Sciweavers

1040 search results - page 67 / 208
» Resource Usage Verification
Sort
View
CN
2004
108views more  CN 2004»
14 years 9 months ago
Routing bandwidth-guaranteed paths with restoration in label-switched networks
Label switched networks have become increasingly attractive to both network providers and customers. By creating aggregate, bandwidth-reserved flows, these networks offer routing ...
Samphel Norden, Milind M. Buddhikot, Marcel Waldvo...
RTAS
2010
IEEE
14 years 8 months ago
Physicalnet: A Generic Framework for Managing and Programming Across Pervasive Computing Networks
This paper describes the design and implementation of a pervasive computing framework, named Physicalnet. Essentially, Physicalnet is a generic paradigm for managing and programmi...
Pascal Vicaire, Zhiheng Xie, Enamul Hoque, John A....
WOSP
2004
ACM
15 years 3 months ago
An autonomic failure-detection algorithm
Designs for distributed systems must consider the possibility that failures will arise and must adopt specific failure detection strategies. We describe and analyze a self-regulat...
Kevin Mills, Scott Rose, Stephen Quirolgico, M. Br...
NOMS
2010
IEEE
157views Communications» more  NOMS 2010»
14 years 8 months ago
Using resource-level information into nonadditive negotiation models for cloud Market environments
—Markets arise as an efficient way of organising resources in Cloud Computing scenarios. In Cloud Computing Markets, Brokers that represent both Clients and Service Providers me...
Mario Macías, Jordi Guitart
FMCO
2008
Springer
167views Formal Methods» more  FMCO 2008»
14 years 11 months ago
Formal Behavioral Modeling and Compliance Analysis for Service-Oriented Systems
In this paper, we present a framework for formal modeling and verification of service-based business processes with focus on their compliance to external regulations such as Segreg...
Natallia Kokash, Farhad Arbab