default search action
Journal of Internet Services and Applications, Volume 4
Volume 4, Number 1, December 2013
- Morris Riedel, Peter Wittenburg, Johannes Reetz, Mark van de Sanden, Jedrzej Rybicki, Benedikt von St. Vieth, Giuseppe Fiameni, Giacomo Mariani, Alberto Michelini, Claudio Cacciari, Willem Elbers, Daan Broeder, Robert Verkerk, Elena Erastova, Michael Lautenschlaeger, Reinhard Budig, Hannes Thiemann, Peter V. Coveney, Stefan J. Zasada, Ali Nasrat Haidar, Otto Buechner, Cristina Manzano, A. Shiraz Memon, Ahmed Shiraz Memon, Heikki Helin, Jari Suhonen, Damien Lecarpentier, Kimmo Koski, Thomas Lippert:
A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service. 1:1-1:17 - Rajiv Ranjan, Karan Mitra, Dimitrios Georgakopoulos:
MediaWise cloud content orchestrator. 2:1-2:14 - Gustavo Prado Alkmim, Daniel Macêdo Batista, Nelson L. S. da Fonseca:
Mapping virtual networks onto substrate networks. 3:1-3:15 - Meirong Liu, Erkki Harjula, Mika Ylianttila:
An efficient selection algorithm for building a super-peer overlay. 4:1-4:12 - Keiko Hashizume, David Garcia Rosado, Eduardo Fernández-Medina, Eduardo B. Fernández:
An analysis of security issues for cloud computing. 5:1-5:13 - Fady Samuel, Mosharaf Chowdhury, Raouf Boutaba:
PolyViNE: policy-based virtual network embedding across multiple domains. 6:1-6:23 - Kleber Stroeh, Edmundo Roberto Mauro Madeira, Siome Klein Goldenstein:
An approach to the correlation of security events based on machine learning techniques. 7:1-7:16 - Ahmed Mihoob, Carlos Molina-Jiménez, Santosh K. Shrivastava:
Consumer-centric resource accounting in the cloud. 8:1-8:16 - Guang Cheng, Yongning Tang:
PortView: identifying port roles based on port fuzzy macroscopic behavior. 9:1-9:12 - Jason Milad Daivandy, Denis Hünich, René Jäkel, Steffen Metzger, Ralph Müller-Pfefferkorn, Bernd Schuller:
Heterogeneous resource federation with a centralized security model for information extraction. 10:1-10:14 - Christian Senk:
Adoption of security as a service. 11:1-11:16 - Sérgio Esteves, João Nuno de Oliveira e Silva, Luís Veiga:
F l u χ: a quality-driven dataflow model for data intensive computing. 12:1-12:23 - Paul Rabinovich:
Secure cross-domain cookies for HTTP. 13:1-13:12 - Vincent Wing-Hei Luk, Albert Kai-Sun Wong, Chin-Tau A. Lea, Wentao Robin Ouyang:
RRG: redundancy reduced gossip protocol for real-time N-to-N dynamic group communication. 14:1-14:19 - Malik Loudini, Sawsen Rezig, Yahia Salhi:
Incorporate intelligence into the differentiated services strategies of a Web server: an advanced feedback control approach. 15:1-15:16 - Lincoln David, Rafael Vasconcelos, Lucas Alves, Rafael André, Markus Endler:
A DDS-based middleware for scalable tracking, communication and collaboration of mobile nodes. 16:1-16:15 - Khalid Elgazzar, Ali Ejaz, Hossam S. Hassanein:
AppaaS: offering mobile applications as a cloud service. 17:1-17:12 - Fernando Costa, Luís Veiga, Paulo Ferreira:
Internet-scale support for map-reduce processing. 18:1-18:17 - Yanik Ngoko, Alfredo Goldman, Dejan S. Milojicic:
Service selection in web service compositions optimizing energy consumption and service response time. 19:1-19:12 - Yongning Tang, Guang Cheng, James T. Yu, Bin Zhang:
Catching modern botnets using active integrated evidential reasoning. 20:1-20:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.