Digitala Vetenskapliga Arkivet

Endre søk
Begrens søket
1 - 4 of 4
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1. Fiedler, Markus
    On resource sharing and careful overbooking for network virtualization2011Inngår i: International Journal of Communication Networks and Distributed Systems, ISSN 1754-3916, E-ISSN 1754-3924, Vol. 6, nr 3, s. 232-248Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Network Virtualization implies the need for sharing network resources. However, exclusive resource allocation to users drives blocking probabilities and cost while potentially leaving precious resources under-utilized in constrained environments. Motivated by these observations, this paper analyzes careful overbooking according to Service Level Agreements that specify desired degrees of availability. Besides of full availability of the requested resources, a second level of limited availability, implying a well-defined reduction of the allocated resource, is taken into account. Particular attention is paid to the gain borderline, representing the possibility of accommodating one extra user beyond exclusive allocation without violating the SLAs. Simple but telling formulae provide insights into requirements for careful overbooking, worst-case capacity reduction factors from full to limited availability, and the conditions under which it is sensible to integrate users with different activity levels. We also link capacity reductions to potential decreases in Quality of Experience.

  • 2. Fiedler, Markus
    et al.
    Tran-Gia, Phuoc
    Performance assessment for new internet services2010Inngår i: International Journal of Communication Networks and Distributed Systems, ISSN 1754-3916, E-ISSN 1754-3924, Vol. 4, nr 2, s. 131-132Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Internet has shown to be the major enabler for a large variety of services via a common infrastructure. Since early applications such as remote login, e-mail, file transfer and web browsing, many new applications and services have entered the stage, where overlay networks play an important role. When broadband access technologies reached private users, file sharing became popular. Telecommunication providers have discovered internet technology as a cost-saving alternative to classical telecom technology. 3GPP has standardised the IP multimedia system (IMS), which is nowadays also used in the world of fixed access networks to handle the coexistence of voice, TV and internet (so-called Triple Play) on access links. New application domains such as e-health, e-government, e-tourism, etc., have emerged. Many new services use other services, forming composite services or service supply chains based on internet. So, the ‘anything-over-IP-over-anything’ principle has become a reality. This emergence of new applications raises challenges. The internet has never been designed for fulfilling all imaginable application’s needs, nor to maximise user’s quality of experience (QoE). During the years, the basic best-effort paradigm has been enhanced by network-level quality of service (QoS) measures. Still, internet packet delivery cannot be guaranteed. Applications try to adapt themselves to these volatile conditions, e.g., by modifying the intensity of the data flows or adding some kind of redundancy to be used for error correction, which fits the internet principle of end-to-end control. However, in order to reach the right interplay between applications and services and the internet infrastructure, a good understanding of the characteristics of both is mandatory. On this background, this special issue focuses on performance assessment of contemporary, new and emerging applications and services using the internet.

  • 3.
    Lorentzen, Charlott
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Fiedler, Markus
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Johnson, Henric
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    On user perception of safety in online social networks2013Inngår i: International Journal of Communication Networks and Distributed Systems, ISSN 1754-3916, E-ISSN 1754-3924, Vol. 11, nr 1, s. 77-91Artikkel, forskningsoversikt (Fagfellevurdert)
    Abstract [en]

    Today, many people share personal information through online social networks. While these networks offer tremendous facilities to share one's life with family, friends and the outer world, users are also exposed to the risk to get their accounts compromized, with consequences for their professional and private lives. A strong password can help to ensure privacy, while in contrast, a weak password may lead to a compromized account. On the other hand, it is observed that users tend to shortcut laborious and time-consuming security measures, which alleges that their perception of their safety on the social network might deviate from the real safety situation. In this article, we investigate how users of social networks perceive safety, and to which extent they contribute to it. First, we examine the question in which way and to which extent a user's perception of safety is affected by increased response times. An investigation was conducted for teenage users of the online social network Facebook. Its results indicate that the users' perception of safety differs significantly in face of increased response times that usually imply worse Quality of Experience. Second, in order to find out to which extent users are aware of the risks associated with weak passwords as well as what measures have been taken to keep themselves secure and to ensure privacy, a survey about password complexity in online social networks was conducted with Swedish users. Our results of the survey indicate differences in password complexity between teenagers with different levels of technical education.

  • 4.
    Rahmani, Rahim
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Firouzi, Ramin
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Gateway Controller with Deep Sensing: Learning to be Autonomic in Intelligent Internet of Things2021Inngår i: International Journal of Communication Networks and Distributed Systems, ISSN 1754-3916, E-ISSN 1754-3924, Vol. 26, nr 1, s. 1-29Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The Internet of Things(IoT) will revolutionize the Future Internet through ubiquitous sensing. One of the challenges of having the hundreds of billions of devices that are estimated to be deployed would be rise of an enormous amount of data, along with the devices ability to manage. This paper presents an approach as a controller solution and designed specifically for autonomous management, connectivity and data interoperability in an IoT gateway. The approach supports distributed IoT nodes with both management and data interoperability with other cloud-based solutions. The concept further allows gateways to easily collect and process interoperability of data from IoT devices. We demonstrated the feasibility of the approach and evaluate its advantages regarding deep sensing and autonomous enabled gateway as an edge computational intelligence.

1 - 4 of 4
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf