Academic literature on the topic 'Gestion de Network Slice'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Gestion de Network Slice.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Gestion de Network Slice"
Chevalier, Marc, Rafaël De Sa, Laura Cardoit, and Muriel Thoby-Brisson. "Mechanisms Underlying Adaptation of Respiratory Network Activity to Modulatory Stimuli in the Mouse Embryo." Neural Plasticity 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/3905257.
Full textWong, Stan, Bin Han, and Hans D. Schotten. "5G Network Slice Isolation." Network 2, no. 1 (March 8, 2022): 153–67. http://dx.doi.org/10.3390/network2010011.
Full textPing, Jing. "Network Resource Model for 5G Networkand Network Slice." Journal of ICT Standardization 7, no. 2 (2019): 127–40. http://dx.doi.org/10.13052/jicts2245-800x.7234.
Full textPing, Jing. "Network Resource Model for 5G Networkand Network Slice." Journal of ICT Standardization 7, no. 2 (2019): 127–40. http://dx.doi.org/10.13052/jicts2245-800x.724.
Full textKulmar, Marika, Ivo Müürsepp, and Muhammad Mahtab Alam. "Heuristic Radio Access Network Subslicing with User Clustering and Bandwidth Subpartitioning." Sensors 23, no. 10 (May 10, 2023): 4613. http://dx.doi.org/10.3390/s23104613.
Full textLi, Xin, Chengcheng Guo, Jun Xu, Lav Gupta, and Raj Jain. "Towards Efficiently Provisioning 5G Core Network Slice Based on Resource and Topology Attributes." Applied Sciences 9, no. 20 (October 16, 2019): 4361. http://dx.doi.org/10.3390/app9204361.
Full textWalia, Jaspreet Singh, Heikki Hämmäinen, Kalevi Kilkki, Hannu Flinck, Seppo Yrjölä, and Marja Matinmikko-Blue. "A Virtualization Infrastructure Cost Model for 5G Network Slice Provisioning in a Smart Factory." Journal of Sensor and Actuator Networks 10, no. 3 (July 28, 2021): 51. http://dx.doi.org/10.3390/jsan10030051.
Full textZhou, Jinhe, Wenjun Zhao, and Shuo Chen. "Dynamic Network Slice Scaling Assisted by Prediction in 5G Network." IEEE Access 8 (2020): 133700–133712. http://dx.doi.org/10.1109/access.2020.3010623.
Full textWalia, Jaspreet Singh, Heikki Hämmäinen, Kalevi Kilkki, Hannu Flinck, Marja Matinmikko-Blue, and Seppo Yrjölä. "Network Slice Provisioning Approaches for Industry Verticals." International Journal of Business Data Communications and Networking 17, no. 2 (July 2021): 1–15. http://dx.doi.org/10.4018/ijbdcn.286700.
Full textWang, Gang, Gang Feng, Shuang Qin, Ruihan Wen, and Sanshan Sun. "Optimizing Network Slice Dimensioning via Resource Pricing." IEEE Access 7 (2019): 30331–43. http://dx.doi.org/10.1109/access.2019.2902432.
Full textDissertations / Theses on the topic "Gestion de Network Slice"
Ben, Saad Sabra. "Security architectures for network slice management for 5G and beyond." Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS023V2.pdf.
Full textNetwork slicing architecture, enabled by new technologies such as Network Functions Virtualization (NFV) and Software-Defined Networking (SDN), is one of the main pillars of Fifth-generation and Beyond (B5G). In B5G settings, the number of coexisting slices with varying degrees of complexity and very diverse lifespans, resource requirements, and performance targets is expected to explode. This creates significant challenges towards zero-touch slice management and orchestration, including security, fault management, and trust. In addition, network slicing opens the business market to new stakeholders, namely the vertical or tenant, the network slice provider, and the infrastructure provider. In this context, there is a need to ensure not only a secure interaction between these actors, but also that each actor delivers the expected service to meet the network slice requirements. Therefore, new trust architectures should be designed, which are able to identify/detect the new forms of slicing-related attacks in real-time, while securely and automatically managing Service Level Agreements (SLA) among the involved actors. In this thesis, we devise new security architectures tailored to network slicing ready networks (B5G), heavily relying on blockchain and Artificial Intelligence (AI) to enable secure and trust network slicing management
Boutigny, François. "Multidomain virtual network embedding under security-oriented requirements applied to 5G network slices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAS002.
Full text5G brings a new concept called network slicing. This technology makes it possible to generalize the business model of MVNOs to companies in need to operate a network, without it being their core business. Each slice is an end-to-end, dedicated and customized virtual network, over a shared infrastructure; this infrastructure itself is provided by the interconnection of infrastructure providers: we refer to this case as a multi-domain infrastructure.The objective of this thesis is to study the allocation of these slices in such a multi-domain infrastructure. The problem is known as Virtual Network Embedding (VNE). It is an NP-hard problem. Practically, the VNE problem looks for which physical resources to associate a set of virtual elements. Physical resources describe what they can offer. Virtual elements describe what they require. Linking these offers and requests is the key to solve the VNE problem.In this thesis, we focused on modeling and implementing security requirements. Indeed, we expect that the initiators of the slices belong to areas distant from telecommunications. In the same way that they know little about this field, we can expect that their needs, especially in security, are novel in the slice context.This thesis presents an algorithm able to handling various requirements, according to an extensible model based on a Satisfiability Modulo Theories (SMT) solver. Compared to Integer Linear Programming (ILP), more common in the VNE field, this formulation allows to express the satisfaction constraints in a more transparent way, and allows to audit all the constraints.Moreover, being aware that infrastructure providers are reluctant to disclose information about their physical resources, we propose a resolution limiting this disclosure. This system has been successfully implemented and tested during the Ph.D
Purvis, Liston Keith. "Models of Single Neurons and Network Dynamics in the Medullary Transverse Slice." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14125.
Full textBehrad, Shanay. "Slice specific authentication and access control for 5G." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS007.
Full textThe fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements, e.g. concerning quality of service or security. Using the virtualization technologies and the concept of network slicing, the 5G network operators will be able to provide specific connectivity capabilities in order to support these various use cases. Each network slice can be dedicated to a 3rd party (i.e., any business actor that is not the network operator), and be designed to fit its requirements.However, although network slices can be designed by enabling or disabling certain network functions, the Authentication and Access Control (AAC) mechanisms remain the same for all slices, with tightly coupled network components.This thesis proposes 5G-SSAAC (5G Slice-Specific AAC), as an initial step to introduce a more loosely coupled design into the whole 5G network architecture. 5G-SSAAC enables 5G networks to provide various AAC mechanisms to the 3rd parties according to their security requirements. To assess this innovative mechanism, the thesis analyses the consequences of using the 5G-SSAAC on the security of the whole 5G system. The feasibility of the 5G-SSAAC is also presented with the implementation of a fully virtualized mobile network through an OAI (Open Air Interface) based testbed. This work finally evaluates the impact of 5G-SSAAC mechanism on the network load considering the anticipated number of AAC signalling messages compared to the existing AAC mechanisms in cellular networks
Max, Lindblad. "The impact of parsing methods on recurrent neural networks applied to event-based vehicular signal data." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-223966.
Full textDenna avhandling jämför två olika tillvägagångssätt vad gäller parsningen av händelsebaserad signaldata från fordon för att producera indata till en förutsägelsemodell i form av ett neuronnät, nämligen händelseparsning, där datan förblir ojämnt fördelad över tidsdomänen, och skivparsning, där datan är omgjord till att istället vara jämnt fördelad över tidsdomänen. Det dataset som används för dessa experiment är ett antal signalloggar från fordon som kommer från Scania. Jämförelser mellan parsningsmetoderna gjordes genom att först träna ett lång korttidsminne (LSTM) återkommande neuronnät (RNN) på vardera av de skapade dataseten för att sedan mäta utmatningsfelet och resurskostnader för varje modell efter att de validerats på en delad uppsättning av valideringsdata. Resultaten från dessa tester visar tydligt på att skivparsning står sig väl mot händelseparsning.
Rayrole, Martin. "Gestion automatisée de systèmes complexes." Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066722.
Full textTechnological advances in recent decades have led to a considerable increase in performance of computer hardware and data networks. Many industrial sectors have benefited from these advances in using computers and networks to increase productivity and offer value-added services. These changes have led to interconnect a large number of equipments and functions, and thus to build increasingly complex systems. The management of these systems has become, therefore, extremely difficult without the support of computer tools. This paper describes the research that I have done for twenty years on the automated management systems in three industrial sectors: telecommunications, data centers, and avionics. Each of these sectors has specific characteristics that influence the management of the corresponding systems, but there are nevertheless many similarities on the principles of management. The paper presents the results of different studies on system configuration, supervision, security, and safety. A comparative analysis identifies management areas that are the most advanced in each of the industrial sectors. From there, several technology transfers are proposed to help improve the management systems in each sector, taking advantage of advances in other areas
Lecuire, Vincent. "Gestion des systèmes et réseaux industriels." Nancy 1, 1994. http://www.theses.fr/1994NAN10051.
Full textValdemarin, Stefano. "Network development in international organizations : the case of ONLYLYON." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSE3059.
Full textIn a rapidly changing context, organizations need to develop new strategies to seize global business opportunities. Based on the Uppsala evolution model and the business network view, this doctoral dissertation focuses on the development of networks in international organizations. Following the micro-foundations theory, we consider two levels of analysis to better understand the interplay between the organization and its members in the network evolution process. We developed a single case study conducted at ONLYLYON, an organization aiming to promote the city of Lyon worldwide through a large network of individuals called the “ambassador network”. Using an intervention research approach, we co-constructed with the organization a research project which aims to develop the ambassador network. The empirical study is based on 36 interviews (five exploratory and 31 semi-structured interviews), 103 participant observations performed over a period of 30 months and secondary data. Our findings highlight the role played by individuals in developing networks for organizations. They emphasize the importance of creating a network allowing organizations and individuals to develop opportunities. We propose an evolution path to (1) create the ONLYLYON ambassador network in Italy and (2) develop an international “network of networks”. Both paths include a set of managerial propositions and are based on three steps: (1) establishing, (2) structuring or restructuring, and (3) growing the network. We also elaborate a model to study the interaction between an organization and its members in the process of network development. This intervention research can help ONLYLYON in developing its international networks by implementing strategic actions. It also contributes to the development of the Uppsala evolution model and the debate on the importance of micro-foundations in management research
Hertzog, Patrick. "Gestion des réseaux locaux industriels : application au réseau." Nancy 1, 1994. http://www.theses.fr/1994NAN10047.
Full textShaun, Ferdous Jahan. "Multi-Parameters Miniature Sensor for Water Network Management." Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1138/document.
Full textWater is a vital element for every living being on the earth. Like many other dwindling natural resources, clean water faces a strong pressure because of human activity and the rapid growth of global population. The situation is so critical that clean water has been identified as one of the seventeenth sustainable development goals of the United Nations. Under these conditions, a sustainable management of water resources is necessary. For this purpose, a smart solution for water networks monitoring can be very helpful. However, commercially available solutions lack compactness, self-powering capabilities cost competitiveness, necessary to enable the large rollout over water networks. The present thesis takes place in the framework of a European research project, PROTEUS, which addresses these different problems by designing and fabricating a multi-parameter sensor chip (MPSC) for water resources monitoring. The MPSC enables the measurement of 9 physical and chemical parameters, is reconfigurable and self-powered. The present thesis addresses more precisely physical sensors, their design, optimization and co-integration on the MPSC. The developed device exhibits state of the art or larger performances with regard to its redundancy, turn-down ratio and power consumption. The present manuscript is split into two main parts: Part-I and Part-II. Part-I deals with non-thermal aspects of the MPSC, the pressure and conductivity sensor for instance, as well as the fabrication process of the whole device (Chapter 1 and 2). The background of environmental monitoring is presented in Chapter 1 along with the State of Art review. Chapter 2 describes fabrication methods of the MPSC. Preliminary characterization results of non-thermal sensors are also reported in this chapter. Chapter 3 and 4, included in Part-II, deal with thermal sensors (temperature and flow-rate). Chapter 3 describes the many possible uses of electric resistances for sensing applications. Finally, in chapter four, we focus on flowrate sensors before concluding and making a few suggestions for future works
Books on the topic "Gestion de Network Slice"
Bruce, McKern, ed. Managing the global network corporation. London: Routledge, 2003.
Find full textCanada. Office of the Comptroller General. Evaluation and Audit Branch., ed. Treasury Board Manual : General management =: Manuel du Conseil du Tresor : Gestion generale. [Ottawa]: Evaluation and Audit Branch, Office of the Comptroller General = Direction de l'évaluation et de la vérification, Bureau du contrôleur général, 1992.
Find full textPartners, Certification, and CIW -- Certified Internet Web Professional, eds. Network technology associate: Student guide. Tempe, AZ: Certification Partners, 2014.
Find full textComputer network time synchronization. Boca Raton, FL: Taylor&Francis, 2005.
Find full textT, Leondes Cornelius, ed. Database and data communication network systems: Techniques and applications. Amsterdam: Academic Press, 2002.
Find full textLa red cultural del Banco de la República: Una red de redes = Banco de la República's cultural network: a network of networks. Bogotá: Banco de la República, 2020.
Find full textComputer network time synchronization: The Network Time Protocol on Earth and in space. 2nd ed. Boca Raton: Taylor & Francis, 2011.
Find full text1946-2017, Ouellet Roch, and Parent Régis, eds. Méthodes d'optimisation pour la gestion. Montréal: G. Morin, 2009.
Find full textCloud design fundamentals: Cloud design and security for network engineers. Charleston, SC: [CreateSpace], 2015.
Find full textAssociation des archivistes du Québec. Congrès. La gestion des archives à l'ère électronique et des réseaux: Actes du congrès. Sillery, Québec: L'Association, 1998.
Find full textBook chapters on the topic "Gestion de Network Slice"
Suárez, Luis, David Espes, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin, and Philippe Le Parc. "Managing Secure Inter-slice Communication in 5G Network Slice Chains." In Data and Applications Security and Privacy XXXIV, 24–41. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49669-2_2.
Full textMuhizi, Samuel, Abdelhamied A. Ateya, Ammar Muthanna, Ruslan Kirichek, and Andrey Koucheryavy. "A Novel Slice-Oriented Network Model." In Developments in Language Theory, 421–31. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99447-5_36.
Full textPolyakov, Nikita, Natalia Yarkina, Konstantin Samouylov, and Yevgeni Koucheryavy. "Network Slice Degradation Probability as a Metric for Defining Slice Performance Isolation." In Lecture Notes in Computer Science, 481–92. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97777-1_40.
Full textMin, Jie, Ying Wang, and Peng Yu. "An Intent-Based Network Slice Orchestration Method." In Advances in Intelligent Systems and Computing, 1447–55. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8462-6_165.
Full textChen, Bofeng, Jiaqi Fan, Ping Zhao, and Zhihua Wei. "Slice Sequential Network: A Lightweight Unsupervised Point Cloud Completion Network." In Pattern Recognition and Computer Vision, 103–14. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88007-1_9.
Full textChen, Chin Hsuan, Fuchun Joseph Lin, Chia-Hsuan Yu, and Wan-Hsun Hu. "Exploration of Network Slice Charging in 5G Networks." In Advances in Intelligent Systems and Computing, 482–501. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63092-8_33.
Full textHoang, Van-Thanh, and Kang-Hyun Jo. "Slice Operator for Efficient Convolutional Neural Network Architecture." In Intelligent Information and Database Systems, 163–73. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42058-1_14.
Full textLv, Peng, Zhao Liu, Yinjiang Long, Peijun Chen, and Xiang Wang. "An Algorithm of Computing Task Offloading in Vehicular Network Based on Network Slice." In Lecture Notes in Electrical Engineering, 515–21. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8411-4_70.
Full textOu, Qinghai, Jigao Song, Yanru Wang, Zhiqiang Wang, Yang Yang, Diya Ran, and Lei Feng. "A Method of Dynamic Resource Adjustment for 5G Network Slice." In Proceedings of the 9th International Conference on Computer Engineering and Networks, 929–36. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3753-0_91.
Full textLi, Zeju, Yuanyuan Wang, and Jinhua Yu. "Reconstruction of Thin-Slice Medical Images Using Generative Adversarial Network." In Machine Learning in Medical Imaging, 325–33. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67389-9_38.
Full textConference papers on the topic "Gestion de Network Slice"
Zhu, Hongmei, Jie Liu, Yilin Lin, and Qingyang Wang. "MEC Application Slice and Its collaboration with 5G network slice." In 2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB). IEEE, 2022. http://dx.doi.org/10.1109/bmsb55706.2022.9828795.
Full textWang, Yang. "Network virtualization over SLICE networks." In 2015 36th IEEE Sarnoff Symposium. IEEE, 2015. http://dx.doi.org/10.1109/sarnof.2015.7324659.
Full textWang, Ke, Haitao Du, and Li Su. "Digital Twin Network based Network Slice Security Provision." In 2022 IEEE 2nd International Conference on Digital Twins and Parallel Intelligence (DTPI). IEEE, 2022. http://dx.doi.org/10.1109/dtpi55838.2022.9998964.
Full textChahbar, Mohammed, Gladys Diaz, Abdulhalim Dandoush, Christophe Cerin, and Kamal Ghoumid. "NESSMA: Network Slice Subnet Management Framework." In 2019 10th International Conference on Networks of the Future (NoF). IEEE, 2019. http://dx.doi.org/10.1109/nof47743.2019.9015010.
Full textChoi, Young-il, and Noik Park. "Slice architecture for 5G core network." In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2017. http://dx.doi.org/10.1109/icufn.2017.7993854.
Full textMarquez, Cristina, Marco Gramaglia, Marco Fiore, Albert Banchs, and Xavier Costa-Perez. "How Should I Slice My Network?" In MobiCom '18: The 24th Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3241539.3241567.
Full textChen, Ke, Ying Wang, Peng Yu, and Naling Li. "Security-Oriented Network Slice Backup Method." In 2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2021. http://dx.doi.org/10.23919/apnoms52696.2021.9562592.
Full textPapadakis-Vlachopapadopoulos, Konstantinos, Ioannis Dimolitsas, Dimitrios Dechouniotis, Eirini Eleni Tsiropoulou, Ioanna Roussaki, and Symeon Papavassiliou. "Blockchain-Based Slice Orchestration for Enabling Cross-Slice Communication at the Network Edge." In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2020. http://dx.doi.org/10.1109/qrs-c51114.2020.00033.
Full textZheng, Hongyuan, Jiangang Lu, Zhan Shi, Yuhang Chen, and Keqin Zhang. "Dynamic Network Fault Diagnosis Algorithm under 5G Network Slice." In 2021 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2021. http://dx.doi.org/10.1109/iwcmc51323.2021.9498983.
Full textLaghrissi, Abdelquoddouss, Tarik Taleb, and Miloud Bagaa. "Canonical domains for optimal network slice planning." In 2018 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2018. http://dx.doi.org/10.1109/wcnc.2018.8377336.
Full textReports on the topic "Gestion de Network Slice"
Recensement des Priorités de Recherche sur L’extrémisme Violent en Afrique du Nord et au Sahel 2018. RESOLVE Network, January 2021. http://dx.doi.org/10.37805/rp2021.2.lcb.
Full text