— We consider whether the off-line compilation of a set of Service Level Agreements (SLAs) into low-level management policies can lead to the runtime maximization of the overall ...
— The objectives of this paper are twofold. First, we introduce a novel policy language, called CIM-SPL (Simple Policy Language for CIM) that complies with the CIM (Common Inform...
Dakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jo...
Abstract— The deployment of converged services of TV, telephony, and Internet access over IP entails a significant initial investment for service providers. This investment is n...
Abstract— The Optical Burst Switching (OBS) paradigm proposes a new set of transmission protocols and network architectures that permits the high-utilization of the raw bandwidth...
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
—Today’s enterprise data centers are shifting towards a utility computing model where many business critical applications share a common pool of infrastructure resources that o...
Abstract—We investigate the use of gossip protocols for continuous monitoring of network-wide aggregates under crash failures. Aggregates are computed from local management varia...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...