Academic literature on the topic 'Network services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Network services"

1

Tarik Taleb, Chafika Benza�d, Miguel Bordallo Lopez, Konstantin Mikhaylov, Sasu Tarkoma, Panos Kostakos, Nurul Huda Mahmood, et al. "6G System architecture: A service of services vision." ITU Journal on Future and Evolving Technologies 3, no. 3 (December 8, 2022): 710–43. http://dx.doi.org/10.52953/dgko1067.

Full text
Abstract:
The architectures of mobile networks have seen an unprecedented techno-economic transformation, fusing the telcommunications world within the cloud world, adding the spices of Software Engineering to the overall system design, and ultimately yielding the concept of Telco Cloud. This has brought significant benefits in terms of reducing expenditure and operational costs, flexibility in deployment, and a faster time to market. The key enablers are network function virtualization, software-defined networking, and edge/cloud computing. Artificial intelligence is also kicking in this arena. When all these technologies are well integrated, the creation and life-cycle management of fully programmable, flexible, service-tailored, and automated end-to-end network slices/services become possible. This will support diverse 5G and beyond 5G services, spanning from tactile IoT to pervasive robotics and immersive services. This paper introduces an unprecedented and disruptive vision for 6G that shifts the perception of future mobile networks from the old-fashioned concept of "network of networks" towards a new vision of "service of services." The paper then introduces the functional model of the envisioned system architecture, along with its components. It then provides a high-level description of the logical architecture.
APA, Harvard, Vancouver, ISO, and other styles
2

Twum, Frimpong, Kwadwo Asante, and Michael Asante. "Implementation of Network Services on IPV6 Networks." International Journal of Computer Applications 142, no. 5 (May 17, 2016): 11–16. http://dx.doi.org/10.5120/ijca2016909788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Planka, Daniela. "Network directory services." Library Hi Tech 8, no. 4 (April 1, 1990): 93–103. http://dx.doi.org/10.1108/eb047811.

Full text
Abstract:
The Directory (CCITT X.500/ISO 9594) is an international standard, which was ratified jointly by ISO and CCITT in December 1988. The standard describes the structure and services of a global, logically centralized but physically distributed, electronic network directory that will support the evolving telecommunications environment. Directory pilot projects are underway in both North America and Europe and commercial implementations of the Directory standard are becoming increasingly available. As the bibliographic community becomes more dependent on the use of networks, it is essential that library professionals understand the capabilities of this powerful new standard.
APA, Harvard, Vancouver, ISO, and other styles
4

Podlesny, Maxim, and Sergey Gorinsky. "Rd network services." ACM SIGCOMM Computer Communication Review 38, no. 4 (October 2008): 255–66. http://dx.doi.org/10.1145/1402946.1402988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

House, Robert G., and Lynn A. DeLozier. "Network services-outsourcing." International Journal of Network Management 1, no. 1 (September 1991): 39–43. http://dx.doi.org/10.1002/nem.4560010106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Reese, Laura A., and Xiaomeng Li. "Change in Service Provision Networks: The Case of Animal Welfare Services." State and Local Government Review 53, no. 1 (March 2021): 14–42. http://dx.doi.org/10.1177/0160323x211009285.

Full text
Abstract:
This research focuses on change within informal service provision networks, specifically examining the impact that changes within a key organization can have on the larger network. Employing a before and after survey design with a treatment at the midpoint and participant observation, it asks: What is the impact of a major change within one organization on the larger external network? What is the nature of the organizational ties? and, How do political factors exogenous to the network impact the network evolution process? The findings suggest that internal change within a focal actor can have ripple effects throughout the network increasing density. Public service provision at the local level can be enhanced through an increase in partnerships between the public and nonprofit sectors. However, network evolution can be limited by the larger political environment and lack of a coordinating role on the part of local government.
APA, Harvard, Vancouver, ISO, and other styles
7

Ustok, Refik Fatih, Ugur Acar, Selcuk Keskin, David Breitgand, Avi Weit, Petros Drakoulis, Alexandros Doumanoglou, et al. "Service Development Kit for Media-Type Virtualized Network Services in 5G Networks." IEEE Communications Magazine 58, no. 7 (July 2020): 51–57. http://dx.doi.org/10.1109/mcom.001.1900613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goto, Hirokazu. "Video service and network. 2. Image communication services in local area networks." Journal of the Institute of Television Engineers of Japan 40, no. 9 (1986): 827–35. http://dx.doi.org/10.3169/itej1978.40.827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Viswanathan, Harish, Tom Van Leeuwen, Werner Liekens, Bruno Van Bogaert, and Willem Acke. "Network and service architecture for emerging services based on home sensor networks." Bell Labs Technical Journal 14, no. 2 (August 24, 2009): 235–49. http://dx.doi.org/10.1002/bltj.20382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pozner, Adam, and Bob Grove. "Service Development Network for mental health employment services." A Life in the Day 4, no. 2 (May 2000): 28. http://dx.doi.org/10.1108/13666282200000016.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Network services"

1

Yang, Weilai. "Pricing Network Resources for Differentiated Service Networks." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5227.

Full text
Abstract:
We developed a price-based resource allocation scheme for Differentiated Service (DiffServ) data networks. The DiffServ framework was proposed to provide multiple QoS classes over IP networks. Since the provider supports multiple service classes, we need a differentiated pricing scheme, as supposed to the flat-rate scheme employed by the Internet service providers of today. Charging efficiently is a big issue. The utility of a client correlates to the amount of bandwidth allocated. One difficulty we face is that determining the appropriate amount of bandwidth to provision and allocate is problematic due to different time scales, multiple QoS classes and the unpredictable nature of users. To approach this problem, we designed a pricing strategy for Admission Control and bandwidth assignment. Despite the variety of existing pricing strategies, the common theme is that the appropriate pricing policy rewards users for behaving in ways to improve the overall utilization and performance of the network. Among existing schemes, we chose auction because it is scalable, and efficiently and fairly shares resources. Our pricing model takes the system's availability and each customer's requirements as inputs and outputs the set of clients who are admitted into the network and their allocated resource. Each client proposes a desired bandwidth and a price that they are willing to pay for it. The service provider collects this information and produces parameters for each class of service they provide. This information is used to decide which customers to admit. We proposed an optimal solution to the problem of maximizing the provider's revenue for the special case where there is only one bottleneck link in the network. Then for the generalized network, we resort to a simple but effective heuristic method. We validate both the optimal solution and the heuristic algorithm with simulations driven by a real traffic scenario. Finally, we allow customers to bid on the duration for which the service is needed. Then we study the performance of those heuristic algorithms in this new setting and propose possible improvements.
APA, Harvard, Vancouver, ISO, and other styles
2

Tang, Chen. "Forecasting Service Metrics for Network Services." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284505.

Full text
Abstract:
As the size and complexity of the internet increased dramatically in recent years,the burden of network service management also became heavier. The need foran intelligent way for data analysis and forecasting becomes urgent. The wideimplementation of machine learning and data analysis methods provides a newway to analyze large amounts of data.In this project, I study and evaluate data forecasting methods using machinelearning techniques and time series analysis methods on data collected fromthe KTH testbed. Comparing different methods with respect to accuracy andcomputing overhead I propose the best method for data forecasting for differentscenarios.The results show that machine learning techniques using regression can achievebetter performance with higher accuracy and smaller computing overhead. Timeseries data analysis methods have relatively lower accuracy, and the computingoverhead is much higher than machine learning techniques on the datasetsevaluated in this project.
Eftersom storleken och komplexiteten på internet har ökat dramatiskt under de senaste åren så har belastningen av nätverkshantering också blivit tyngre. Behovet av ett intelligent sätt för dataanalys och prognos blir brådskande. Den breda implementeringen av maskininlärningsmetoder och dataanalysmetoder ger ett nytt sätt att analysera stora mängder data.I detta projekt studerar och utvärderar jag dataprognosmetoder med hjälp av maskininlärningstekniker och analyser av tidsserier som samlats in från KTHtestbädden. Baserat på jämförelse av olika metoder med avseende på noggrannhet och beräkningskostnader, så föreslår jag föreslår den bästa metoden för dataprognoser för olika scenarier.Resultaten visar att maskininlärningstekniker som använder regression kan uppnå bättre prestanda med högre noggrannhet och mindre datoromkostnader. Metoderför dataanalys av tidsserier har relativt lägre noggrannhet, och beräkningsomkostnaderna är mycket högre än maskininlärningstekniker på de datauppsättningar som utvärderatsi detta projekt.
APA, Harvard, Vancouver, ISO, and other styles
3

Ruf, Lukas [Verfasser]. "Network Services on Service Extensible Routers / Lukas Ruf." Aachen : Shaker, 2006. http://d-nb.info/1170530850/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shrinivas, V. Prasanna. "Pricing Multicast Network Services." Thesis, Indian Institute of Science, 2001. http://hdl.handle.net/2005/270.

Full text
Abstract:
Multicast has long been considered an attractive service for the Internet for the provision of multiparty applications. For over a decade now multicast has been a proposed IETF standard. Though there is a strong industry push towards deploying multicast, there has been little multicast deployment by commercial Internet Service Providers (ISPs) and more importantly most end-users still lack multicast capabilities. Depending on the underlying network infrastructure, the ISP has several options of implementing his multicast capabilities. With significantly faster and more sophisticated protocols being designed and prototyped, it is expected that a whole new gamut of applications that are delay sensitive will come into being. However, the incentives to resolve the conflicting interests of the ISPs and the end-users have to be provided for successful implementation of these protocols. Thus we arrive at the following economic questions: What is the strategy that will enable the ISP recover his costs ? How can the end-user be made aware of the cost of his actions ? Naturally, the strategies of the ISP and the end-user depend on each other and form an economic game. The research problems addressed in this thesis are: A pricing model that is independent of the underlying transmission protocols is prefered. We have proposed such a pricing scheme for multicast independent of the underlying protocols, by introducing the concept of pricing points* These pricing points provide a range of prices that the users can expect during a particular time period and tune their usage accordingly. Our pricing scheme makes both the sender and receiver accountable. Our scheme also provides for catering to heterogeneous users and gives incentive for differential pricing. We explore a number of formulations of resource allocation problems arising in communication networks as optimization models. Optimization-based methods were only employed for unicast congestion control. We have extended this method for single rate multicast. We have also devised an optimization-based approach for multicast congestion control that finds an allocation rate to maximize the social welfare. Finally we also show that the session-splitting problem can also be cast as an optimization problem. The commonly used "max-min" fairness criteria suffers from serious limitations like discriminating sessions that traverse large number of links and poor network utilization. We provide an allocation scheme that reduces discrimination towards multicast sessions that traverse many links and also improves network utilization.
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Hua. "Advanced intelligent network services." Thesis, University of Ottawa (Canada), 1996. http://hdl.handle.net/10393/9648.

Full text
Abstract:
The telecommunications industry is undergoing a fundamental revolution with the introduction of intelligent networks. In this thesis, we first give an overview of the intelligent network, which includes the review of the motivation, technology, evolution, standards, components and the open issues of the intelligent network. The emphasis of the thesis is put on the intelligent network service creation. Three AIN (Advanced Intelligent Network) services, namely, the call by name, the automatic telephone directory service and the information query service, are designed and implemented in the AIN Service Creation Environment (SCE). An AIN multimedia fax service which is a novel application of the AIN technology is proposed. With a gateway between the telephone network and the Internet, we use AIN to provide automatic addressing, dynamic routing and flexible selecting of document type for the multimedia fax service. The idea and the technique used in this AIN multimedia fax service bring up a new AIN service opportunity which allows telephone subscribers to access abundant Internet resources. The performance of this service is evaluated based on the simulation model of priority queuing system.
APA, Harvard, Vancouver, ISO, and other styles
6

Norangshol, Roy Sindre. "Open network topology services." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23100.

Full text
Abstract:
This master project examines whether there is an existing model fordescribing network topologies in abstract and generic manner. I alsolooked for networking protocols for exchanging network topologiesand handling of dynamically creation of circuit connections acrossdomains. I?ve also been working on a prototype for visualization ofnetwork topologies using Network Administration Visualized (NAV)as a data backend, and further to check the possibilities to use thefound topology model in my prototype.My findings shows that there is progress towards creating a stan-dard topology model to describe network topologies in an abstractand generic manner. There is also progress in creating a network ar-chitecture with networking protocols for exchanging network topolo-gies across domains and providing a connection reservation service tohandle creation of dynamically circuit connections. Prototype showsthere is lots of ideas for further works on what to implement in re-gards of the found network topology model and networking systemsthat was found.
APA, Harvard, Vancouver, ISO, and other styles
7

Tham, Kevin Wen Kaye. "Developing security services for network architectures." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16546/.

Full text
Abstract:
In the last 15 years, the adoption of enterprise level data networks had increased dramatically. This is mainly due to reasons, such as better use of IT resources, and even better coordination between departments and business units. These great demands have fuelled the push for better and faster connectivity to and from these networks, and even within the networks. We have moved from the slow 10Mbps to 1Gbps connectivity for end-point connections and moved from copper-based ISDN to fibre-linked connections for enterprise connections to the Internet. We now even include wireless network technologies in the mix, because of the greater convenience it offers. Such rapid progress is accompanied by ramifications, especially if not all aspects of networking technologies are improved linearly. Since the 1960s and 1970s, the only form of security had been along the line of authentication and authorisation. This is because of the widely used mainframes in that era. When the Internet and, ultimately, the wide-spread use of the Internet influxed in the 1980s, network security was born, and it was not until the late 1980s that saw the first Internet Worm that caused damage to information and systems on the Internet. Fast forward to today, and we see that although we have come a long way in terms of connectivity (connect to anywhere, and anytime, from anywhere else), the proposed use of network security and network security methods have not improved very much. Microsoft Windows XP recently switched from using their own authentication method, to the use of Kerberos, which was last revised 10 years ago. This thesis describes the many problems we face in the world of network security today, and proposes several new methods for future implementation, and to a certain extend, modification to current standards to encompass future developments. Discussion will include a proposed overview of what a secure network architecture should include, and this will lead into several aspects that can be improved on. All problems identified in this thesis have proposed solutions, except for one. The critical flaw found in the standard IEEE802.11 wireless technology was discovered during the course of this research. This flaw is explained and covered in great detail, and also, an explanation is given as to why this critical flaw is not fixable.
APA, Harvard, Vancouver, ISO, and other styles
8

Tham, Kevin Wen Kaye. "Developing security services for network architectures." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16546/1/Kevin_Wen_Kaye_Tham_Thesis.pdf.

Full text
Abstract:
In the last 15 years, the adoption of enterprise level data networks had increased dramatically. This is mainly due to reasons, such as better use of IT resources, and even better coordination between departments and business units. These great demands have fuelled the push for better and faster connectivity to and from these networks, and even within the networks. We have moved from the slow 10Mbps to 1Gbps connectivity for end-point connections and moved from copper-based ISDN to fibre-linked connections for enterprise connections to the Internet. We now even include wireless network technologies in the mix, because of the greater convenience it offers. Such rapid progress is accompanied by ramifications, especially if not all aspects of networking technologies are improved linearly. Since the 1960s and 1970s, the only form of security had been along the line of authentication and authorisation. This is because of the widely used mainframes in that era. When the Internet and, ultimately, the wide-spread use of the Internet influxed in the 1980s, network security was born, and it was not until the late 1980s that saw the first Internet Worm that caused damage to information and systems on the Internet. Fast forward to today, and we see that although we have come a long way in terms of connectivity (connect to anywhere, and anytime, from anywhere else), the proposed use of network security and network security methods have not improved very much. Microsoft Windows XP recently switched from using their own authentication method, to the use of Kerberos, which was last revised 10 years ago. This thesis describes the many problems we face in the world of network security today, and proposes several new methods for future implementation, and to a certain extend, modification to current standards to encompass future developments. Discussion will include a proposed overview of what a secure network architecture should include, and this will lead into several aspects that can be improved on. All problems identified in this thesis have proposed solutions, except for one. The critical flaw found in the standard IEEE802.11 wireless technology was discovered during the course of this research. This flaw is explained and covered in great detail, and also, an explanation is given as to why this critical flaw is not fixable.
APA, Harvard, Vancouver, ISO, and other styles
9

Naidoo, Vaughn. "Policy Based Network management of legacy network elements in next generation networks for Voice Services." Thesis, University of the Western Cape, 2002. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5830_1370595582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aktop, Baris. "A framework for maximizing the survivability of network dependent services." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FAktop.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Network services"

1

Karol, Szlichcinski, ed. Financial network services. London: Blenheim Online Publications, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cougias, Dorian J. AppleTalk network services. Boston: AP Professional, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Group, Yankee, ed. Managed network services. Boston, MA (200 Portland St., Boston 02114): The Group, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Communications/Information Systems Planning and Critical Path Planning Service., ed. Financial network services. Boston, MA (89 Broad St., Boston 02110): Yankee Group, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blomeley, Frances. Networks and network services: A user's guide. Hove: Immediate, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Danthine, André, and Christophe Diot, eds. From Multimedia Services to Network Services. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0026614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

The intelligent network: Customizing telecommunication networks and services. Upper Saddle River, N.J: Prentice, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jin, Cheng, Sugih Jamin, Danny Raz, and Yuval Shavitt. Building Scalable Network Services. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4419-8897-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Next-generation network services. Indianapolis, Ind: Cisco, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Andrew, Schmidt, ed. Network layer switched services. New York: Wiley Computer Pub., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Network services"

1

O’Leary, Mike. "Network Services." In Cyber Operations, 311–65. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Basin, David, Patrick Schaller, and Michael Schläpfer. "Network Services." In Applied Information Security, 27–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jin, Cheng, Sugih Jamin, Danny Raz, and Yuval Shavitt. "Network Services." In Building Scalable Network Services, 1–4. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4419-8897-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

O’Leary, Mike. "Network Services." In Cyber Operations, 649–720. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4294-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roussos, George. "Network Services." In Networked RFID, 113–28. London: Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-153-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baclit, Ryan, Chivas Sicam, Peter Membrey, and John Newbigin. "Network Services." In Foundations of CentOS Linux, 227–60. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1965-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gumaste, Ashwin, Csaba A. Szabó, and Imrich Chlamtac. "Backbone Optical Network Design for Community Networks." In Broadband Services, 141–61. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470022515.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kralicek, Eric. "Network Services Architecture." In The Accidental SysAdmin Handbook, 61–87. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1817-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sinha, Sudhi R., and Youngchoon Park. "Building Network Services." In Building an Effective IoT Ecosystem for Your Business, 49–61. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57391-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Oppliger, Rolf, and Philipp J. Stüssi. "Managed Network Services." In Unternehmensweite Kommunikationsnetze, 107–24. Wiesbaden: Vieweg+Teubner Verlag, 1994. http://dx.doi.org/10.1007/978-3-322-84256-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Network services"

1

Oh-ishi, T., T. Iwata, S. Tokumoto, and N. Shimamoto. "Network services using service-composition technology." In 11th International Telecommunications Network Strategy and Planning Symposium. IEEE, 2004. http://dx.doi.org/10.1109/netwks.2004.241058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sugiyama, Kouhei, Hiroyuki Ohsaki, Makoto Imase, Takeshi Yagi, and Junichi Murayama. "NMF: Network Mining Framework Using Topological Structure of Complex Networks." In 2008 IEEE Congress on Services Part II (SERVICES-2). IEEE, 2008. http://dx.doi.org/10.1109/services-2.2008.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nazarzadeoghaz, Navid, Ferhat Khendek, and Maria Toeroe. "Automated Design of Network Services from Network Service Requirements." In 2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN). IEEE, 2020. http://dx.doi.org/10.1109/icin48450.2020.9059324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oyekanlu, Emmanuel, and Kevin Scoles. "Real-Time Distributed Computing at Network Edges for Large Scale Industrial IoT Networks." In 2018 IEEE World Congress on Services (SERVICES). IEEE, 2018. http://dx.doi.org/10.1109/services.2018.00045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Duan, Qiang. "Modeling and Performance Analysis on Network Virtualization for Composite Network-Cloud Service Provisioning." In 2011 IEEE World Congress on Services (SERVICES). IEEE, 2011. http://dx.doi.org/10.1109/services.2011.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Duan, Qiang, and Shangguang Wang. "Network Cloudification Enabling Network - Cloud/Fog Service Unification: State of the Art and Challenges." In 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. http://dx.doi.org/10.1109/services.2019.00046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Hui, Zhiyong Feng, Yang Sui, and Shizhan Chen. "Service network: An infrastructure of web services." In 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2009). IEEE, 2009. http://dx.doi.org/10.1109/icicisys.2009.5358185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barshefsky, Alvin, and Hemi Trickey. "e-Services Architecture." In Networks 2006. 12th International Telecommunications Network Strategy and Planning Symposium. IEEE, 2006. http://dx.doi.org/10.1109/netwks.2006.300402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Licciardi, C. A., and T. Mota. "A service platform for integrated IN-internet services." In Proceedings 2000 IEEE Intelligent Network Workshop. IEEE, 2000. http://dx.doi.org/10.1109/inw.2000.868182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pang, Yue, Danshi Wang, Dongdong Wang, Luyao Guan, Chunyu Zhang, and Min Zhang. "A Space-Air-Ground Integrated Network Assisted Maritime Communication Network Based on Mobile Edge Computing." In 2020 IEEE World Congress on Services (SERVICES). IEEE, 2020. http://dx.doi.org/10.1109/services48979.2020.00060.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Network services"

1

Kille, S., and N. Freed. Network Services Monitoring MIB. RFC Editor, January 1994. http://dx.doi.org/10.17487/rfc1565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Freed, N., and S. Kille. Network Services Monitoring MIB. RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Freed, N., and S. Kille. Network Services Monitoring MIB. RFC Editor, March 2000. http://dx.doi.org/10.17487/rfc2788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sitzler, D., P. Smith, and A. Marine. Building a Network Information Services Infrastructure. RFC Editor, February 1992. http://dx.doi.org/10.17487/rfc1302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Van, J., and A. Spitzer. Basic Network Media Services with SIP. Edited by E. Burger. RFC Editor, December 2005. http://dx.doi.org/10.17487/rfc4240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Haynes, R. A., and L. G. Pierson. Performance modeling of network data services. Office of Scientific and Technical Information (OSTI), January 1997. http://dx.doi.org/10.2172/437719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schilling, Donald L., Tarek Saadawi, and Daniel L. Walk. Transmission Techniques Tactical Switched Network Services. Fort Belvoir, VA: Defense Technical Information Center, June 1992. http://dx.doi.org/10.21236/ada296443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stokesberry, Daniel P., Daniel P. Stokesberry, and Kathleen M. Roberts. Integrated services digital network conformance testing. Gaithersburg, MD: National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.sp.823-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stokesberry, Daniel P., Daniel P. Stokesberry, Leslie Collica, and Kathleen M. Roberts. Integrated services digital network conformance testing. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.823-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bartoletti, A., and N. Tang. Characterizing Network Services through Cluster-Set Variations. Office of Scientific and Technical Information (OSTI), March 2005. http://dx.doi.org/10.2172/15016408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography