A survey of network virtualization

NMMK Chowdhury, R Boutaba - Computer Networks, 2010 - Elsevier
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations
to the existing Internet architecture are now limited to simple incremental updates; …

Towards virtual networks for virtual machine grid computing

AISPA Dinda - Proc. 3rd USENIX Virtual Machine Research Tech …, 2004 - usenix.org
Virtual machines can greatly simplify wide-area distributed computing by lowering the level
of abstraction to the benefit of both resource providers and users. Networking, however, can …

[BOOK][B] The practical handbook of internet computing

MP Singh - 2004 - taylorfrancis.com
The Practical Handbook of Internet Computing analyzes a broad array of technologies and
concerns related to the Internet, including corporate intranets. Fresh and insightful articles by …

Dynamic Internet overlay deployment and management using the X-Bone

J Touch - Computer Networks, 2001 - Elsevier
The X-Bone dynamically deploys and manages Internet overlays to reduce configuration
effort and increase network component sharing. The X-Bone discovers, configures, and …

Aspect based sentiment analysis in social media with classifier ensembles

I Perikos, I Hatzilygeroudis - 2017 IEEE/ACIS 16th International …, 2017 - ieeexplore.ieee.org
The analysis of user generated content on social media and the accurate specification of
user opinions towards products and events is quite valuable to many applications. With the …

Formal methods in safety-critical standards

J Bowen - Proceedings 1993 Software Engineering Standards …, 1993 - ieeexplore.ieee.org
There is great interest in ensuring correctness of safety-critical embedded systems since on
the one hand the use of software gives greatly increased functionality and flexibility and on …

Towards automated provisioning of secure virtualized networks

S Cabuk, CI Dalton, HG Ramasamy… - Proceedings of the 14th …, 2007 - dl.acm.org
We describe a secure network virtualization framework that helps realize the abstraction of
Trusted Virtual Domains (TVDs), a security-enhanced variant of virtualized network zones …

Techniques for link utilization for half-duplex and full-duplex stations in a wireless network

A Chindapol, Z Li, R Albanese, A Bacioccola… - US Patent …, 2012 - Google Patents
(FI)(*) Notice: Subject to any disclaimer, the term of this OTHER PUBLICATIONS patent is
extended or adjusted under 35 D. Schultz et al. IST-2003-507581 Winner-Proposal of the …

The genesis kernel: A programming system for spawning network architectures

ME Kounavis, AT Campbell, S Chou… - IEEE Journal on …, 2001 - ieeexplore.ieee.org
Currently, the design, deployment, and refinement of new network architectures is a manual,
ad hoc, and time-consuming process. We present the design, implementation, and …

Customizable virtual private network service with QoS

LK Lim, J Gao, TSE Ng, PR Chandra, P Steenkiste… - Computer Networks, 2001 - Elsevier
In this paper, we propose and implement Virtual Network Service (VNS), a value-added
network service for deploying virtual private networks (VPNs) in a managed wide-area IP …