Sciweavers

202 search results - page 16 / 41
» Service Level Agreement (SLA) in Utility Computing Systems
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
Incorporating Trust in Network Virtualization
In this paper, we propose a trust management framework for network virtualization environments. The proposed framework helps distinguish among the infrastructure providers based o...
Loubna Mekouar, Youssef Iraqi, Raouf Boutaba
INFOCOM
2003
IEEE
14 years 1 months ago
A Bandwidth Guaranteed Polling MAC Protocol for Ethernet Passive Optical Networks
While the backbone networks have experienced substantial changes in the last decade; the access networks have not changed much. Recently, passive optical networks (PONs) seem to be...
Maode Ma
PDP
2010
IEEE
14 years 2 months ago
SLA-driven Elastic Cloud Hosting Provider
—It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. I...
Josep Oriol Fito, Iñigo Goiri, Jordi Guitar...
GPC
2010
Springer
14 years 29 days ago
SLA-Driven Automatic Bottleneck Detection and Resolution for Read Intensive Multi-tier Applications Hosted on a Cloud
Abstract. A Service-Level Agreement (SLA) provides surety for specific quality attributes to the consumers of services. However, the current SLAs offered by cloud providers do no...
Waheed Iqbal, Matthew N. Dailey, David Carrera, Pa...
AINA
2004
IEEE
13 years 11 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang