A survey of network virtualization
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations
to the existing Internet architecture are now limited to simple incremental updates; …
to the existing Internet architecture are now limited to simple incremental updates; …
Towards virtual networks for virtual machine grid computing
AISPA Dinda - Proc. 3rd USENIX Virtual Machine Research Tech …, 2004 - usenix.org
Virtual machines can greatly simplify wide-area distributed computing by lowering the level
of abstraction to the benefit of both resource providers and users. Networking, however, can …
of abstraction to the benefit of both resource providers and users. Networking, however, can …
[BOOK][B] The practical handbook of internet computing
MP Singh - 2004 - taylorfrancis.com
The Practical Handbook of Internet Computing analyzes a broad array of technologies and
concerns related to the Internet, including corporate intranets. Fresh and insightful articles by …
concerns related to the Internet, including corporate intranets. Fresh and insightful articles by …
Dynamic Internet overlay deployment and management using the X-Bone
J Touch - Computer Networks, 2001 - Elsevier
The X-Bone dynamically deploys and manages Internet overlays to reduce configuration
effort and increase network component sharing. The X-Bone discovers, configures, and …
effort and increase network component sharing. The X-Bone discovers, configures, and …
Aspect based sentiment analysis in social media with classifier ensembles
The analysis of user generated content on social media and the accurate specification of
user opinions towards products and events is quite valuable to many applications. With the …
user opinions towards products and events is quite valuable to many applications. With the …
Formal methods in safety-critical standards
J Bowen - Proceedings 1993 Software Engineering Standards …, 1993 - ieeexplore.ieee.org
There is great interest in ensuring correctness of safety-critical embedded systems since on
the one hand the use of software gives greatly increased functionality and flexibility and on …
the one hand the use of software gives greatly increased functionality and flexibility and on …
Towards automated provisioning of secure virtualized networks
S Cabuk, CI Dalton, HG Ramasamy… - Proceedings of the 14th …, 2007 - dl.acm.org
We describe a secure network virtualization framework that helps realize the abstraction of
Trusted Virtual Domains (TVDs), a security-enhanced variant of virtualized network zones …
Trusted Virtual Domains (TVDs), a security-enhanced variant of virtualized network zones …
Techniques for link utilization for half-duplex and full-duplex stations in a wireless network
A Chindapol, Z Li, R Albanese, A Bacioccola… - US Patent …, 2012 - Google Patents
(FI)(*) Notice: Subject to any disclaimer, the term of this OTHER PUBLICATIONS patent is
extended or adjusted under 35 D. Schultz et al. IST-2003-507581 Winner-Proposal of the …
extended or adjusted under 35 D. Schultz et al. IST-2003-507581 Winner-Proposal of the …
The genesis kernel: A programming system for spawning network architectures
Currently, the design, deployment, and refinement of new network architectures is a manual,
ad hoc, and time-consuming process. We present the design, implementation, and …
ad hoc, and time-consuming process. We present the design, implementation, and …
Customizable virtual private network service with QoS
In this paper, we propose and implement Virtual Network Service (VNS), a value-added
network service for deploying virtual private networks (VPNs) in a managed wide-area IP …
network service for deploying virtual private networks (VPNs) in a managed wide-area IP …