Search
Now showing items 1-6 of 6
Progressive recovery for network virtualization after large-scale disasters
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Network virtualization allows users to build cusomized interconnected storage/computing configurations for their business needs. Today this capability is being widely used to improve the scalability and reliability of ...
Prioritizing deadline-constrained data flows in cloud datacenter networks
(
Association for Computing Machinery
, 2016 , Conference Paper)
Real-time interactive application workloads (e.g. web search, social networking, etc.) are composed of a remarkably large number of mini request partitions that require stringent delayminimal aggregation of responses and ...
Delay-Aware Scheduling and Resource Optimization with Network Function Virtualization
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
To accelerate the implementation of network functions/middle boxes and reduce the deployment cost, recently, the concept of network function virtualization (NFV) has emerged and become a topic of much interest attracting ...
Network function virtualization scheduling with transmission delay optimization
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
To accelerate the implementation of network functions/middle boxes and reduce the deployment cost, recently the concept of Network Function Virtualization (NFV) has emerged and became a topic of much interest attracting ...
Wireless multihoming for smart grid high data rate applications
(
IEEE Computer Society
, 2016 , Conference Paper)
Supervisory control and data acquisition (SCADA) systems are used extensively to monitor/control utility power distribution networks. However, the current SCADA systems cannot accommodate the demand of smart grid high data ...
Arabic corpora for credibility analysis
(
European Language Resources Association (ELRA)
, 2016 , Conference Paper)
A significant portion of data generated on blogging and microblogging websites is non-credible as shown in many recent studies. To filter out such non-credible information, machine learning can be deployed to build automatic ...