A cloud agency for SLA negotiation and management

S Venticinque, R Aversa, B Di Martino, M Rak… - Euro-Par 2010 Parallel …, 2011 - Springer
Resources management facilities, based on service level agreements, are needed in the
Cloud in order to negotiate a collection of inter-connected and virtualized computers …

Building a mosaic of clouds

B Di Martino, D Petcu, R Cossu, P Goncalves… - Euro-Par 2010 Parallel …, 2011 - Springer
The current diversity of Cloud computing services, benefic for the fast development of a new
IT market, hinders the easy development, portability and inter-operability of Cloud oriented …

An SLA-based broker for cloud infrastructures

A Cuomo, G Di Modica, S Distefano, A Puliafito… - Journal of grid …, 2013 - Springer
The breakthrough of Cloud comes from its service oriented perspective where everything,
including the infrastructure, is provided “as a service”. This model is really attractive and …

Cloud agency: A mobile agent based cloud system

R Aversa, B Di Martino, M Rak… - … conference on complex …, 2010 - ieeexplore.ieee.org
The cloud paradigm appeared on the computing scene in 2005 with the Amazon Elastic
Compute Cloud (EC2). After this date, a large set of related technologies has been …

Flexible software architecture and language for mobile agents

G Ciobanu, C Juravle - Concurrency and computation: practice …, 2012 - Wiley Online Library
In this paper, we present a flexible software architecture and a language for systems of
mobile agents starting from a formalism with timed interactions and explicit locations. The …

Deploying mobile computation in cloud service

X Li, H Zhang, Y Zhang - … , CloudCom 2009, Bei**g, China, December 1-4 …, 2009 - Springer
Cloud computing advocates a service-oriented computing par-adigm where various kinds of
resources are organized in a virtual way. How to specify and execute tasks to make use of …

Qos management in cloud@ home infrastructures

S Distefano, A Puliafito, M Rak… - … on Cyber-Enabled …, 2011 - ieeexplore.ieee.org
Cloud is strongly emerging as the new deal of distributed computing. One of the reason
behind the Cloud success is its business/commercial-oriented nature, proof of its …

Argumentation-based security requirements elicitation: The next round

D Ionita, JW Bullee, RJ Wieringa - 2014 IEEE 1st International …, 2014 - ieeexplore.ieee.org
Information Security Risk Assessment can be viewed as part of requirements engineering
because it is used to translate security goals into security requirements, where security …

Biased random walks on resource network graphs for load balancing

M Randles, O Abu-Rahmeh, P Johnson… - The Journal of …, 2010 - Springer
The currently emerging large-scale complex networks and networks of networks are
becoming apparent in the pervasive supply of seamless and transparent access to …

Designing and implementing an IEEE 802.16 network simulator for performance evaluation of bandwidth allocation algorithms

YC Lai, YH Chen - 2009 11th IEEE International Conference on …, 2009 - ieeexplore.ieee.org
IEEE 802.16 technology is a promising technology to solve the last mile problem by its
wireless, long distance, and high-bandwidth transmission. However, there isn't any suitable …