Sciweavers

35 search results - page 5 / 7
» Managing Layer 1 VPN services
Sort
View
HICSS
2008
IEEE
102views Biometrics» more  HICSS 2008»
14 years 1 months ago
Retrofitting Cyber Physical Systems for Survivability through External Coordination
Most Supervisory Control and Data Acquisition (SCADA) systems have been in operation for decades and they in general have 24x7 availability requirement, hence upgrading or adding ...
Kun Xiao, Shangping Ren, Kevin A. Kwiat
JOT
2008
445views more  JOT 2008»
13 years 7 months ago
From The Business Motivation Model (BMM) To Service Oriented Architecture (SOA)
The purpose of this article is to provide a brief insight about how to link your business vision, goals, strategies, tactics as well as business rules according to BMM, then bridg...
Birol Berkem
PIMRC
2008
IEEE
14 years 1 months ago
Connection admission control and grade of service for QoS routing in mesh networks
—Wireless mesh networks (WMNs) is a promising key technology for next generation wireless backhauling that have recently attracted both the academic and industrial interest. Such...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
IPPS
2002
IEEE
14 years 13 days ago
Enforcing Resource Sharing Agreements among Distributed Server Clusters
Future scalable, high throughput, and high performance applications are likely to execute on platforms constructed by clustering multiple autonomous distributed servers, with reso...
Tao Zhao, Vijay Karamcheti
MKWI
2008
246views Business» more  MKWI 2008»
13 years 9 months ago
Assessing the effects of IT changes on IT risk - A business process-oriented view
Abstract: The economic relevance of IT risk is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and risi...
Stefan Sackmann