Sciweavers

1202 search results - page 206 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
NOMS
2010
IEEE
195views Communications» more  NOMS 2010»
14 years 9 months ago
Optimized network configuration parameter assignment based on graph coloring
The trend for future mobile networks is to move away from Network Elements (NEs) delivered with specially tailored configurations towards off-the-shelf products. The configurations...
Tobias Bandh, Georg Carle, Henning Sanneck, Lars-C...
SERVICEWAVE
2010
14 years 9 months ago
Simulating Autonomic SLA Enactment in Clouds Using Case Based Reasoning
Abstract. With the emergence of Cloud Computing resources of physical machines have to be allocated to virtual machines (VMs) in an ondemand way. However, the efficient allocation ...
Michael Maurer, Ivona Brandic, Rizos Sakellariou
USS
2010
14 years 9 months ago
PrETP: Privacy-Preserving Electronic Toll Pricing
Current Electronic Toll Pricing (ETP) implementations rely on on-board units sending fine-grained location data to the service provider. We present , a privacy-preserving ETP syst...
Josep Balasch, Alfredo Rial, Carmela Troncoso, Bar...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 9 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
DLOG
2009
14 years 9 months ago
A Combination of Boolean Games with Description Logics for Automated Multi-Attribute Negotiation
Abstract. Multi-attribute negotiation has been extensively studied from a gametheoretic viewpoint. In negotiation settings, utility functions are used to express agent preferences....
Thomas Lukasiewicz, Azzurra Ragone