PhD Theses
QoS Management
Call For Papers
Scientific and Industrial Council
Site Map
Members Area
News RSS
Events RSS
Conferences RSS

Order By : ID | File Title | Downloads | Submit Date
Page 2 of 9 < 1 2 3 4 5 6 7 8 9 >
file_icons/pdf1.gif An Architecture for the Self-management of Lambda-Connections in Hybrid Networks   Downloaddownload_trans.gif
Author:  Tiago Fioreze, Remco van de Meent, Aiko Pras
Short Description:  Proceedings of the 13th EUNICE Open European Summer School 2006 (EUNICE 2007), 18-20 July 2007, Enschede, The Netherlands. Lecture Notes in Computer Science, Vol. 4606, pp. 141-148.
file_icons/document.gif An Enhanced Policy Model to Enable Autonomic Communications   Downloaddownload_trans.gif
Author:  Greg Cox, Joan Serrat, John Strassner, José Neuman de Souza, David Raymer, Srini Samudrala, Steven D
Short Description:  The Policy Expert Group of the Autonomic Communications Forum is working to enhance policy to enable flexible control of self&shy; governed systems. The initial effort focuses on proposed enhancements to the DEN-ng policy ..... 5th IEEE workshop on Engineering of Autonomic Systems (EASe&...
file_icons/pdf3.gif Analysis of Techniques for Protection Against Spam over Internet Telephony   Downloaddownload_trans.gif
Author:  Vincent M. Quinten, Remco van de Meent, Aiko Pras
Short Description:  13th EUNICE Open European Summer School 2006 (EUNICE 2007), 18-20 July 2007, Enschede, The Netherlands. Lecture Notes in Computer Science, Vol. 4606, ISSN 0302-9743 ISBN 978-3-540-73529-8, pp. 70-77
file_icons/apple.gif Answering Queries Using Cooperative Semantic Caching   Downloaddownload_trans.gif
Author:  Andrei Vancea, Burkhard Stiller
Short Description:  Semantic caching is a technique used for optimizing the evaluation of database queries by caching results of previous answered queries at the client side and using the cached results when trying to answer new queries. Before sending a query to the database server, the client first checks, if th...
file_icons/pdf1.gif Applying Semantic Techniques to Search and Analyze Bug Tracking Data   Downloaddownload_trans.gif
Author:  H.M. Tran, C. Lange, G. Chulkov, J. Schönwälder, M. Kohlhase
Short Description:  The Web has become an important knowledge source for resolving system installation problems and for working around software bugs. In particular, web-based bug tracking systems offer large archives of useful troubleshooting advice. However, searching bug tracking systems can be time consuming si...
file_icons/apple.gif Automated Contract Formation for Electronic Value-added Services in the Internet—The Case of Bandwidth-on-Demand Contracts in Europe   Downloaddownload_trans.gif
Author:  M. Waldburger, B. Stiller
Short Description:  Commercial offerings of electronically provided value-added services in the Internet ask for the respective commercialization support mechanisms to be in place. Oncecontracts for such services have to be concluded in automated manner, legalcompliance in contract formation determines a key issue...
file_icons/pdf1.gif Autonomic Internet: A Perspective for Future Internet Services Based on Autonomic Principles   Downloaddownload_trans.gif
Author:  Alessandro Bassi, Spyros Denazis, Alex Galis, Claire Fahy, Martín Serrano, Joan Serrat
Short Description:  2nd IEEE International Workshop on Modelling Autonomic Communications Environments (MACE 2007), Multicon Lecture Notes series, San Jose, CA, USA, 29-30 November 2007
file_icons/pdf1.gif Autonomic Management Architecture for Flexible Grid Services Deployment Based on Policies   Downloaddownload_trans.gif
Author:  E.Magaña, L.Lefevre and J.Serrat
Short Description:  20th International Conference on Architecture of Computing Systems (ARCS 2007), LNCS 4415, pp.157-170, Zurich, 12-15, March, 2007
file_icons/pdf1.gif BLOMERS: Balanced Load Multi-Constrained Resource Scheduler   Downloaddownload_trans.gif
Author:  E.Magaña, M.Hasan, J.Serrat
Short Description:  IEEE Third International Conference on Networkig and Services (ICNS 2007), Athens, Greece, June 19-24, 2007
file_icons/pdf1.gif Changing Network Behavior   Downloaddownload_trans.gif
Author:  R. Koch
Short Description:  The security of computer networks has been in the focus of research for years. While several sophisticated systems had been developed in the area of Intrusion Detection, new challenges arised. Pattern matching systems are not able to cope with high bandwidth (10 Gbps +) when analyzing the whole...
Page 2 of 9 < 1 2 3 4 5 6 7 8 9 >
search.gifSearch add_file.gifSubmit File