <papertitle>Network Slice Embedding under Traffic Uncertainties - A Light Robust Approach</papertitle>
        <trackname>13th International Conference on Network and Service Management 2017 - Full papers</trackname>
        <abstract>5G networks are conceived to be highly flexible and programmable end-to-end connect-and-compute infrastructures. In that context, the concept of network slicing is of particular importance. From a network infrastructure point of view, network slicing refers to the provisioning and assignment of physical substrate network resources to tenants. To enable an efficient resource allocation suitable optimization models are required. In our previous contributions, we presented a model that takes into account traffic uncertainty by using the well known concept of Gamma-robustness. We further extended this model to cope with general network slices and to consider also single substrate link and node failures. In this paper, we present a novel model applying the concept of light robustness to address scalability issues of our previous models and to get a deeper insight into the tradeoff between the price of robustness and the realized robustness. We compare our model with a nominal and $\Gamma$-robust approach for different scenarios using network topology examples taken from SNDlib.</abstract>
        <authors>
          <author>
            <name>
              <givenname>Andreas </givenname>
              <mi/>
              <surname>Baumgartner</surname>
            </name>
            <id>799671</id>
            <affiliation>Chemnitz University of Technology &amp; Chair of Communication Networks</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Thomas </givenname>
              <mi/>
              <surname>Bauschert</surname>
            </name>
            <id>331369</id>
            <affiliation>Chemnitz University of Technology</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Abdulaziz </givenname>
              <mi/>
              <surname>Alghosh Blzarour</surname>
            </name>
            <id>1511320</id>
            <affiliation>Technische Universität Chemnitz</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
          <author>
            <name>
              <givenname>Varun </givenname>
              <mi>S.</mi>
              <surname>Reddy</surname>
            </name>
            <id>1166993</id>
            <affiliation>Technische Universität Chemnitz</affiliation>
            <country>Germany</country>
            <presenter>0</presenter>
          </author>
        </authors>
      </paper>
    </papers>
  </session>
  <session>
    <code>DEP</code>
    <sessiontitle>Distinguished Experts Panel</sessiontitle>
    <sessionmoderator>Dr. Katsumi Emura, NEC</sessionmoderator>
    <sessionspeakerurl>https://www.cnsm-conf.org/2017/dep.html</sessionspeakerurl>
    <sessionsubtitle/>
    <sessionspeaker/>
    <sessiondetails/>
    
    <range>16:00-17:30</range>
    <starttime>2017-11-30T16:00:00+09:00</starttime>
    <endtime>2017-11-30T17:30:00+09:00</endtime>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chairs/>
    <papers>
      <paper>
          <starttime>15:30</starttime>
          <endtime>17:00</endtime>
          <paperid/>
          <sessionid>DEP</sessionid>
          <papertitle/>
          <trackname>12th International Conference on Network and Service Management 2016 - DEP</trackname>
          <abstract/>
          <authors>
            <author>
              <name>
                <givenname>Glenn </givenname>
                <surname>Ricart</surname>
              </name>
              <affiliation>US Ignite, Founder and CTO</affiliation>
              <country>US</country>
              <presenter>0</presenter>
            </author>
            <author>
              <name>
                <givenname>Rolf </givenname>
                <surname>Stalder</surname>
              </name>
              <affiliation>KTH Royal Institute of Technology</affiliation>
              <country>Sweden</country>
              <presenter>0</presenter>
            </author>
            <author>
              <name>
                <givenname>Keisuke </givenname>
                <surname>Ishibashi</surname>
              </name>
              <affiliation>NTT</affiliation>
              <country>Japan</country>
              <presenter>0</presenter>
            </author>
        <author>
              <name>
                <givenname>Hideyuki </givenname>
                <surname>Shimonishi</surname>
              </name>
              <affiliation>NEC</affiliation>
              <country>Japan</country>
              <presenter>0</presenter>
            </author>
          </authors>
        </paper>
    </papers>
  </session>

  <session>
    <code>Closing</code>
    <sessiontitle>Closing Ceremony</sessiontitle>
    <sessiondetails/>
    <range>17:30-18:00</range>
    <room>Ono Memorial Hall, B2F, Bldg.27</room>
    <chairs/>
    <papers/>
  </session>
</program>
