18 research outputs found

    Organisational Security Dependent on Individual Privacy

    Get PDF

    Application of policy-based techniques to process-oriented IT Service Management

    Get PDF

    Side-Effects Causing Hidden Conflicts in Software-Defined Networks

    Get PDF

    A Border-friendly, Non-overlay Mechanism for Inter-domain QoS Support in the Internet

    Get PDF
    Many services provided over the Internet, like voice over IP and video on demand, increase the demand for assurances concerning the quality of the underlying network. A score of techniques for assurance of quality of service (QoS) have been devised for use within administrative domains. However, when paths cross the border of autonomous systems, assurance of end-to-end QoS remains an unsolved issue. Thereby the key challenge is the establishment of connection-oriented communication flows. We introduce a technique to establish ISO/OSI Layer 3 multi-domain communication paths. The proposed solution does not stress border-routers and is independent of domain-internal policies, while relying on the common forwarding mechanisms

    Adapting applications to exploit virtualization management knowledge

    No full text
    Abstract-Today's applications do not react to the ad-hoc, dynamic changes in locality, performance and environment that are characteristic of virtualized infrastructure. We illustrate exemplary effects experienced by distributed programs in reaction to change in the infrastructure and explore call interception, library replacement and aspect-oriented programming as alternatives for remedy. We demonstrate the remedial effect of adaptive code introduced without change to the original application code, or its bindings. We sketch a software architecture to make available management knowledge as a base for adaptation

    Adapting applications to exploit virtualization management knowledge

    No full text
    corecore