Journal articles on the topic 'End-to-end services'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'End-to-end services.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Immaneni, Jayaram. "End-to-End MLOps in Financial Services: Resilient Machine Learning with Kubernetes." International Journal of Science and Research (IJSR) 11, no. 10 (October 27, 2022): 1459–67. https://doi.org/10.21275/sr221013093711.
Full textAldington, D. J., H. J. McQuay, and R. A. Moore. "End-to-end military pain management." Philosophical Transactions of the Royal Society B: Biological Sciences 366, no. 1562 (January 27, 2011): 268–75. http://dx.doi.org/10.1098/rstb.2010.0214.
Full textGUPTA, APARNA, and LINGYI ZHANG. "PRICING FOR END-TO-END ASSURED BANDWIDTH SERVICES." International Journal of Information Technology & Decision Making 07, no. 02 (June 2008): 361–89. http://dx.doi.org/10.1142/s021962200800296x.
Full textGaikwad, Ms Sayali, and Dr R. R. Dube. "Enhancing Email Security - End to End Encryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 1026–28. http://dx.doi.org/10.22214/ijraset.2024.59921.
Full textCalvert, Kenneth L., James Griffioen, and Su Wen. "Lightweight network support for scalable end-to-end services." ACM SIGCOMM Computer Communication Review 32, no. 4 (October 2002): 265–78. http://dx.doi.org/10.1145/964725.633051.
Full textAsthana, Abhaya, Eric J. Bauer, Meenakshi Sharma, and Xuemei Zhang. "End-to-end availability considerations for services over IMS." Bell Labs Technical Journal 11, no. 3 (November 8, 2006): 199–210. http://dx.doi.org/10.1002/bltj.20189.
Full textCancela, Héctor, Pablo Rodríguez-Bocca, and Bruno Tuffin. "End-to-end availability-dependent pricing of network services." Annals of Operations Research 157, no. 1 (September 13, 2007): 61–71. http://dx.doi.org/10.1007/s10479-007-0254-5.
Full textAbdullah, Wisam Dawood, Ali Abdullah Ali, and Layth Rafea Hazim. "Analysis of End to End Internet Traffic in Education's Networks: A New Study." Webology 19, no. 1 (January 20, 2022): 3392–409. http://dx.doi.org/10.14704/web/v19i1/web19223.
Full textChengzhi Li and E. W. Knightly. "Coordinated multihop scheduling: a framework for end-to-end services." IEEE/ACM Transactions on Networking 10, no. 6 (December 2002): 776–89. http://dx.doi.org/10.1109/tnet.2002.805024.
Full textFortuna, C., and M. Mohorcic. "Dynamic composition of services for end-to-end information transport." IEEE Wireless Communications 16, no. 4 (August 2009): 56–62. http://dx.doi.org/10.1109/mwc.2009.5281256.
Full textBen Said, Najah, and Ioana Cristescu. "End-to-end information flow security for web services orchestration." Science of Computer Programming 187 (February 2020): 102376. http://dx.doi.org/10.1016/j.scico.2019.102376.
Full textElbiaze, H., and O. Cherkaoui. "Signalling end-to-end optical services over multi-domain networks." Optical Switching and Networking 4, no. 1 (February 2007): 58–74. http://dx.doi.org/10.1016/j.osn.2006.10.004.
Full textZhao, Jian, Hossam Hassanein, Jieyi Wu, and Guanqun Gu. "End-to-end QoS routing framework for differentiated services networks." Computer Communications 26, no. 6 (April 2003): 566–78. http://dx.doi.org/10.1016/s0140-3664(02)00144-5.
Full textWu-Chang Feng, D. D. Kandlur, D. Saha, and K. G. Shin. "Maintaining end-to-end throughput in a differentiated-services Internet." IEEE/ACM Transactions on Networking 7, no. 5 (1999): 685–97. http://dx.doi.org/10.1109/90.803383.
Full textScheffler, Sarah, and Jonathan Mayer. "SoK: Content Moderation for End-to-End Encryption." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (April 2023): 403–29. http://dx.doi.org/10.56553/popets-2023-0060.
Full textYan, Guofeng, Yuxing Peng, Shuhong Chen, and Pengfei You. "QoS Evaluation of End-to-End Services in Virtualized Computing Environments." International Journal of Web Services Research 12, no. 1 (January 2015): 27–44. http://dx.doi.org/10.4018/ijwsr.2015010103.
Full textStoewer, Heinz. "End-to-End Systems Engineering: The Key to Successful Products and Services." INSIGHT 2, no. 1 (March 1999): 5–9. http://dx.doi.org/10.1002/inst.1999215.
Full textVirdis, Antonio, Giovanni Nardini, Giovanni Stea, and Dario Sabella. "End-to-End Performance Evaluation of MEC Deployments in 5G Scenarios." Journal of Sensor and Actuator Networks 9, no. 4 (December 11, 2020): 57. http://dx.doi.org/10.3390/jsan9040057.
Full textLashgari, Maryam, Lena Wosinska, and Paolo Monti. "End-to-End Provisioning of Latency and Availability Constrained 5G Services." IEEE Communications Letters 25, no. 6 (June 2021): 1857–61. http://dx.doi.org/10.1109/lcomm.2021.3063262.
Full textAgarwal, Vikas, Girish Chafle, Koustuv Dasgupta, Neeran Karnik, Arun Kumar, Sumit Mittal, and Biplav Srivastava. "Synthy: A system for end to end composition of web services." Journal of Web Semantics 3, no. 4 (December 2005): 311–39. http://dx.doi.org/10.1016/j.websem.2005.09.002.
Full textGaivoronski, Alexei A., Per-Jonny Nesse, Olav-Norvald Østerbo, and Håkon Lønsethagen. "Risk-balanced dimensioning and pricing of End-to-End differentiated services." European Journal of Operational Research 254, no. 2 (October 2016): 644–55. http://dx.doi.org/10.1016/j.ejor.2016.04.019.
Full textHansen, H. "The end-to-end perspective on MMS interoperability [multimedia messaging services]." Communications Engineer 1, no. 2 (April 1, 2003): 9–12. http://dx.doi.org/10.1049/ce:20030202.
Full textFamaey, Jeroen, Steven Latré, Tim Wauters, and Filip De Turck. "End-to-End Resource Management for Federated Delivery of Multimedia Services." Journal of Network and Systems Management 22, no. 3 (September 28, 2013): 396–433. http://dx.doi.org/10.1007/s10922-013-9288-y.
Full textMoubayed, Abdallah, Abdallah Shami, and Anwer Al-Dulaimi. "On End-to-End Intelligent Automation of 6G Networks." Future Internet 14, no. 6 (May 29, 2022): 165. http://dx.doi.org/10.3390/fi14060165.
Full textMolisz, Wojciech, and Jacek Rak. "End-to-end service survivability under attacks on networks." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2006): 19–26. http://dx.doi.org/10.26636/jtit.2006.3.383.
Full textBai, Bing, Yushun Fan, Wei Tan, Jia Zhang, Keman Huang, and Jing Bi. "End-to-End Web Service Recommendations by Extending Collaborative Topic Regression." International Journal of Web Services Research 15, no. 1 (January 2018): 89–112. http://dx.doi.org/10.4018/ijwsr.2018010105.
Full textAhmed, Faraz, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, and He Yan. "Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services." ACM SIGMETRICS Performance Evaluation Review 43, no. 1 (June 24, 2015): 459–60. http://dx.doi.org/10.1145/2796314.2745892.
Full textYu, Tao, Yue Zhang, and Kwei-Jay Lin. "Efficient algorithms for Web services selection with end-to-end QoS constraints." ACM Transactions on the Web 1, no. 1 (May 2007): 6. http://dx.doi.org/10.1145/1232722.1232728.
Full textXu, Bin, Sen Luo, and Yixin Yan. "Efficient composition of semantic web services with end-to-end QoS optimization." Tsinghua Science and Technology 15, no. 6 (December 2010): 678–86. http://dx.doi.org/10.1016/s1007-0214(10)70115-2.
Full textYu, Tao, and Kwei-Jay Lin. "Service selection algorithms for Web services with end-to-end QoS constraints." Information Systems and e-Business Management 3, no. 2 (July 2005): 103–26. http://dx.doi.org/10.1007/s10257-005-0052-z.
Full textGoel, Utkarsh, Mike P. Wittie, Kimberly C. Claffy, and Andrew Le. "Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services." IEEE Communications Surveys & Tutorials 18, no. 1 (2016): 105–23. http://dx.doi.org/10.1109/comst.2015.2485979.
Full textIsazadeh, Ayaz, and Mohsen Heydarian. "Traffic distribution for end-to-end QoS routing with multicast multichannel services." Journal of Supercomputing 52, no. 1 (February 21, 2009): 47–81. http://dx.doi.org/10.1007/s11227-008-0263-4.
Full textMarich, Michael J., Benjamin L. Schooley, and Thomas A. Horan. "A Normative Enterprise Architecture for Guiding End-to-End Emergency Response Decision Support." International Journal of Information Systems for Crisis Response and Management 2, no. 2 (April 2010): 1–18. http://dx.doi.org/10.4018/jiscrm.2010040101.
Full textAlloghani, Mohamed. "Predicting End-User Adoption to Mobile Services." Journal of Data Analysis and Information Processing 06, no. 02 (2018): 15–29. http://dx.doi.org/10.4236/jdaip.2018.62002.
Full textKim, So-Yeon, Sun-Woo Yun, Eun-Young Lee, So-Hyeon Bae, and Il-Gu Lee. "Fast Packet Inspection for End-To-End Encryption." Electronics 9, no. 11 (November 17, 2020): 1937. http://dx.doi.org/10.3390/electronics9111937.
Full textChin, Tommy, Mohamed Rahouti, and Kaiqi Xiong. "Applying software-defined networking to minimize the end-to-end delay of network services." ACM SIGAPP Applied Computing Review 18, no. 1 (April 30, 2018): 30–40. http://dx.doi.org/10.1145/3212069.3212072.
Full textAleksiev, Oleh, Volodymyr Aleksiev, Olha Matsyi, and Michael Matsyi. "End-to-end design of mechatronic industrial and automotive computer systems." 49, no. 49 (March 29, 2021): 6–15. http://dx.doi.org/10.26565/2304-6201-2021-49-01.
Full textChimakurthi, VNS Surendra. "Cloud Security - A Semantic Approach in End to End Security Compliance." Engineering International 5, no. 2 (December 31, 2017): 97–106. http://dx.doi.org/10.18034/ei.v5i2.586.
Full textBoštjančič Rakas, Slavica, and Mirjana Stojanović. "A Centralized Model for Establishing End-to-End Communication Services via Management Agents." PROMET - Traffic&Transportation 31, no. 3 (June 7, 2019): 245–55. http://dx.doi.org/10.7307/ptt.v31i3.2980.
Full textMillnert, Victor, Enrico Bini, and Johan Eker. "Cost minimization of network services with buffer and end-to-end deadline constraints." ACM SIGBED Review 14, no. 4 (January 4, 2018): 39–45. http://dx.doi.org/10.1145/3177803.3177810.
Full textCrowcroft, Jon, and Philippe Oechslin. "Differentiated end-to-end Internet services using a weighted proportional fair sharing TCP." ACM SIGCOMM Computer Communication Review 28, no. 3 (July 1998): 53–69. http://dx.doi.org/10.1145/293927.293930.
Full textSkorin-Kapov, L., D. Huljenic, D. Mikic, and D. Vilendecic. "Analysis of end-to-end QoS for networked virtual reality services in UMTS." IEEE Communications Magazine 42, no. 4 (April 2004): 49–55. http://dx.doi.org/10.1109/mcom.2004.1284929.
Full textHellerstein, Joseph L., and Burkhard Stiller. "Management of Integrated End-to-End Communications and Services—Report on NOMS 2006." Journal of Network and Systems Management 14, no. 3 (July 21, 2006): 477–81. http://dx.doi.org/10.1007/s10922-006-9032-y.
Full textWu, Peng, Junmin Wu, Wei Wang, Jiming Yao, and Yue Yu. "End-to-End Delay Performance Analysis for Delay-Sensitive Services in Polymorphic Networks." Journal of Physics: Conference Series 2774, no. 1 (July 1, 2024): 012023. http://dx.doi.org/10.1088/1742-6596/2774/1/012023.
Full textJohndoss, Merline, and T. Pramananda Perumal. "Deployment of Carrier supporting Carrier (CsC) Network Providing MPLS-VPN Services to End Customers." Indian Journal Of Science And Technology 16, no. 46 (December 22, 2023): 4445–55. http://dx.doi.org/10.17485/ijst/v16i46.2456.
Full textEiting, Andreas, Günter Schatz, Terence Dürauer, and Heiko Spitzer. "‘End-to-end’ strategic asset management process to support asset services at the community level." CIRED - Open Access Proceedings Journal 2017, no. 1 (October 1, 2017): 2719–22. http://dx.doi.org/10.1049/oap-cired.2017.0869.
Full textBarabanova, Tat'yana, Evgeniy Degaev, and Evgeniya Grosheva. "ALTERNATIVE PERSONAL PROTECTIVE EQUIPMENT USING END-TO-END TECHNOLOGIES TO ENSURE SAFE WORKING CONDITIONS." Construction and Architecture 11, no. 4 (October 5, 2023): 40. http://dx.doi.org/10.29039/2308-0191-2023-11-4-40-40.
Full textKang, Jeongyoon, Jieon Kim, Jungheum Park, and Seokhee Lee. "Forensic Approaches for End-to-End Encryption Cloud Storage Services: MEGA as a Case Study." Arab Journal of Forensic Sciences and Forensic Medicine 6, Special Issue (June 18, 2024): 117–36. http://dx.doi.org/10.26735/tmpv1812.
Full textQiu, Li, Xuyan Song, Jun Yang, and Baojiang Cui. "Bee: End to End Distributed Tracing System for Source Code Security Analysis." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 209–18. http://dx.doi.org/10.54097/hset.v1i.463.
Full textRanaivoson, Heritiana, and Simon Delaere. "MEDIA INNOVATION AND BUSINESS MODELS: THE CASE OF END-TO-END IMMERSIVE AUDIOVISUAL SERVICES." IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET 16, no. 1 (September 12, 2018): 42–55. http://dx.doi.org/10.33965/ijwi_2018161103.
Full text