Sciweavers

459 search results - page 59 / 92
» Malware Models for Network and Service Management
Sort
View
FORTE
1996
15 years 3 months ago
Combined Application of SDL-92, OMT, MSC and TTCN
The paper describes the application of SDL-92[1] and OMT[2] to the design of a V5.x Access Network interface. While OMT is used to model the management aspects of the system, typi...
Eurico Inocêncio, Manuel Ricardo, Hitoshi Sa...
IJACTAICIT
2010
169views more  IJACTAICIT 2010»
14 years 11 months ago
The Migration of Mobile Agent Using the Object Replication
The migration method of a mobile agent affects the entire performance of the distributed system. Most of the existing migration methods have the slow-witted structures due to the ...
Yonsik Lee, Jeongsu Lee
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 6 days ago
A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users...
H. S. Ramesh Babu, Gowrishankar, P. S. Satyanaraya...
SC
2009
ACM
15 years 8 months ago
Building the PolarGrid portal using web 2.0 and OpenSocial
Science requires collaboration. In this paper, we investigate the feasibility of coupling current social networking techniques to science gateways to provide a scientific collabor...
Zhenhua Guo, Raminderjeet Singh, Marlon E. Pierce
GLOBECOM
2007
IEEE
15 years 8 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...