Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2021
Development of multifunctional system for controlling user access to the Internet
ICFNDS '20: Proceedings of the 4th International Conference on Future Networks and Distributed SystemsNovember 2020, Article No.: 25, Pages 1–4https://doi.org/10.1145/3440749.3442618Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, ...
- research-articleMay 2016
Billing system CPU time on individual VM
CCGRID '16: Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid ComputingMay 2016, Pages 493–496https://doi.org/10.1109/CCGrid.2016.76In virtualized cloud hosting centers, a virtual machine (VM) is generally allocated a fixed computing capacity. The virtualization system schedules the VMs and guarantees that each VM capacity is provided and respected. However, a significant amount of ...
- articleApril 2016
An authentication, authorization, and accounting mechanism for 3G/WLAN networks
Security and Communication Networks (SACN), Volume 9, Issue 6April 2016, Pages 468–480https://doi.org/10.1002/sec.830Both computer and telecommunication networks have developed rapidly and become much more popular recently. On the basis of the characteristics of the two networks, we can see that they are complementary. If we can integrate the most popular technologies ...
- ArticleOctober 2015
An Easily Adopted Markup Discipline for Annotating Electronic Medical Records with Ontological and Epistemological Qualification: Toward Disciplined Asterisks, Parentheticals, Marginalia, Footnotes, and Hashtags
ICHI '15: Proceedings of the 2015 International Conference on Healthcare InformaticsOctober 2015, Pages 287–292https://doi.org/10.1109/ICHI.2015.41Structured data and controlled vocabularies in medical records are common goals, but widespread and eager clinical adoption might require more modest, incremental change. One small step along the path to structured data is a voluntary discipline of ...
- research-articleMay 2013
Accounting federated clouds based on the JiTCloud platform
CCGRID '13: Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid ComputingMay 2013, Pages 186–187https://doi.org/10.1109/CCGrid.2013.37Cloud accounting refers to how cloud usage is recorded and charged. We identified four federated cloud platforms which do not include an accounting system. This work presents an accounting mechanism implemented for one of these platforms focused on ...
-
- ArticleMay 2012
Lowering Inter-datacenter Bandwidth Costs via Bulk Data Scheduling
CCGRID '12: Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)May 2012, Pages 244–251https://doi.org/10.1109/CCGrid.2012.70Cloud service providers (CSP) of today operate multiple data centers, over which they provide resilient infrastructure, data storage and compute services. The links between data centers have very high capacity, and are typically purchased by the CSPs ...
- ArticleDecember 2011
How to do successful chargeback for cloud services
GECON'11: Proceedings of the 8th international conference on Economics of Grids, Clouds, Systems, and ServicesDecember 2011, Pages 61–75https://doi.org/10.1007/978-3-642-28675-9_5With pay-per-use pricing models, elastic scaling of resources, and the usage of shared virtualized infrastructure, ‘the Cloud' offers more efficient use of capital, great cost reductions, and breakthrough agility. Yet, it turns out that to leverage the ...
- research-articleOctober 2011
Privacy-preserving smart metering
WPES '11: Proceedings of the 10th annual ACM workshop on Privacy in the electronic societyOctober 2011, Pages 49–60https://doi.org/10.1145/2046556.2046564Smart grid proposals threaten user privacy by potentially disclosing fine-grained consumption data to utility providers, primarily for time-of-use billing, but also for profiling, settlement, forecasting, tariff and energy efficiency advice. We propose ...
- ArticleJuly 2010
A Case for Consumer-centric Resource Accounting Models
CLOUD '10: Proceedings of the 2010 IEEE 3rd International Conference on Cloud ComputingJuly 2010, Pages 506–512https://doi.org/10.1109/CLOUD.2010.44A pay–per–use cloud service should be made available to consumers with an unambiguous resource accounting model that precisely describes all the factors that are taken into account in calculating resource consumption charges. The paper proposes the ...
- articleMay 2010
CRBT customer churn prediction: can data mining techniques work?
International Journal of Networking and Virtual Organisations (IJNVO), Volume 7, Issue 4May 2010, Pages 353–365https://doi.org/10.1504/IJNVO.2010.032912Coloring Ring Back Tone (CRBT) is one of the most successful Value-added (VAD) services in China telecommunication operators. Under fierce competition conditions, CRBT customer churn has significantly decreased the profits of operators. Thus churn ...
- ArticleAugust 2009
Accounting and Billing for Federated Cloud Infrastructures
GCC '09: Proceedings of the 2009 Eighth International Conference on Grid and Cooperative ComputingAugust 2009, Pages 268–275https://doi.org/10.1109/GCC.2009.37Emerging Cloud computing infrastructures provide computing resources on demand based on postpaid principles. For example, the RESERVOIR project develops an infrastructure capable of delivering elastic capacity that can automatically be increased or ...
- ArticleAugust 2009
UNICORE-related projects for deploying the Belarusian national grid network
Euro-Par'09: Proceedings of the 2009 international conference on Parallel processingAugust 2009, Pages 363–370UNICORE middleware was chosen for the deployment of the National Grid network of Belarus. For quick and easy UNICORE installation on Grid sites the specialized distribution was developed. It includes not only UNICORE services and clients, but some other ...
- research-articleJanuary 2009
A platform for charging, accounting and billing in telecommunication networks and the internet
ICAC3 '09: Proceedings of the International Conference on Advances in Computing, Communication and ControlJanuary 2009, Pages 633–638https://doi.org/10.1145/1523103.1523232Current technological advancement in the field of telecommunication and the popularity of internet causes emergence of a new concept on convergence that enables the modification of existing telecommunication business models and moves to a path of ...
- articleOctober 2007
A secure authentication and billing architecture for wireless mesh networks
Wireless Networks (WIRE), Volume 13, Issue 5October 2007, Pages 663–678https://doi.org/10.1007/s11276-006-8148-zWireless mesh networks (WMNs) are gaining growing interest as a promising technology for ubiquitous high-speed network access. While much effort has been made to address issues at physical, data link, and network layers, little attention has been paid ...
- ArticleAugust 2007
Distribution networks load forecasting using improved clustering method with particular software
ISTASC'07: Proceedings of the 7th Conference on 7th WSEAS International Conference on Systems Theory and Scientific Computation - Volume 7August 2007, Pages 244–249This article presents an optimized algorithm for long-term electric load forecast in distribution or transmission network by using appropriate pattern curves.
This method is related to the load growth pattern and annual information of planned year on ...
- research-articleAugust 2007
A versatile roaming service framework with billing support for WLAN/cellular integrated networks
QSHINE '07: The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & WorkshopsAugust 2007, Article No.: 38, Pages 1–7https://doi.org/10.1145/1577222.1577275In this paper, a versatile WLAN/cellular networks integrated roaming service framework with billing support is proposed, which can lift off the requirement of peer-to-peer roaming agreements to provide seamless user roaming between WLAN hotspots and ...
- ArticleJune 2006
Secure billing for ubiquitous service delivery
ICQT'06: Proceedings of the 5th international conference on Internet Charging and QoS Technologies: performability has its PriceJune 2006, Pages 90–101https://doi.org/10.1007/11780502_9This work presents a secure interaction framework for establishing ad-hoc billing paths between untrusted players in a global telecommunications network. User authentication is supported through the introduction of a Billing provider, responsible for ...
- articleDecember 2004
An integrated charging, accounting and billing management platform for the support of innovative business models in mobile networks
International Journal of Mobile Communications (IJMC), Volume 2, Issue 4December 2004, Pages 418–434https://doi.org/10.1504/IJMC.2004.005864In the near future, it is expected that mobile operators will offer their subscribers a plethora of services as well as the ability to access value-added services offered by independent providers. However, until this goal is reached, there are several ...
- ArticleOctober 2004
Reputation-based Wi-Fi deployment protocols and security analysis
WMASH '04: Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspotsOctober 2004, Pages 29–40https://doi.org/10.1145/1024733.1024738In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet users access to email, web or other Internet service. However, two major ...
- articleJune 2004
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Wireless Personal Communications: An International Journal (WPCO), Volume 29, Issue 3-4June 2004, Pages 351–366https://doi.org/10.1023/B:WIRE.0000047070.38334.5eWireless communications have developed rapidly and have been applied for many services. Cellular (the third-generation) mobile networks and wireless local area network (WLAN) are two important technologies for providing wireless communications. The ...