Sciweavers

1040 search results - page 174 / 208
» Resource Usage Verification
Sort
View
CLUSTER
2004
IEEE
14 years 9 months ago
Performance Evaluation of Shared Mesh Protection in WDM Networks
The efficient use of network capacity in shared restoration schemes strongly depends upon the path selection procedure. In this paper we propose and evaluate path selection algorit...
Chadi Assi, Ahmad Khalil, Nasir Ghani, Abdallah Sh...
COMCOM
2004
113views more  COMCOM 2004»
14 years 9 months ago
A mobile differentiated services QoS model
UMTS networks will be based on the Internet Protocol (IP) to provide an efficient support for applications with bursty traffic characteristics, e.g., WWW browsers. Such IP-based n...
Jörg Diederich, Lars C. Wolf, Martina Zitterb...
APIN
2000
143views more  APIN 2000»
14 years 9 months ago
Conceptual Models and Architectures for Advanced Information Systems
Abstract. This paper addresses several issues related to the use of conceptual modeling to support serviceoriented, advanced information systems. It shows how conceptual modeling o...
Larry Kerschberg, Doyle Weishar
CJ
2002
122views more  CJ 2002»
14 years 9 months ago
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services
monitoring indicators at different levels of abstraction. At the application level, it instruments the Java Virtual Machine (JVM) to notify several different types of events trigge...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
JPDC
2000
81views more  JPDC 2000»
14 years 9 months ago
A Dynamic Light-Weight Group Service
The virtual synchrony model for group communication has proven to be a powerful paradigm for building distributed applications. Implementations of virtual synchrony usually requir...
Luís Rodrigues, Katherine Guo, Paulo Ver&ia...