Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   14  
      Environmental ManagementNetworksQoSQuality of Service
    • by 
    •   20  
      Distributed ComputingInformation TechnologyDecision MakingSystem Management
Customer eXperience is a blue print of customer requirements. In this era of heightened competition and volatile global economy, delivering services originating from diverse sources, without satisfying thorough customer experience... more
    • by 
    •   9  
      User Experience (UX)Service DesignDesign Process (Architecture)CUSTOMER EXPERIENCE MANAGEMENT
    • by 
    •   5  
      Resource AllocationBusiness rulesPolicy Based ManagementService Level Agreement
"Network management is becoming increasingly challenging with the relentless growth in network size, traffic volume, and the diversity in QoS requirements. Traditionally, the concept of predefined Service Level Agreements (SLAs) has been... more
    • by 
    •   2  
      Software defined networkingPolicy Based Management
    • by 
    •   9  
      Mobile Ad Hoc NetworkQuality of ServicePolicy Based ManagementAd hoc network
    • by  and +3
    •   5  
      Case StudyPolicy Based ManagementHigh SpeedCore Network
    • by 
    •   14  
      Technology ManagementPerformanceNeural NetworksNetwork Management
Quality of Service (QoS) management and provisioning in mobile ad hoc networks (manets) is a challenging task due to the lack of resources residing in the network as well as frequent changes in the network topology. Although a great deal... more
    • by 
    •   16  
      Information SystemsComputer ScienceInformation TechnologyInformatics
    • by 
    •   8  
      Network ManagementPolicy AnalysisModel Driven DevelopmentDomain specific language
    • by 
    •   2  
      Access ControlPolicy Based Management
    • by 
    •   8  
      Distributed ComputingModelingFormal SemanticsConflict Analysis
In order to arrange heterogeneous simulation executions, it would be useful to have simulation tools that enable easy and fast creation of simulation sessions employing real-time software components beside simulation codes. Although there... more
    • by 
    •   9  
      Software TestingCase StudyReal TimePolicy Based Management
Policy-based management provides the ability to dynamically re-configure DiffServ networks such that desired quality of service (QoS) goals are achieved. This includes network provisioning decisions, performing admission control, and... more
    • by 
    •   19  
      ManagementComputer ScienceQuality ManagementSecurity Management
    • by 
    •   11  
      Access ControlDistributed SystemSecurity ManagementSecurity Policy
    • by 
    •   10  
      Management Information SystemsInformation ManagementCorporate GovernanceCustomer Relationship Management
Virtual team issue has emerged as an important new teamwork model, distinguished from the conventional way in which people work by its ability to transcend distance, time and organizational boundaries. A virtual team consists of a dynamic... more
    • by 
    •   11  
      Agent BasedResource sharingCooperationVirtual Reality
    • by 
    •   11  
      Distributed ComputingNetworksAutonomic ComputingComputer Network
    • by 
    •   5  
      Home CareLanguage PolicyPervasive HealthService discovery
Policy-based management is considered an effective approach to address the challenges of resource management in large complex networks. Within the IU-ATC QoS Frameworks project, a policy-based network management framework, CNQF (Converged... more
    • by 
    •   11  
      Service managementQuality of ServiceComplex networkNCC
    • by 
    •   7  
      Policy ManagementSecurity PolicyPolicy Based ManagementDesign and Development
Healthcare environments do not accept Static Authorizations especially when it could puts patients’ life in danger. A very common problem "Break The Glass" is known as the act of breaking the static authorization in order to reach the... more
    • by 
    •   7  
      HealthcareSecurity ManagementSecurity PolicyPolicy Based Management
In the policy-based network management, the local policy decision point (LPDP), is used to reach a local decision. This partial decision and the original policy request are next sent to the PDP which renders a final decision. In this... more
    • by 
    •   4  
      Multi Agent SystemQuality of ServicePolicy Based ManagementBDI agents
    • by 
    •   3  
      Static AnalysisPolicy Based ManagementOverlap
    • by 
    •   4  
      Fuzzy LogicVoice over IPQuality of ServicePolicy Based Management
    • by 
    •   7  
      Computer ScienceNetwork SecurityAccess ControlInformation Operations
    • by 
    •   11  
      LogicQuality ManagementService Oriented ArchitectureEngineering Management
    • by 
    •   11  
      Distributed ComputingAccess ControlSecurity ManagementSecurity Policy
    • by 
    •   10  
      Distributed ComputingNetwork SecurityAccess ControlNetwork Management
    • by 
    •   4  
      Security ManagementReal TimePolicy Based ManagementManagement Policy
    • by 
    •   5  
      Fuzzy LogicVoice over IPNetwork ManagementQuality of Service
    • by 
    •   4  
      Fuzzy LogicVoice over IPQuality of ServicePolicy Based Management
    • by 
    •   5  
      Distributed ComputingNetwork ManagementCommunication SystemPolicy Based Management
    • by 
    •   10  
      Quality of ServicePolicy Based ManagementManagement SystemSoftware Requirement Specification
    • by 
    •   10  
      Network ManagementDistributed ControlSystem ArchitecturePolicy Based Management
    • by 
    •   8  
      Distributed ComputingAutonomic ComputingComputer SoftwareConcurrency
    • by 
    •   19  
      ManagementEngineeringComputer ScienceTechnology
Abstract—Policy-based management for federated healthcare systems has recently gained increasing attention due to strict privacy and disclosure rules. Although the work on privacy languages and enforcement mechanisms, such as Hippocratic... more
    • by 
    •   20  
      Information ManagementHealth CareAccess ControlPervasive Computing
    • by 
    •   9  
      Wireless NetworkService DeliveryResource DiscoveryCost effectiveness
    • by 
    •   9  
      Wireless NetworkService DeliveryResource DiscoveryCost effectiveness
This paper introduces a version of KAoS Semantic Policy and Domain Services that has been developed to support Web Services-based (i.e., OGSA-compliant) Grid Computing Architectures. While initially oriented to the dynamic and complex... more
    • by 
    •   9  
      Distributed ComputingGrid ComputingAccess ControlSemantic Web
    • by 
    •   17  
      Computer ScienceStatisticsDynamic Spectrum AccessTechnology Management
    • by 
    •   9  
      Complex SystemQuality of ServiceBandwidth AllocationPolicy Based Management
    • by 
    •   17  
      CalculusDistributed ComputingQuality ManagementEngineering Management
As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of mechanisms necessary to fulfil the protection requirements of the... more
    • by 
    •   5  
      Network SecurityData CommunicationPolicy Based ManagementIntegrated design
At present there are no digital social platforms that are open, distributed and self-managed. The openness enables end-users to customize their interactions through their selection of relationships and applications; and application... more
    • by 
    •   3  
      Policy Based ManagementApplication developmentModular Design
    • by 
    •   11  
      Cognitive ScienceIntelligent SystemsSemantic WebDistributed System
... 8. Authors' Addresses Andrea Westerinen Cisco Systems, Bldg 20 725 Alder Drive Milpitas, CA 95035 EMail: andreaw@cisco.com John Schnizlein Cisco Systems 9123 Loughran Road Fort Washington, MD 20744 EMail:... more
    • by 
    • Policy Based Management
To secure computing in pervasive environment, an adaptive algorithmic approach for access control (based on human notion of trust) is proposed. The proposed model provides support to calculate direct trust in situations when the... more
    • by 
    •   11  
      Ubiquitous ComputingCognitionAccess ControlPervasive Computing