Sciweavers

425 search results - page 52 / 85
» Virtual private caches
Sort
View
APPROX
2009
Springer
149views Algorithms» more  APPROX 2009»
14 years 3 months ago
On the Complexity of the Asymmetric VPN Problem
We give the first constant factor approximation algorithm for the asymmetric Virtual Private Network (Vpn) problem with arbitrary concave costs. We even show the stronger result, ...
Thomas Rothvoß, Laura Sanità
SIGECOM
2009
ACM
73views ECommerce» more  SIGECOM 2009»
14 years 3 months ago
But who will monitor the monitor?
Consider a group of individuals in a strategic environment with moral hazard and adverse selection, and suppose that providing incentives for a given outcome requires a monitor to...
David M. Rahman
DSOM
2004
Springer
14 years 2 months ago
A Formal Validation Model for the Netconf Protocol
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate...
Sylvain Hallé, Rudy Deca, Omar Cherkaoui, R...
IEEEAMS
2003
IEEE
14 years 2 months ago
Building Autonomic Systems Via Configuration
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
ECMAST
1999
Springer
166views Multimedia» more  ECMAST 1999»
14 years 1 months ago
The CATI Project: Charging and Accounting Technology for the Internet
The objectives of the CATI project (Charging and Accounting Technology for the Internet) include the design, implementation, and evaluation of charging and accounting mechanisms f...
Burkhard Stiller, Torsten Braun, Manuel Günte...