Sciweavers

JDCTA
2010
143views more  JDCTA 2010»
13 years 6 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
ICSOC
2009
Springer
13 years 9 months ago
Flexible SLA Negotiation Using Semantic Annotations
Abstract. Moving towards a global market of services requires flexible infrastructures that will deal with the inevitable semantic heterogeneity that occurs during the negotiation ...
Henar Muñoz Frutos, Ioannis Kotsiopoulos, A...
NETWORK
2007
145views more  NETWORK 2007»
13 years 11 months ago
Analysis of Shared Memory Priority Queues with Two Discard Levels
— Two rate SLAs become increasingly popular in today’s Internet, allowing a customer to save money by paying one price for committed traffic and a much lower price for additio...
Shlomi Bergida, Yuval Shavitt
SOFTWARE
2002
13 years 11 months ago
An Architecture for Agent-Enhanced Network Service Provisioning through SLA Negotiation
This paper focuses on two main areas. We first investigate various aspects of subscription and session Service Level Agreement (SLA) issues such as negotiating and setting up netwo...
David Chieng, Ivan Ho, Alan Marshall, Gerard Parr
COMCOM
2004
98views more  COMCOM 2004»
13 years 11 months ago
Proactive resource provisioning
Allocating resources in networks to QoS flows may require undesirable delays or costs. We consider a dynamic Service Level Agreement (SLA) negotiation scheme between peer autonomo...
Eric Chi, Michael Fu, Jean C. Walrand
CN
2004
103views more  CN 2004»
13 years 11 months ago
Providing end-to-end service level agreements across multiple ISP networks
Due to the autonomous nature of ISPs, the service level agreement (SLA) offering is currently confined to within a single provider network. In this work, we examine some methods o...
Panita Pongpaibool, Hyong S. Kim
TELSYS
2008
85views more  TELSYS 2008»
13 years 11 months ago
Trustworthy Web services provisioning for differentiated customer services
With the number of e-Business applications dramatically increasing, a service level agreement (SLA) will play an important part in Web services. The SLA is a combination of severa...
Kaiqi Xiong, Harry G. Perros
JSW
2006
71views more  JSW 2006»
13 years 11 months ago
Semantics and Extensions of WS-Agreement
When having repeated interactions with a service provider, a service consumer might desire guarantees on the delivery of the service. These guarantees involve both functional and n...
Ganna Frankova, Daniela Malfatti, Marco Aiello
FGCS
2006
101views more  FGCS 2006»
13 years 11 months ago
Evaluating architectures for independently auditing service level agreements
Web and grid services are quickly maturing as a technology that allows for the integration of applications belonging to different administrative domains, enabling much faster and ...
Ana Carolina Barbosa, Jacques Philippe Sauvé...
CORR
2010
Springer
91views Education» more  CORR 2010»
13 years 11 months ago
Verifiable Network-Performance Measurements
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a con...
Katerina J. Argyraki, Petros Maniatis, Ankit Singl...