To see the other types of publications on this topic, follow the link: End-to-end services.

Journal articles on the topic 'End-to-end services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'End-to-end services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Immaneni, Jayaram. "End-to-End MLOps in Financial Services: Resilient Machine Learning with Kubernetes." International Journal of Science and Research (IJSR) 11, no. 10 (October 27, 2022): 1459–67. https://doi.org/10.21275/sr221013093711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aldington, D. J., H. J. McQuay, and R. A. Moore. "End-to-end military pain management." Philosophical Transactions of the Royal Society B: Biological Sciences 366, no. 1562 (January 27, 2011): 268–75. http://dx.doi.org/10.1098/rstb.2010.0214.

Full text
Abstract:
The last three years have seen significant changes in the Defence Medical Services approach to trauma pain management. This article seeks to outline these changes that have occurred at every level of the casualty's journey along the chain of evacuation, from the point of injury to rehabilitation and either continued employment in the Services or to medical discharge. Particular attention is paid to the evidence for the interventions used for both acute pain and chronic pain management. Also highlighted are possible differences in pain management techniques between civilian and military casualties.
APA, Harvard, Vancouver, ISO, and other styles
3

GUPTA, APARNA, and LINGYI ZHANG. "PRICING FOR END-TO-END ASSURED BANDWIDTH SERVICES." International Journal of Information Technology & Decision Making 07, no. 02 (June 2008): 361–89. http://dx.doi.org/10.1142/s021962200800296x.

Full text
Abstract:
The Internet today mostly offers a simple best-effort mode of service. The capabilities of the Internet will be significantly enhanced if it supports better QoS modes, especially when QoS is provided for end-to-end services. This enhancement requires both technological development and economic mechanisms to support better QoS service modes. In this article, we study a Multi-ISP Overlay Provider's (MOP's) pricing problem for delivering end-to-end services with expected bandwidth assurance. A categorization based pricing scheme is developed, where end-to-end bandwidth services are classified based on the provider's efforts in delivering the services. A nonlinear pricing based model is constructed that interacts with network management infrastructure, responds to customer demand and captures the MOP's contractual relationships with Internet Service Provider (ISP) networks used for creating the MOP's services.
APA, Harvard, Vancouver, ISO, and other styles
4

Gaikwad, Ms Sayali, and Dr R. R. Dube. "Enhancing Email Security - End to End Encryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 1026–28. http://dx.doi.org/10.22214/ijraset.2024.59921.

Full text
Abstract:
Abstract: Nowadays, most of people and organizations use the e-mail for different needs to exchange information between users. E-mail application is an important network application. It is significant when business1, health and educational communities use it for exchange of critical information such as business information, health patient record and so on. over the Internet or internal networks, It allows data and messages to be transferred easily between senders and receivers allowing messages to be received, responded to, stored, forwarded and broadcast among recipients. These extensive capabilities have caused the email to be widely adopted as the official communications method for many organizations. Also common for personal use, electronic mail is available through a diverse number of compatible software clients, and also via web-browser. An existing enterprise email implementation second service model adds security processing. The service provider is responsible for monitoring all threats using email as a channel , and for providing an email user interface (UI) In the enterprise augmentation model, an existing on-premise email deployment is augmented by additional cloud-based services and functionalist. This paper explores identity federation and data loss prevention and describing best practices for evaluating, developing, installing and using cloud-based email security services.1.1Intended Audience Email security services are viewed from two perspectives: the providers of these services and the consumers or purchasers of email security services. key service features is needed for both sides to be aware of and plan for and how these features are used to tackle threats to email security.
APA, Harvard, Vancouver, ISO, and other styles
5

Calvert, Kenneth L., James Griffioen, and Su Wen. "Lightweight network support for scalable end-to-end services." ACM SIGCOMM Computer Communication Review 32, no. 4 (October 2002): 265–78. http://dx.doi.org/10.1145/964725.633051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Asthana, Abhaya, Eric J. Bauer, Meenakshi Sharma, and Xuemei Zhang. "End-to-end availability considerations for services over IMS." Bell Labs Technical Journal 11, no. 3 (November 8, 2006): 199–210. http://dx.doi.org/10.1002/bltj.20189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cancela, Héctor, Pablo Rodríguez-Bocca, and Bruno Tuffin. "End-to-end availability-dependent pricing of network services." Annals of Operations Research 157, no. 1 (September 13, 2007): 61–71. http://dx.doi.org/10.1007/s10479-007-0254-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abdullah, Wisam Dawood, Ali Abdullah Ali, and Layth Rafea Hazim. "Analysis of End to End Internet Traffic in Education's Networks: A New Study." Webology 19, no. 1 (January 20, 2022): 3392–409. http://dx.doi.org/10.14704/web/v19i1/web19223.

Full text
Abstract:
Network Traffic Monitoring and Analysis (NTMA) is the main element to network management, especially to correctly operate large-scale networks such as the Internet on which modern academic organizations heavily depend. Their traffic use increases significantly because students, staff members, and research labs use them to search information. It is necessary to analyze, measure, and classify this Internet traffic according to the need of different stakeholders such as Internet Service Providers and network administrators. Moreover, bandwidth congestions frequently occur, causing user dissatisfaction. This study tries to find different characterizations such as data over hosts, countries, cities, companies, top-level domains, and servers. In addition, this is a new study to find out different patterns and levels of analysis from the device to its international requests. Our findings show that the highest traffic use is on Mondays and Wednesdays. Web server and DNS server drop in response to fault tolerance. Social networks consume most of the bandwidth, such as 42% Facebook followed by 22% WhatsApp in peak hours. The second most accessed sites are search engines. Google is the most used one. About 59% of the host cities are outside Iraq, in particular USA and the UK. In Amara and Baghdad cities, the requested sites are 51% and 49% overseas. About 40% of the traffic is provided by EarthLink Ltd. Communication Internet services (Iraq), 14% EdgeCast. 12% level3, 9% Facebook, 7% Google, Akamai-as and Microsoft-corp-msn-as-block. This study gives guidelines for network administrators to improve their performance and bandwidth at the educational networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Chengzhi Li and E. W. Knightly. "Coordinated multihop scheduling: a framework for end-to-end services." IEEE/ACM Transactions on Networking 10, no. 6 (December 2002): 776–89. http://dx.doi.org/10.1109/tnet.2002.805024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fortuna, C., and M. Mohorcic. "Dynamic composition of services for end-to-end information transport." IEEE Wireless Communications 16, no. 4 (August 2009): 56–62. http://dx.doi.org/10.1109/mwc.2009.5281256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ben Said, Najah, and Ioana Cristescu. "End-to-end information flow security for web services orchestration." Science of Computer Programming 187 (February 2020): 102376. http://dx.doi.org/10.1016/j.scico.2019.102376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Elbiaze, H., and O. Cherkaoui. "Signalling end-to-end optical services over multi-domain networks." Optical Switching and Networking 4, no. 1 (February 2007): 58–74. http://dx.doi.org/10.1016/j.osn.2006.10.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhao, Jian, Hossam Hassanein, Jieyi Wu, and Guanqun Gu. "End-to-end QoS routing framework for differentiated services networks." Computer Communications 26, no. 6 (April 2003): 566–78. http://dx.doi.org/10.1016/s0140-3664(02)00144-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wu-Chang Feng, D. D. Kandlur, D. Saha, and K. G. Shin. "Maintaining end-to-end throughput in a differentiated-services Internet." IEEE/ACM Transactions on Networking 7, no. 5 (1999): 685–97. http://dx.doi.org/10.1109/90.803383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Scheffler, Sarah, and Jonathan Mayer. "SoK: Content Moderation for End-to-End Encryption." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (April 2023): 403–29. http://dx.doi.org/10.56553/popets-2023-0060.

Full text
Abstract:
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy create new content moderation challenges for online services, because services can no longer directly access plaintext content. While ongoing public policy debates about E2EE and content moderation in the United States and European Union emphasize child sexual abuse material and misinformation in messaging and storage, we identify and synthesize a wealth of scholarship that goes far beyond those topics. We bridge literature that is diverse in both content moderation subject matter, such as malware, spam, hate speech, terrorist content, and enterprise policy compliance, as well as intended deployments, including not only privacy-preserving content moderation for messaging, email, and cloud storage, but also private introspection of encrypted web traffic by middleboxes. In this work, we systematize the study of content moderation in E2EE settings. We set out a process pipeline for content moderation, drawing on a broad interdisciplinary literature that is not specific to E2EE. We examine cryptography and policy design choices at all stages of this pipeline, and we suggest areas of future research to fill gaps in literature and better understand possible paths forward.
APA, Harvard, Vancouver, ISO, and other styles
16

Yan, Guofeng, Yuxing Peng, Shuhong Chen, and Pengfei You. "QoS Evaluation of End-to-End Services in Virtualized Computing Environments." International Journal of Web Services Research 12, no. 1 (January 2015): 27–44. http://dx.doi.org/10.4018/ijwsr.2015010103.

Full text
Abstract:
Quality of service (QoS) optimization for end-to-end (e2e) services always depends on performance analysis in cloud-based service delivery industry. However, performance analysis of e2e services becomes difficult as the scale and complexity of virtualized computing environments increase. In this paper, the authors present a novel hierarchical stochastic approach to evaluate the QoS of e2e virtualized cloud services using Quasi-Birth Death structures, where jobs arrive according to a stochastic process and request virtual machines (VMs), which are specified in terms of resources, i.e., VM-configuration. To reduce the complexity of performance evaluation, the overall virtualized cloud services are partitioned into three sub-hierarchies. The authors analyze each individual sub-hierarchy using stochastic queueing approach. Thus, the key performance metrics of e2e cloud service QoS, such as acceptance probability and e2e response delay incurred on user requests, are obtained.
APA, Harvard, Vancouver, ISO, and other styles
17

Stoewer, Heinz. "End-to-End Systems Engineering: The Key to Successful Products and Services." INSIGHT 2, no. 1 (March 1999): 5–9. http://dx.doi.org/10.1002/inst.1999215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Virdis, Antonio, Giovanni Nardini, Giovanni Stea, and Dario Sabella. "End-to-End Performance Evaluation of MEC Deployments in 5G Scenarios." Journal of Sensor and Actuator Networks 9, no. 4 (December 11, 2020): 57. http://dx.doi.org/10.3390/jsan9040057.

Full text
Abstract:
Multi-access edge computing (MEC) promises to deliver localized computing power and storage. Coupled with low-latency 5G radio access, this enables the creation of high added-value services for mobile users, such as in-vehicle infotainment or remote driving. The performance of these services as well as their scalability will however depend on how MEC will be deployed in 5G systems. This paper evaluates different MEC deployment options, coherent with the respective 5G migration phases, using an accurate and comprehensive end-to-end (E2E) system simulation model (exploiting Simu5G for radio access and Intel CoFluent for core network and MEC), taking into account user-related metrics, such as response time or MEC latency. Our results show that 4G radio access is going to be a bottleneck, preventing MEC services from scaling up. On the other hand, the introduction of 5G will allow a considerable higher penetration of MEC services.
APA, Harvard, Vancouver, ISO, and other styles
19

Lashgari, Maryam, Lena Wosinska, and Paolo Monti. "End-to-End Provisioning of Latency and Availability Constrained 5G Services." IEEE Communications Letters 25, no. 6 (June 2021): 1857–61. http://dx.doi.org/10.1109/lcomm.2021.3063262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Agarwal, Vikas, Girish Chafle, Koustuv Dasgupta, Neeran Karnik, Arun Kumar, Sumit Mittal, and Biplav Srivastava. "Synthy: A system for end to end composition of web services." Journal of Web Semantics 3, no. 4 (December 2005): 311–39. http://dx.doi.org/10.1016/j.websem.2005.09.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gaivoronski, Alexei A., Per-Jonny Nesse, Olav-Norvald Østerbo, and Håkon Lønsethagen. "Risk-balanced dimensioning and pricing of End-to-End differentiated services." European Journal of Operational Research 254, no. 2 (October 2016): 644–55. http://dx.doi.org/10.1016/j.ejor.2016.04.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hansen, H. "The end-to-end perspective on MMS interoperability [multimedia messaging services]." Communications Engineer 1, no. 2 (April 1, 2003): 9–12. http://dx.doi.org/10.1049/ce:20030202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Famaey, Jeroen, Steven Latré, Tim Wauters, and Filip De Turck. "End-to-End Resource Management for Federated Delivery of Multimedia Services." Journal of Network and Systems Management 22, no. 3 (September 28, 2013): 396–433. http://dx.doi.org/10.1007/s10922-013-9288-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Moubayed, Abdallah, Abdallah Shami, and Anwer Al-Dulaimi. "On End-to-End Intelligent Automation of 6G Networks." Future Internet 14, no. 6 (May 29, 2022): 165. http://dx.doi.org/10.3390/fi14060165.

Full text
Abstract:
The digital transformation of businesses and services is currently in full force, opening the world to a new set of unique challenges and opportunities. In this context, 6G promises to be the set of technologies, architectures, and paradigms that will promote the digital transformation and enable growth and sustainability by offering the means to interact and control the digital and virtual worlds that are decoupled from their physical location. One of the main challenges facing 6G networks is “end-to-end network automation”. This is because such networks have to deal with more complex infrastructure and a diverse set of heterogeneous services and fragmented use cases. Accordingly, this paper aims at envisioning the role of different enabling technologies towards end-to-end intelligent automated 6G networks. To this end, this paper first reviews the literature focusing on the orchestration and automation of next-generation networks by discussing in detail the challenges facing efficient and fully automated 6G networks. This includes automating both the operational and functional elements for 6G networks. Additionally, this paper defines some of the key technologies that will play a vital role in addressing the research gaps and tackling the aforementioned challenges. More specifically, it outlines how advanced data-driven paradigms such as reinforcement learning and federated learning can be incorporated into 6G networks for more dynamic, efficient, effective, and intelligent network automation and orchestration.
APA, Harvard, Vancouver, ISO, and other styles
25

Molisz, Wojciech, and Jacek Rak. "End-to-end service survivability under attacks on networks." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2006): 19–26. http://dx.doi.org/10.26636/jtit.2006.3.383.

Full text
Abstract:
Network survivability is a capability of a networked system to provide its services despite failures or attacks. Attacks, e.g., due to acts of war, being potentially damaging events, were basically considered in the historical definitions of a survivability phenomenon. The meaning of the term: ”network survivability” evolved in the last decade. Recently, attacks replayed the important role again. Their nature, however, including intrusions, probes, denials of service, differs from the old one. Survivability is strongly related to other fields of study. In particular, quality of service depends on network survivability. We investigate these dependencies in scale-free networks. Many networks are scale-free, i.e., their node degree distribution follows the power law. Nodes of the highest degrees, called centers, are highly vulnerable to attacks. Elimination of these nodes seriously degrades the overall performance of network services. In this paper we propose a model, which, based on traffic parameters of a demand, like delay or bit rate, allows to establish the survivable and attack proof end-to-end connections. The key idea of this model is that for the significant traffic, it establishes paths, which omit centers. The important connections become more resistant to attacks. We show that in the best case, obtained for the highest class of service, the number of broken connections is reduced even by factor 3. Example results are compared to those for the standard distance metrics. Our model is applicable to many network architectures and many classes of service.
APA, Harvard, Vancouver, ISO, and other styles
26

Bai, Bing, Yushun Fan, Wei Tan, Jia Zhang, Keman Huang, and Jing Bi. "End-to-End Web Service Recommendations by Extending Collaborative Topic Regression." International Journal of Web Services Research 15, no. 1 (January 2018): 89–112. http://dx.doi.org/10.4018/ijwsr.2018010105.

Full text
Abstract:
Mashup has emerged as a lightweight way to compose multiple web services and create value-added compositions. Facing the large amount of services, effective service recommendations are in great need. Service recommendations for mashup queries suffers from a mashup-side cold-start problem, and traditional approaches usually overcome this by first applying topic models to mine topic proportions of services and mashup queries, and then using them for subsequent recommendations. This solution overlooks the fact that usage record can provide a feedback for text extraction. Besides, traditional approaches usually treat all the usage records equally, and overlook the fact that the service usage pattern is evolving. In this article, the authors overcome these issues and propose an end-to-end service recommendation algorithm by extending collaborative topic regression. The result is a generative process to model the whole procedure of service selection; thus, usage can guide the mining of text content, and meanwhile, they give time-aware confidence levels to different historical usages. Experiments on the real-world ProgrammableWeb data set show that the proposed algorithm gains an improvement of 6.3% in terms of mAP@50 and 10.6% in terms of Recall@50 compared with the state-of-the-art methods.
APA, Harvard, Vancouver, ISO, and other styles
27

Ahmed, Faraz, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, and He Yan. "Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services." ACM SIGMETRICS Performance Evaluation Review 43, no. 1 (June 24, 2015): 459–60. http://dx.doi.org/10.1145/2796314.2745892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Yu, Tao, Yue Zhang, and Kwei-Jay Lin. "Efficient algorithms for Web services selection with end-to-end QoS constraints." ACM Transactions on the Web 1, no. 1 (May 2007): 6. http://dx.doi.org/10.1145/1232722.1232728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Xu, Bin, Sen Luo, and Yixin Yan. "Efficient composition of semantic web services with end-to-end QoS optimization." Tsinghua Science and Technology 15, no. 6 (December 2010): 678–86. http://dx.doi.org/10.1016/s1007-0214(10)70115-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Yu, Tao, and Kwei-Jay Lin. "Service selection algorithms for Web services with end-to-end QoS constraints." Information Systems and e-Business Management 3, no. 2 (July 2005): 103–26. http://dx.doi.org/10.1007/s10257-005-0052-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Goel, Utkarsh, Mike P. Wittie, Kimberly C. Claffy, and Andrew Le. "Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services." IEEE Communications Surveys & Tutorials 18, no. 1 (2016): 105–23. http://dx.doi.org/10.1109/comst.2015.2485979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Isazadeh, Ayaz, and Mohsen Heydarian. "Traffic distribution for end-to-end QoS routing with multicast multichannel services." Journal of Supercomputing 52, no. 1 (February 21, 2009): 47–81. http://dx.doi.org/10.1007/s11227-008-0263-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Marich, Michael J., Benjamin L. Schooley, and Thomas A. Horan. "A Normative Enterprise Architecture for Guiding End-to-End Emergency Response Decision Support." International Journal of Information Systems for Crisis Response and Management 2, no. 2 (April 2010): 1–18. http://dx.doi.org/10.4018/jiscrm.2010040101.

Full text
Abstract:
This article examines the underlying architecture guiding the development and use of enterprise decision support systems that maintain the delivery of time critical public services. A normative architecture, developed from comparative cases involving San Mateo County and Mayo Clinic Emergency Medical Services systems, provides a collection of characteristics meant to guide an emergency response system toward a high level of performance and enable optimal decision-making. At a national symposium, academics and practitioners involved in promoting effective emergency response information systems provided validation for the architecture and next steps for enhancing emergency response information systems. Normative architecture characteristics and expert perspectives from the symposium are integrated into a framework that offers an enterprise approach for delivering time-critical emergency response services. This article provides recommendations for navigating toward a more incremental approach in developing enterprise-oriented emergency information services and examines future trends involving the application of normative architectural concepts to real-world emergency medical settings.
APA, Harvard, Vancouver, ISO, and other styles
34

Alloghani, Mohamed. "Predicting End-User Adoption to Mobile Services." Journal of Data Analysis and Information Processing 06, no. 02 (2018): 15–29. http://dx.doi.org/10.4236/jdaip.2018.62002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kim, So-Yeon, Sun-Woo Yun, Eun-Young Lee, So-Hyeon Bae, and Il-Gu Lee. "Fast Packet Inspection for End-To-End Encryption." Electronics 9, no. 11 (November 17, 2020): 1937. http://dx.doi.org/10.3390/electronics9111937.

Full text
Abstract:
With the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet, has become easily accessible. At the same time, eavesdropping, data interception, personal data leakage, and distribution of malware during the information transfer process have become easier than ever. Recently, to respond to such threats, end-to-end encryption (E2EE) technology has been widely implemented in commercial network services as a popular information security system. However, with the use of E2EE technology, it is difficult to check whether an encrypted packet is malicious in an information security system. A number of studies have been previously conducted on deep packet inspection (DPI) through trustable information security systems. However, the E2EE is not maintained when conducting a DPI, which requires a long inspection time. Thus, in this study, a fast packet inspection (FPI) and its frame structure for quickly detecting known malware patterns while maintaining E2EE are proposed. Based on the simulation results, the proposed FPI allows for inspecting packets approximately 14.4 and 5.3 times faster, respectively, when the inspection coverage is 20% and 100%, as compared with a DPI method under a simulation environment in which the payload length is set to 640 bytes.
APA, Harvard, Vancouver, ISO, and other styles
36

Chin, Tommy, Mohamed Rahouti, and Kaiqi Xiong. "Applying software-defined networking to minimize the end-to-end delay of network services." ACM SIGAPP Applied Computing Review 18, no. 1 (April 30, 2018): 30–40. http://dx.doi.org/10.1145/3212069.3212072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Aleksiev, Oleh, Volodymyr Aleksiev, Olha Matsyi, and Michael Matsyi. "End-to-end design of mechatronic industrial and automotive computer systems." 49, no. 49 (March 29, 2021): 6–15. http://dx.doi.org/10.26565/2304-6201-2021-49-01.

Full text
Abstract:
Due to the constant information develop-ment of society and its industrial component, new transport systems and machines have reached a high level of information excellence. Accordingly, there is a new contradiction between the rapid development of tools and methods of informatization of complex objects and systems, the development of transport telematics (internal for cars and other vehicles and external internal transport control systems) and the heterogeneous nature of existing subsystems and components of the transport complex. Of Ukraine. The problem of resolving this contradiction will allow at all levels of transport infrastructure to improve services to residents of cities and regions, improve transport processes, avoid existing negative consequences: traffic disruptions, unsatisfactory condition of roads, irrational use of funds for re-pair, operation and equipment of highways. This will help improve traffic safety, improve the quality of transport services, ensure people's comfort and save cargo. The goal of the study is to create software and hardware for virtual management, its intellectualization based on the use of virtual logis-tics of transportation processes, providing road users, tools of virtual management, a kind of virtual logistics. The purpose of this article is to study the problem of expressing and proving new rules and concepts for providing knowledge and skills to people who want to work in the IT field of transport applications. The sequence of acquiring knowledge and skills of people who have improved their personal professional level in road transport is determined. The idea of computer science as system engineering of successful consecutive creation of computer equip-ment and software of complex systems by combining their computer and software engineering in the field of motor transport is offered. The scope of use of the obtained results is road transport road organizations of Ukraine, residents of cities and regions as individuals or legal entities of users of transport services.
APA, Harvard, Vancouver, ISO, and other styles
38

Chimakurthi, VNS Surendra. "Cloud Security - A Semantic Approach in End to End Security Compliance." Engineering International 5, no. 2 (December 31, 2017): 97–106. http://dx.doi.org/10.18034/ei.v5i2.586.

Full text
Abstract:
Many firms are seeing the benefits of moving to the cloud. For the sake of their customers' data, cloud service providers are required by law to maintain the highest levels of data security and privacy. Most cloud service providers employ a patchwork of security and privacy safeguards while industry standards are being created. The upshot is that customers of cloud services are unsure whether or not the security protections supplied by these services are enough to meet their specific security and compliance requirements. In this article, we have discussed the many threats cloud users face and emphasized the compliance frameworks and security processes that should be in place to minimize the risk. To categorize cloud security measures, risks, and compliance requirements, we developed an ontology. We needed to design software to identify the high-level policy rules that must be applied in response to each danger as part of this initiative. Additionally, the program provides a list of cloud service providers that now satisfy specific security requirements. Even if they aren't familiar with the underlying technology, cloud users may utilize our system to build up their security policy and identify compatible providers.
APA, Harvard, Vancouver, ISO, and other styles
39

Boštjančič Rakas, Slavica, and Mirjana Stojanović. "A Centralized Model for Establishing End-to-End Communication Services via Management Agents." PROMET - Traffic&Transportation 31, no. 3 (June 7, 2019): 245–55. http://dx.doi.org/10.7307/ptt.v31i3.2980.

Full text
Abstract:
This paper presents a centralized approach for establishing end-to-end communication services via management agents. The main proposal is the modular architecture of the third-party based Service Establishment Agent (SEA). The SEA manages inter-provider service negotiation process with per-domain management agents through an appropriate signaling agent. It also receives and interprets end-toend service requests, selects inter-domain paths, performs mapping of service classes among domains on the path, and evaluates conformance of the offered service level with the required one. It allows implementation of different algorithms for the aforementioned functions as well as their selection and combination according to the predefined management policies. Simulation results show that the proposed model significantly outperforms the distributed model in terms of service negotiation times. In the prototype development process, a policy-based solution for mapping of service classes was implemented. The performance evaluation shows that processing requirements for handling multiple service requests are modest, while benefit of the SEA approach is the lack of need to build long-term consensus among providers about technical choices for achieving network interconnection. The SEA architecture is completely independent of the quality of service mechanisms available in particular domains.
APA, Harvard, Vancouver, ISO, and other styles
40

Millnert, Victor, Enrico Bini, and Johan Eker. "Cost minimization of network services with buffer and end-to-end deadline constraints." ACM SIGBED Review 14, no. 4 (January 4, 2018): 39–45. http://dx.doi.org/10.1145/3177803.3177810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Crowcroft, Jon, and Philippe Oechslin. "Differentiated end-to-end Internet services using a weighted proportional fair sharing TCP." ACM SIGCOMM Computer Communication Review 28, no. 3 (July 1998): 53–69. http://dx.doi.org/10.1145/293927.293930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Skorin-Kapov, L., D. Huljenic, D. Mikic, and D. Vilendecic. "Analysis of end-to-end QoS for networked virtual reality services in UMTS." IEEE Communications Magazine 42, no. 4 (April 2004): 49–55. http://dx.doi.org/10.1109/mcom.2004.1284929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hellerstein, Joseph L., and Burkhard Stiller. "Management of Integrated End-to-End Communications and Services—Report on NOMS 2006." Journal of Network and Systems Management 14, no. 3 (July 21, 2006): 477–81. http://dx.doi.org/10.1007/s10922-006-9032-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Wu, Peng, Junmin Wu, Wei Wang, Jiming Yao, and Yue Yu. "End-to-End Delay Performance Analysis for Delay-Sensitive Services in Polymorphic Networks." Journal of Physics: Conference Series 2774, no. 1 (July 1, 2024): 012023. http://dx.doi.org/10.1088/1742-6596/2774/1/012023.

Full text
Abstract:
Abstract In the polymorphic network for smart grid, the end-to-end latency performance analysis of delay-sensitive power control services such as differential protection and distributed power regulation is a crucial component in the intelligent control and management of power network slicing. In this paper, based on a detailed analysis of end-to-end delay factors of power control service, the distributed power regulation pilot project is taken as a typical application scenario of power control service, and the end-to-end delay of such service is theoretically derived and analyzed in detail by using network calculus theory. Numerical verification shows that the end-to-end delay performance of the power control service is positively correlated with the number of concurrent data streams and the number of subsystems and negatively correlated with the system service rate. Compared with the burst degree of the current data streams, the burst degree of other data streams significantly impacts the end-to-end delay calculation results of the current data flow.
APA, Harvard, Vancouver, ISO, and other styles
45

Johndoss, Merline, and T. Pramananda Perumal. "Deployment of Carrier supporting Carrier (CsC) Network Providing MPLS-VPN Services to End Customers." Indian Journal Of Science And Technology 16, no. 46 (December 22, 2023): 4445–55. http://dx.doi.org/10.17485/ijst/v16i46.2456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Eiting, Andreas, Günter Schatz, Terence Dürauer, and Heiko Spitzer. "‘End-to-end’ strategic asset management process to support asset services at the community level." CIRED - Open Access Proceedings Journal 2017, no. 1 (October 1, 2017): 2719–22. http://dx.doi.org/10.1049/oap-cired.2017.0869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Barabanova, Tat'yana, Evgeniy Degaev, and Evgeniya Grosheva. "ALTERNATIVE PERSONAL PROTECTIVE EQUIPMENT USING END-TO-END TECHNOLOGIES TO ENSURE SAFE WORKING CONDITIONS." Construction and Architecture 11, no. 4 (October 5, 2023): 40. http://dx.doi.org/10.29039/2308-0191-2023-11-4-40-40.

Full text
Abstract:
Currently, to improve and effectively use personal protective equipment during repair and construction work, end-to-end technologies are being introduced everywhere. Despite the high cost, there are a certain number of advantages in terms of the possible technical parameters of using end-to-end technologies. They are applicable, including in construction and housing and communal services
APA, Harvard, Vancouver, ISO, and other styles
48

Kang, Jeongyoon, Jieon Kim, Jungheum Park, and Seokhee Lee. "Forensic Approaches for End-to-End Encryption Cloud Storage Services: MEGA as a Case Study." Arab Journal of Forensic Sciences and Forensic Medicine 6, Special Issue (June 18, 2024): 117–36. http://dx.doi.org/10.26735/tmpv1812.

Full text
Abstract:
The advancement of cloud-based data storage technology allows users to conveniently access and manage files using endpoint devices without being constrained by their environment. While cloud storage services have improved the efficiency of performing our daily tasks, they have also become a medium for criminals to distribute illegal materials. Services that support end-to-end encryption (E2EE), cannot decrypt data even when it's stored on their servers, attracting users who require high security. There are some existing studies related to cloud-based services using E2EE, but they only deal with local artifacts, which makes it difficult to analyze when local devices cannot be found or when there are changes to local artifacts. This study identifies the mechanisms by which MEGA, a cloud-based file hosting service, operates to obtain user authentication, explore metadata, and collect files while applying end-to-end encryption. Furthermore, we propose a forensic investigation methodology to explore various metadata and selectively acquire cloud resources relevant to an incident through an understanding of E2EE algorithms. Also, we apply MEGA to the existing framework to suggest improving the framework that encompasses E2EE cloud-based services. The findings of this study serve as a valuable reference for dealing with cloud-based services with E2EE from the perspectives of computer security and digital forensics.
APA, Harvard, Vancouver, ISO, and other styles
49

Qiu, Li, Xuyan Song, Jun Yang, and Baojiang Cui. "Bee: End to End Distributed Tracing System for Source Code Security Analysis." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 209–18. http://dx.doi.org/10.54097/hset.v1i.463.

Full text
Abstract:
As distributed services become more and more complex, their security is becoming an increasingly important issue. End-to-end tracing has emerged recently as a valuable tool to improve the dependability of distributed systems, by performing dynamic verification and diagnosing correctness and performance problems. However, several shortcomings of the end-to-end tracing system`s security analysis are uncovered during the development. First of all, the density of probes is not enough, and also the descriptions of different operations are not consistent, which does not allow effective access to intermediate information of end-to-end services and brings about data analysis problems. Second, the implantation of probes is complex and many operations are highly coupled with the monitored program. The third point is that the sampling algorithm in the existing end-to-end distributed tracing system is too simple to effectively improve the performance of the high-density probe tracing system used for security analysis. In this paper, we address the above problem and successfully build Bee. To demonstrate the Bee's helpfulness for those problems in Security analysis, we test its performance and prove some privacy leaks vulnerabilities and access control vulnerabilities of OpenStack with Bee. The experimental results show that with the high-density probes. Bee can capture the detailed request process and quickly locate abnormal operations.
APA, Harvard, Vancouver, ISO, and other styles
50

Ranaivoson, Heritiana, and Simon Delaere. "MEDIA INNOVATION AND BUSINESS MODELS: THE CASE OF END-TO-END IMMERSIVE AUDIOVISUAL SERVICES." IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET 16, no. 1 (September 12, 2018): 42–55. http://dx.doi.org/10.33965/ijwi_2018161103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography