Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: End-to-end services.

Artykuły w czasopismach na temat „End-to-end services”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „End-to-end services”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Immaneni, Jayaram. "End-to-End MLOps in Financial Services: Resilient Machine Learning with Kubernetes". International Journal of Science and Research (IJSR) 11, nr 10 (27.10.2022): 1459–67. https://doi.org/10.21275/sr221013093711.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Aldington, D. J., H. J. McQuay i R. A. Moore. "End-to-end military pain management". Philosophical Transactions of the Royal Society B: Biological Sciences 366, nr 1562 (27.01.2011): 268–75. http://dx.doi.org/10.1098/rstb.2010.0214.

Pełny tekst źródła
Streszczenie:
The last three years have seen significant changes in the Defence Medical Services approach to trauma pain management. This article seeks to outline these changes that have occurred at every level of the casualty's journey along the chain of evacuation, from the point of injury to rehabilitation and either continued employment in the Services or to medical discharge. Particular attention is paid to the evidence for the interventions used for both acute pain and chronic pain management. Also highlighted are possible differences in pain management techniques between civilian and military casualties.
Style APA, Harvard, Vancouver, ISO itp.
3

GUPTA, APARNA, i LINGYI ZHANG. "PRICING FOR END-TO-END ASSURED BANDWIDTH SERVICES". International Journal of Information Technology & Decision Making 07, nr 02 (czerwiec 2008): 361–89. http://dx.doi.org/10.1142/s021962200800296x.

Pełny tekst źródła
Streszczenie:
The Internet today mostly offers a simple best-effort mode of service. The capabilities of the Internet will be significantly enhanced if it supports better QoS modes, especially when QoS is provided for end-to-end services. This enhancement requires both technological development and economic mechanisms to support better QoS service modes. In this article, we study a Multi-ISP Overlay Provider's (MOP's) pricing problem for delivering end-to-end services with expected bandwidth assurance. A categorization based pricing scheme is developed, where end-to-end bandwidth services are classified based on the provider's efforts in delivering the services. A nonlinear pricing based model is constructed that interacts with network management infrastructure, responds to customer demand and captures the MOP's contractual relationships with Internet Service Provider (ISP) networks used for creating the MOP's services.
Style APA, Harvard, Vancouver, ISO itp.
4

Gaikwad, Ms Sayali, i Dr R. R. Dube. "Enhancing Email Security - End to End Encryption". International Journal for Research in Applied Science and Engineering Technology 12, nr 4 (30.04.2024): 1026–28. http://dx.doi.org/10.22214/ijraset.2024.59921.

Pełny tekst źródła
Streszczenie:
Abstract: Nowadays, most of people and organizations use the e-mail for different needs to exchange information between users. E-mail application is an important network application. It is significant when business1, health and educational communities use it for exchange of critical information such as business information, health patient record and so on. over the Internet or internal networks, It allows data and messages to be transferred easily between senders and receivers allowing messages to be received, responded to, stored, forwarded and broadcast among recipients. These extensive capabilities have caused the email to be widely adopted as the official communications method for many organizations. Also common for personal use, electronic mail is available through a diverse number of compatible software clients, and also via web-browser. An existing enterprise email implementation second service model adds security processing. The service provider is responsible for monitoring all threats using email as a channel , and for providing an email user interface (UI) In the enterprise augmentation model, an existing on-premise email deployment is augmented by additional cloud-based services and functionalist. This paper explores identity federation and data loss prevention and describing best practices for evaluating, developing, installing and using cloud-based email security services.1.1Intended Audience Email security services are viewed from two perspectives: the providers of these services and the consumers or purchasers of email security services. key service features is needed for both sides to be aware of and plan for and how these features are used to tackle threats to email security.
Style APA, Harvard, Vancouver, ISO itp.
5

Calvert, Kenneth L., James Griffioen i Su Wen. "Lightweight network support for scalable end-to-end services". ACM SIGCOMM Computer Communication Review 32, nr 4 (październik 2002): 265–78. http://dx.doi.org/10.1145/964725.633051.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Asthana, Abhaya, Eric J. Bauer, Meenakshi Sharma i Xuemei Zhang. "End-to-end availability considerations for services over IMS". Bell Labs Technical Journal 11, nr 3 (8.11.2006): 199–210. http://dx.doi.org/10.1002/bltj.20189.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Cancela, Héctor, Pablo Rodríguez-Bocca i Bruno Tuffin. "End-to-end availability-dependent pricing of network services". Annals of Operations Research 157, nr 1 (13.09.2007): 61–71. http://dx.doi.org/10.1007/s10479-007-0254-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Abdullah, Wisam Dawood, Ali Abdullah Ali i Layth Rafea Hazim. "Analysis of End to End Internet Traffic in Education's Networks: A New Study". Webology 19, nr 1 (20.01.2022): 3392–409. http://dx.doi.org/10.14704/web/v19i1/web19223.

Pełny tekst źródła
Streszczenie:
Network Traffic Monitoring and Analysis (NTMA) is the main element to network management, especially to correctly operate large-scale networks such as the Internet on which modern academic organizations heavily depend. Their traffic use increases significantly because students, staff members, and research labs use them to search information. It is necessary to analyze, measure, and classify this Internet traffic according to the need of different stakeholders such as Internet Service Providers and network administrators. Moreover, bandwidth congestions frequently occur, causing user dissatisfaction. This study tries to find different characterizations such as data over hosts, countries, cities, companies, top-level domains, and servers. In addition, this is a new study to find out different patterns and levels of analysis from the device to its international requests. Our findings show that the highest traffic use is on Mondays and Wednesdays. Web server and DNS server drop in response to fault tolerance. Social networks consume most of the bandwidth, such as 42% Facebook followed by 22% WhatsApp in peak hours. The second most accessed sites are search engines. Google is the most used one. About 59% of the host cities are outside Iraq, in particular USA and the UK. In Amara and Baghdad cities, the requested sites are 51% and 49% overseas. About 40% of the traffic is provided by EarthLink Ltd. Communication Internet services (Iraq), 14% EdgeCast. 12% level3, 9% Facebook, 7% Google, Akamai-as and Microsoft-corp-msn-as-block. This study gives guidelines for network administrators to improve their performance and bandwidth at the educational networks.
Style APA, Harvard, Vancouver, ISO itp.
9

Chengzhi Li i E. W. Knightly. "Coordinated multihop scheduling: a framework for end-to-end services". IEEE/ACM Transactions on Networking 10, nr 6 (grudzień 2002): 776–89. http://dx.doi.org/10.1109/tnet.2002.805024.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Fortuna, C., i M. Mohorcic. "Dynamic composition of services for end-to-end information transport". IEEE Wireless Communications 16, nr 4 (sierpień 2009): 56–62. http://dx.doi.org/10.1109/mwc.2009.5281256.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Ben Said, Najah, i Ioana Cristescu. "End-to-end information flow security for web services orchestration". Science of Computer Programming 187 (luty 2020): 102376. http://dx.doi.org/10.1016/j.scico.2019.102376.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Elbiaze, H., i O. Cherkaoui. "Signalling end-to-end optical services over multi-domain networks". Optical Switching and Networking 4, nr 1 (luty 2007): 58–74. http://dx.doi.org/10.1016/j.osn.2006.10.004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Zhao, Jian, Hossam Hassanein, Jieyi Wu i Guanqun Gu. "End-to-end QoS routing framework for differentiated services networks". Computer Communications 26, nr 6 (kwiecień 2003): 566–78. http://dx.doi.org/10.1016/s0140-3664(02)00144-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Wu-Chang Feng, D. D. Kandlur, D. Saha i K. G. Shin. "Maintaining end-to-end throughput in a differentiated-services Internet". IEEE/ACM Transactions on Networking 7, nr 5 (1999): 685–97. http://dx.doi.org/10.1109/90.803383.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Scheffler, Sarah, i Jonathan Mayer. "SoK: Content Moderation for End-to-End Encryption". Proceedings on Privacy Enhancing Technologies 2023, nr 2 (kwiecień 2023): 403–29. http://dx.doi.org/10.56553/popets-2023-0060.

Pełny tekst źródła
Streszczenie:
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy create new content moderation challenges for online services, because services can no longer directly access plaintext content. While ongoing public policy debates about E2EE and content moderation in the United States and European Union emphasize child sexual abuse material and misinformation in messaging and storage, we identify and synthesize a wealth of scholarship that goes far beyond those topics. We bridge literature that is diverse in both content moderation subject matter, such as malware, spam, hate speech, terrorist content, and enterprise policy compliance, as well as intended deployments, including not only privacy-preserving content moderation for messaging, email, and cloud storage, but also private introspection of encrypted web traffic by middleboxes. In this work, we systematize the study of content moderation in E2EE settings. We set out a process pipeline for content moderation, drawing on a broad interdisciplinary literature that is not specific to E2EE. We examine cryptography and policy design choices at all stages of this pipeline, and we suggest areas of future research to fill gaps in literature and better understand possible paths forward.
Style APA, Harvard, Vancouver, ISO itp.
16

Yan, Guofeng, Yuxing Peng, Shuhong Chen i Pengfei You. "QoS Evaluation of End-to-End Services in Virtualized Computing Environments". International Journal of Web Services Research 12, nr 1 (styczeń 2015): 27–44. http://dx.doi.org/10.4018/ijwsr.2015010103.

Pełny tekst źródła
Streszczenie:
Quality of service (QoS) optimization for end-to-end (e2e) services always depends on performance analysis in cloud-based service delivery industry. However, performance analysis of e2e services becomes difficult as the scale and complexity of virtualized computing environments increase. In this paper, the authors present a novel hierarchical stochastic approach to evaluate the QoS of e2e virtualized cloud services using Quasi-Birth Death structures, where jobs arrive according to a stochastic process and request virtual machines (VMs), which are specified in terms of resources, i.e., VM-configuration. To reduce the complexity of performance evaluation, the overall virtualized cloud services are partitioned into three sub-hierarchies. The authors analyze each individual sub-hierarchy using stochastic queueing approach. Thus, the key performance metrics of e2e cloud service QoS, such as acceptance probability and e2e response delay incurred on user requests, are obtained.
Style APA, Harvard, Vancouver, ISO itp.
17

Stoewer, Heinz. "End-to-End Systems Engineering: The Key to Successful Products and Services". INSIGHT 2, nr 1 (marzec 1999): 5–9. http://dx.doi.org/10.1002/inst.1999215.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Virdis, Antonio, Giovanni Nardini, Giovanni Stea i Dario Sabella. "End-to-End Performance Evaluation of MEC Deployments in 5G Scenarios". Journal of Sensor and Actuator Networks 9, nr 4 (11.12.2020): 57. http://dx.doi.org/10.3390/jsan9040057.

Pełny tekst źródła
Streszczenie:
Multi-access edge computing (MEC) promises to deliver localized computing power and storage. Coupled with low-latency 5G radio access, this enables the creation of high added-value services for mobile users, such as in-vehicle infotainment or remote driving. The performance of these services as well as their scalability will however depend on how MEC will be deployed in 5G systems. This paper evaluates different MEC deployment options, coherent with the respective 5G migration phases, using an accurate and comprehensive end-to-end (E2E) system simulation model (exploiting Simu5G for radio access and Intel CoFluent for core network and MEC), taking into account user-related metrics, such as response time or MEC latency. Our results show that 4G radio access is going to be a bottleneck, preventing MEC services from scaling up. On the other hand, the introduction of 5G will allow a considerable higher penetration of MEC services.
Style APA, Harvard, Vancouver, ISO itp.
19

Lashgari, Maryam, Lena Wosinska i Paolo Monti. "End-to-End Provisioning of Latency and Availability Constrained 5G Services". IEEE Communications Letters 25, nr 6 (czerwiec 2021): 1857–61. http://dx.doi.org/10.1109/lcomm.2021.3063262.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Agarwal, Vikas, Girish Chafle, Koustuv Dasgupta, Neeran Karnik, Arun Kumar, Sumit Mittal i Biplav Srivastava. "Synthy: A system for end to end composition of web services". Journal of Web Semantics 3, nr 4 (grudzień 2005): 311–39. http://dx.doi.org/10.1016/j.websem.2005.09.002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Gaivoronski, Alexei A., Per-Jonny Nesse, Olav-Norvald Østerbo i Håkon Lønsethagen. "Risk-balanced dimensioning and pricing of End-to-End differentiated services". European Journal of Operational Research 254, nr 2 (październik 2016): 644–55. http://dx.doi.org/10.1016/j.ejor.2016.04.019.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Hansen, H. "The end-to-end perspective on MMS interoperability [multimedia messaging services]". Communications Engineer 1, nr 2 (1.04.2003): 9–12. http://dx.doi.org/10.1049/ce:20030202.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Famaey, Jeroen, Steven Latré, Tim Wauters i Filip De Turck. "End-to-End Resource Management for Federated Delivery of Multimedia Services". Journal of Network and Systems Management 22, nr 3 (28.09.2013): 396–433. http://dx.doi.org/10.1007/s10922-013-9288-y.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Moubayed, Abdallah, Abdallah Shami i Anwer Al-Dulaimi. "On End-to-End Intelligent Automation of 6G Networks". Future Internet 14, nr 6 (29.05.2022): 165. http://dx.doi.org/10.3390/fi14060165.

Pełny tekst źródła
Streszczenie:
The digital transformation of businesses and services is currently in full force, opening the world to a new set of unique challenges and opportunities. In this context, 6G promises to be the set of technologies, architectures, and paradigms that will promote the digital transformation and enable growth and sustainability by offering the means to interact and control the digital and virtual worlds that are decoupled from their physical location. One of the main challenges facing 6G networks is “end-to-end network automation”. This is because such networks have to deal with more complex infrastructure and a diverse set of heterogeneous services and fragmented use cases. Accordingly, this paper aims at envisioning the role of different enabling technologies towards end-to-end intelligent automated 6G networks. To this end, this paper first reviews the literature focusing on the orchestration and automation of next-generation networks by discussing in detail the challenges facing efficient and fully automated 6G networks. This includes automating both the operational and functional elements for 6G networks. Additionally, this paper defines some of the key technologies that will play a vital role in addressing the research gaps and tackling the aforementioned challenges. More specifically, it outlines how advanced data-driven paradigms such as reinforcement learning and federated learning can be incorporated into 6G networks for more dynamic, efficient, effective, and intelligent network automation and orchestration.
Style APA, Harvard, Vancouver, ISO itp.
25

Molisz, Wojciech, i Jacek Rak. "End-to-end service survivability under attacks on networks". Journal of Telecommunications and Information Technology, nr 3 (30.09.2006): 19–26. http://dx.doi.org/10.26636/jtit.2006.3.383.

Pełny tekst źródła
Streszczenie:
Network survivability is a capability of a networked system to provide its services despite failures or attacks. Attacks, e.g., due to acts of war, being potentially damaging events, were basically considered in the historical definitions of a survivability phenomenon. The meaning of the term: ”network survivability” evolved in the last decade. Recently, attacks replayed the important role again. Their nature, however, including intrusions, probes, denials of service, differs from the old one. Survivability is strongly related to other fields of study. In particular, quality of service depends on network survivability. We investigate these dependencies in scale-free networks. Many networks are scale-free, i.e., their node degree distribution follows the power law. Nodes of the highest degrees, called centers, are highly vulnerable to attacks. Elimination of these nodes seriously degrades the overall performance of network services. In this paper we propose a model, which, based on traffic parameters of a demand, like delay or bit rate, allows to establish the survivable and attack proof end-to-end connections. The key idea of this model is that for the significant traffic, it establishes paths, which omit centers. The important connections become more resistant to attacks. We show that in the best case, obtained for the highest class of service, the number of broken connections is reduced even by factor 3. Example results are compared to those for the standard distance metrics. Our model is applicable to many network architectures and many classes of service.
Style APA, Harvard, Vancouver, ISO itp.
26

Bai, Bing, Yushun Fan, Wei Tan, Jia Zhang, Keman Huang i Jing Bi. "End-to-End Web Service Recommendations by Extending Collaborative Topic Regression". International Journal of Web Services Research 15, nr 1 (styczeń 2018): 89–112. http://dx.doi.org/10.4018/ijwsr.2018010105.

Pełny tekst źródła
Streszczenie:
Mashup has emerged as a lightweight way to compose multiple web services and create value-added compositions. Facing the large amount of services, effective service recommendations are in great need. Service recommendations for mashup queries suffers from a mashup-side cold-start problem, and traditional approaches usually overcome this by first applying topic models to mine topic proportions of services and mashup queries, and then using them for subsequent recommendations. This solution overlooks the fact that usage record can provide a feedback for text extraction. Besides, traditional approaches usually treat all the usage records equally, and overlook the fact that the service usage pattern is evolving. In this article, the authors overcome these issues and propose an end-to-end service recommendation algorithm by extending collaborative topic regression. The result is a generative process to model the whole procedure of service selection; thus, usage can guide the mining of text content, and meanwhile, they give time-aware confidence levels to different historical usages. Experiments on the real-world ProgrammableWeb data set show that the proposed algorithm gains an improvement of 6.3% in terms of mAP@50 and 10.6% in terms of Recall@50 compared with the state-of-the-art methods.
Style APA, Harvard, Vancouver, ISO itp.
27

Ahmed, Faraz, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang i He Yan. "Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services". ACM SIGMETRICS Performance Evaluation Review 43, nr 1 (24.06.2015): 459–60. http://dx.doi.org/10.1145/2796314.2745892.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Yu, Tao, Yue Zhang i Kwei-Jay Lin. "Efficient algorithms for Web services selection with end-to-end QoS constraints". ACM Transactions on the Web 1, nr 1 (maj 2007): 6. http://dx.doi.org/10.1145/1232722.1232728.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Xu, Bin, Sen Luo i Yixin Yan. "Efficient composition of semantic web services with end-to-end QoS optimization". Tsinghua Science and Technology 15, nr 6 (grudzień 2010): 678–86. http://dx.doi.org/10.1016/s1007-0214(10)70115-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Yu, Tao, i Kwei-Jay Lin. "Service selection algorithms for Web services with end-to-end QoS constraints". Information Systems and e-Business Management 3, nr 2 (lipiec 2005): 103–26. http://dx.doi.org/10.1007/s10257-005-0052-z.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Goel, Utkarsh, Mike P. Wittie, Kimberly C. Claffy i Andrew Le. "Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services". IEEE Communications Surveys & Tutorials 18, nr 1 (2016): 105–23. http://dx.doi.org/10.1109/comst.2015.2485979.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Isazadeh, Ayaz, i Mohsen Heydarian. "Traffic distribution for end-to-end QoS routing with multicast multichannel services". Journal of Supercomputing 52, nr 1 (21.02.2009): 47–81. http://dx.doi.org/10.1007/s11227-008-0263-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Marich, Michael J., Benjamin L. Schooley i Thomas A. Horan. "A Normative Enterprise Architecture for Guiding End-to-End Emergency Response Decision Support". International Journal of Information Systems for Crisis Response and Management 2, nr 2 (kwiecień 2010): 1–18. http://dx.doi.org/10.4018/jiscrm.2010040101.

Pełny tekst źródła
Streszczenie:
This article examines the underlying architecture guiding the development and use of enterprise decision support systems that maintain the delivery of time critical public services. A normative architecture, developed from comparative cases involving San Mateo County and Mayo Clinic Emergency Medical Services systems, provides a collection of characteristics meant to guide an emergency response system toward a high level of performance and enable optimal decision-making. At a national symposium, academics and practitioners involved in promoting effective emergency response information systems provided validation for the architecture and next steps for enhancing emergency response information systems. Normative architecture characteristics and expert perspectives from the symposium are integrated into a framework that offers an enterprise approach for delivering time-critical emergency response services. This article provides recommendations for navigating toward a more incremental approach in developing enterprise-oriented emergency information services and examines future trends involving the application of normative architectural concepts to real-world emergency medical settings.
Style APA, Harvard, Vancouver, ISO itp.
34

Alloghani, Mohamed. "Predicting End-User Adoption to Mobile Services". Journal of Data Analysis and Information Processing 06, nr 02 (2018): 15–29. http://dx.doi.org/10.4236/jdaip.2018.62002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Kim, So-Yeon, Sun-Woo Yun, Eun-Young Lee, So-Hyeon Bae i Il-Gu Lee. "Fast Packet Inspection for End-To-End Encryption". Electronics 9, nr 11 (17.11.2020): 1937. http://dx.doi.org/10.3390/electronics9111937.

Pełny tekst źródła
Streszczenie:
With the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet, has become easily accessible. At the same time, eavesdropping, data interception, personal data leakage, and distribution of malware during the information transfer process have become easier than ever. Recently, to respond to such threats, end-to-end encryption (E2EE) technology has been widely implemented in commercial network services as a popular information security system. However, with the use of E2EE technology, it is difficult to check whether an encrypted packet is malicious in an information security system. A number of studies have been previously conducted on deep packet inspection (DPI) through trustable information security systems. However, the E2EE is not maintained when conducting a DPI, which requires a long inspection time. Thus, in this study, a fast packet inspection (FPI) and its frame structure for quickly detecting known malware patterns while maintaining E2EE are proposed. Based on the simulation results, the proposed FPI allows for inspecting packets approximately 14.4 and 5.3 times faster, respectively, when the inspection coverage is 20% and 100%, as compared with a DPI method under a simulation environment in which the payload length is set to 640 bytes.
Style APA, Harvard, Vancouver, ISO itp.
36

Chin, Tommy, Mohamed Rahouti i Kaiqi Xiong. "Applying software-defined networking to minimize the end-to-end delay of network services". ACM SIGAPP Applied Computing Review 18, nr 1 (30.04.2018): 30–40. http://dx.doi.org/10.1145/3212069.3212072.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Aleksiev, Oleh, Volodymyr Aleksiev, Olha Matsyi i Michael Matsyi. "End-to-end design of mechatronic industrial and automotive computer systems". 49, nr 49 (29.03.2021): 6–15. http://dx.doi.org/10.26565/2304-6201-2021-49-01.

Pełny tekst źródła
Streszczenie:
Due to the constant information develop-ment of society and its industrial component, new transport systems and machines have reached a high level of information excellence. Accordingly, there is a new contradiction between the rapid development of tools and methods of informatization of complex objects and systems, the development of transport telematics (internal for cars and other vehicles and external internal transport control systems) and the heterogeneous nature of existing subsystems and components of the transport complex. Of Ukraine. The problem of resolving this contradiction will allow at all levels of transport infrastructure to improve services to residents of cities and regions, improve transport processes, avoid existing negative consequences: traffic disruptions, unsatisfactory condition of roads, irrational use of funds for re-pair, operation and equipment of highways. This will help improve traffic safety, improve the quality of transport services, ensure people's comfort and save cargo. The goal of the study is to create software and hardware for virtual management, its intellectualization based on the use of virtual logis-tics of transportation processes, providing road users, tools of virtual management, a kind of virtual logistics. The purpose of this article is to study the problem of expressing and proving new rules and concepts for providing knowledge and skills to people who want to work in the IT field of transport applications. The sequence of acquiring knowledge and skills of people who have improved their personal professional level in road transport is determined. The idea of computer science as system engineering of successful consecutive creation of computer equip-ment and software of complex systems by combining their computer and software engineering in the field of motor transport is offered. The scope of use of the obtained results is road transport road organizations of Ukraine, residents of cities and regions as individuals or legal entities of users of transport services.
Style APA, Harvard, Vancouver, ISO itp.
38

Chimakurthi, VNS Surendra. "Cloud Security - A Semantic Approach in End to End Security Compliance". Engineering International 5, nr 2 (31.12.2017): 97–106. http://dx.doi.org/10.18034/ei.v5i2.586.

Pełny tekst źródła
Streszczenie:
Many firms are seeing the benefits of moving to the cloud. For the sake of their customers' data, cloud service providers are required by law to maintain the highest levels of data security and privacy. Most cloud service providers employ a patchwork of security and privacy safeguards while industry standards are being created. The upshot is that customers of cloud services are unsure whether or not the security protections supplied by these services are enough to meet their specific security and compliance requirements. In this article, we have discussed the many threats cloud users face and emphasized the compliance frameworks and security processes that should be in place to minimize the risk. To categorize cloud security measures, risks, and compliance requirements, we developed an ontology. We needed to design software to identify the high-level policy rules that must be applied in response to each danger as part of this initiative. Additionally, the program provides a list of cloud service providers that now satisfy specific security requirements. Even if they aren't familiar with the underlying technology, cloud users may utilize our system to build up their security policy and identify compatible providers.
Style APA, Harvard, Vancouver, ISO itp.
39

Boštjančič Rakas, Slavica, i Mirjana Stojanović. "A Centralized Model for Establishing End-to-End Communication Services via Management Agents". PROMET - Traffic&Transportation 31, nr 3 (7.06.2019): 245–55. http://dx.doi.org/10.7307/ptt.v31i3.2980.

Pełny tekst źródła
Streszczenie:
This paper presents a centralized approach for establishing end-to-end communication services via management agents. The main proposal is the modular architecture of the third-party based Service Establishment Agent (SEA). The SEA manages inter-provider service negotiation process with per-domain management agents through an appropriate signaling agent. It also receives and interprets end-toend service requests, selects inter-domain paths, performs mapping of service classes among domains on the path, and evaluates conformance of the offered service level with the required one. It allows implementation of different algorithms for the aforementioned functions as well as their selection and combination according to the predefined management policies. Simulation results show that the proposed model significantly outperforms the distributed model in terms of service negotiation times. In the prototype development process, a policy-based solution for mapping of service classes was implemented. The performance evaluation shows that processing requirements for handling multiple service requests are modest, while benefit of the SEA approach is the lack of need to build long-term consensus among providers about technical choices for achieving network interconnection. The SEA architecture is completely independent of the quality of service mechanisms available in particular domains.
Style APA, Harvard, Vancouver, ISO itp.
40

Millnert, Victor, Enrico Bini i Johan Eker. "Cost minimization of network services with buffer and end-to-end deadline constraints". ACM SIGBED Review 14, nr 4 (4.01.2018): 39–45. http://dx.doi.org/10.1145/3177803.3177810.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Crowcroft, Jon, i Philippe Oechslin. "Differentiated end-to-end Internet services using a weighted proportional fair sharing TCP". ACM SIGCOMM Computer Communication Review 28, nr 3 (lipiec 1998): 53–69. http://dx.doi.org/10.1145/293927.293930.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Skorin-Kapov, L., D. Huljenic, D. Mikic i D. Vilendecic. "Analysis of end-to-end QoS for networked virtual reality services in UMTS". IEEE Communications Magazine 42, nr 4 (kwiecień 2004): 49–55. http://dx.doi.org/10.1109/mcom.2004.1284929.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Hellerstein, Joseph L., i Burkhard Stiller. "Management of Integrated End-to-End Communications and Services—Report on NOMS 2006". Journal of Network and Systems Management 14, nr 3 (21.07.2006): 477–81. http://dx.doi.org/10.1007/s10922-006-9032-y.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Wu, Peng, Junmin Wu, Wei Wang, Jiming Yao i Yue Yu. "End-to-End Delay Performance Analysis for Delay-Sensitive Services in Polymorphic Networks". Journal of Physics: Conference Series 2774, nr 1 (1.07.2024): 012023. http://dx.doi.org/10.1088/1742-6596/2774/1/012023.

Pełny tekst źródła
Streszczenie:
Abstract In the polymorphic network for smart grid, the end-to-end latency performance analysis of delay-sensitive power control services such as differential protection and distributed power regulation is a crucial component in the intelligent control and management of power network slicing. In this paper, based on a detailed analysis of end-to-end delay factors of power control service, the distributed power regulation pilot project is taken as a typical application scenario of power control service, and the end-to-end delay of such service is theoretically derived and analyzed in detail by using network calculus theory. Numerical verification shows that the end-to-end delay performance of the power control service is positively correlated with the number of concurrent data streams and the number of subsystems and negatively correlated with the system service rate. Compared with the burst degree of the current data streams, the burst degree of other data streams significantly impacts the end-to-end delay calculation results of the current data flow.
Style APA, Harvard, Vancouver, ISO itp.
45

Johndoss, Merline, i T. Pramananda Perumal. "Deployment of Carrier supporting Carrier (CsC) Network Providing MPLS-VPN Services to End Customers". Indian Journal Of Science And Technology 16, nr 46 (22.12.2023): 4445–55. http://dx.doi.org/10.17485/ijst/v16i46.2456.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Eiting, Andreas, Günter Schatz, Terence Dürauer i Heiko Spitzer. "‘End-to-end’ strategic asset management process to support asset services at the community level". CIRED - Open Access Proceedings Journal 2017, nr 1 (1.10.2017): 2719–22. http://dx.doi.org/10.1049/oap-cired.2017.0869.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Barabanova, Tat'yana, Evgeniy Degaev i Evgeniya Grosheva. "ALTERNATIVE PERSONAL PROTECTIVE EQUIPMENT USING END-TO-END TECHNOLOGIES TO ENSURE SAFE WORKING CONDITIONS". Construction and Architecture 11, nr 4 (5.10.2023): 40. http://dx.doi.org/10.29039/2308-0191-2023-11-4-40-40.

Pełny tekst źródła
Streszczenie:
Currently, to improve and effectively use personal protective equipment during repair and construction work, end-to-end technologies are being introduced everywhere. Despite the high cost, there are a certain number of advantages in terms of the possible technical parameters of using end-to-end technologies. They are applicable, including in construction and housing and communal services
Style APA, Harvard, Vancouver, ISO itp.
48

Kang, Jeongyoon, Jieon Kim, Jungheum Park i Seokhee Lee. "Forensic Approaches for End-to-End Encryption Cloud Storage Services: MEGA as a Case Study". Arab Journal of Forensic Sciences and Forensic Medicine 6, Special Issue (18.06.2024): 117–36. http://dx.doi.org/10.26735/tmpv1812.

Pełny tekst źródła
Streszczenie:
The advancement of cloud-based data storage technology allows users to conveniently access and manage files using endpoint devices without being constrained by their environment. While cloud storage services have improved the efficiency of performing our daily tasks, they have also become a medium for criminals to distribute illegal materials. Services that support end-to-end encryption (E2EE), cannot decrypt data even when it's stored on their servers, attracting users who require high security. There are some existing studies related to cloud-based services using E2EE, but they only deal with local artifacts, which makes it difficult to analyze when local devices cannot be found or when there are changes to local artifacts. This study identifies the mechanisms by which MEGA, a cloud-based file hosting service, operates to obtain user authentication, explore metadata, and collect files while applying end-to-end encryption. Furthermore, we propose a forensic investigation methodology to explore various metadata and selectively acquire cloud resources relevant to an incident through an understanding of E2EE algorithms. Also, we apply MEGA to the existing framework to suggest improving the framework that encompasses E2EE cloud-based services. The findings of this study serve as a valuable reference for dealing with cloud-based services with E2EE from the perspectives of computer security and digital forensics.
Style APA, Harvard, Vancouver, ISO itp.
49

Qiu, Li, Xuyan Song, Jun Yang i Baojiang Cui. "Bee: End to End Distributed Tracing System for Source Code Security Analysis". Highlights in Science, Engineering and Technology 1 (14.06.2022): 209–18. http://dx.doi.org/10.54097/hset.v1i.463.

Pełny tekst źródła
Streszczenie:
As distributed services become more and more complex, their security is becoming an increasingly important issue. End-to-end tracing has emerged recently as a valuable tool to improve the dependability of distributed systems, by performing dynamic verification and diagnosing correctness and performance problems. However, several shortcomings of the end-to-end tracing system`s security analysis are uncovered during the development. First of all, the density of probes is not enough, and also the descriptions of different operations are not consistent, which does not allow effective access to intermediate information of end-to-end services and brings about data analysis problems. Second, the implantation of probes is complex and many operations are highly coupled with the monitored program. The third point is that the sampling algorithm in the existing end-to-end distributed tracing system is too simple to effectively improve the performance of the high-density probe tracing system used for security analysis. In this paper, we address the above problem and successfully build Bee. To demonstrate the Bee's helpfulness for those problems in Security analysis, we test its performance and prove some privacy leaks vulnerabilities and access control vulnerabilities of OpenStack with Bee. The experimental results show that with the high-density probes. Bee can capture the detailed request process and quickly locate abnormal operations.
Style APA, Harvard, Vancouver, ISO itp.
50

Ranaivoson, Heritiana, i Simon Delaere. "MEDIA INNOVATION AND BUSINESS MODELS: THE CASE OF END-TO-END IMMERSIVE AUDIOVISUAL SERVICES". IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET 16, nr 1 (12.09.2018): 42–55. http://dx.doi.org/10.33965/ijwi_2018161103.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii