X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (181) 181
Journal Article (122) 122
Book Chapter (17) 17
Dissertation (5) 5
Book / eBook (2) 2
Government Document (1) 1
Magazine Article (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
policy-based management (88) 88
computer science (79) 79
science & technology (59) 59
technology (59) 59
security (37) 37
cloud computing (36) 36
computer science, information systems (32) 32
computer architecture (31) 31
policy based management (31) 31
quality of service (31) 31
telecommunications (29) 29
engineering (28) 28
studies (27) 27
computer communication networks (26) 26
computer networks (25) 25
access control (24) 24
policies (24) 24
management (21) 21
resource management (20) 20
policy-based computing (19) 19
policy-based network management (19) 19
autonomic computing (18) 18
protocols (18) 18
servers (18) 18
decision making (16) 16
monitoring (16) 16
algorithms (15) 15
engineering, electrical & electronic (15) 15
communications engineering, networks (14) 14
policy-based (14) 14
computer science, software engineering (13) 13
context (13) 13
network management systems (13) 13
policy (13) 13
privacy (13) 13
computer network management (12) 12
software engineering (12) 12
analysis (11) 11
distributed computing (11) 11
information systems and communication service (11) 11
internet (11) 11
internet of things (11) 11
ip networks (11) 11
mobile computing (11) 11
network management (11) 11
policy-based access control (11) 11
processor architectures (11) 11
technology management (11) 11
computer systems organization and communication networks (10) 10
middleware (10) 10
networks (10) 10
architecture (9) 9
computational modeling (9) 9
computer science, hardware & architecture (9) 9
computer simulation (9) 9
context-aware services (9) 9
electronic and computer engineering (9) 9
grid computing (9) 9
pervasive computing (9) 9
business (8) 8
collaboration (8) 8
computer science, theory & methods (8) 8
context awareness (8) 8
data security (8) 8
educational institutions (8) 8
management of computing and information systems (8) 8
organizations (8) 8
peer to peer computing (8) 8
sensors (8) 8
simulation (8) 8
web services (8) 8
wireless networks (8) 8
ad hoc networks (7) 7
algorithm design and analysis (7) 7
artificial intelligence (7) 7
automation (7) 7
control systems (7) 7
information systems applications (7) 7
operations research/decision theory (7) 7
real-time systems (7) 7
routing (7) 7
self-management (7) 7
ubiquitous computing (7) 7
wireless sensor networks (7) 7
adaptive systems (6) 6
authorization (6) 6
autonomic communications (6) 6
availability (6) 6
bandwidth (6) 6
business information systems (6) 6
circuits and systems (6) 6
context modeling (6) 6
dacs scheme (6) 6
environmental management (6) 6
hardware (6) 6
information security (6) 6
information technology (6) 6
local area networks (6) 6
mathematical models (6) 6
networking and internet architecture (6) 6
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal Article
IEEE transactions on multimedia, ISSN 1941-0077, 10/2018, Volume 20, Issue 10, pp. 2562 - 2577
Journal Article
Arabian journal for science and engineering (2011), ISSN 2193-567X, 08/2017, Volume 42, Issue 8, pp. 3357 - 3373
There have been many systems available for parallel and distributed computing (PDC) applications such as grids, clusters, super-computers, clouds, peer-to-peer and volunteer computing systems... 
Parallel and distributed computing | Simulation | High-performance computing | Policy-based management | Science & Technology - Other Topics | Multidisciplinary Sciences | Science & Technology
Journal Article
International journal of pervasive computing and communications, ISSN 1742-7371, 04/2015, Volume 11, Issue 1, pp. 43 - 68
... should be provided for ubiquitous computing environments. Ubiquitous computing targets the provision of seamless services and applications by providing an environment that involves a variety of devices having different capabilities... 
Health care | Pervasive computing | WSN | Context-aware | Policy-based | FlexRFID | RFID | Performance | Security | Middleware | Access control | Supply chain management | Electronic devices | Policies | Library management | Decision making | Ubiquitous computing | Ambient intelligence | Design | Wireless communications | Network topologies | Inventory control | Libraries | Sensors | Radio frequency identification
Journal Article
Cluster computing, ISSN 1386-7857, 07/2012, Volume 16, Issue 4, pp. 707 - 724
In this paper we present SNUAGE, a platform-as-a-service security framework for building secure and scalable multi-layered services based on the cloud computing model... 
Processor Architectures | Data confidentiality | Policy-based security | Cloud computing security | Platform-as-a-Service security | Computer Science | Computer Communication Networks | Operating Systems | Integrity | Computer Science, Information Systems | Computer Science, Theory & Methods | Technology | Science & Technology | Cloud computing
Journal Article
Computers & security, ISSN 0167-4048, 06/2017, Volume 67, pp. 232 - 243
With the rapid development of mobile applications and online social networks, users often encounter a frustrating challenge to set privacy and security... 
Policy based management | Socialized policy administration | Social computing | Mobile applications | Android | Computer Science, Information Systems | Technology | Computer Science | Science & Technology | Social networks | Security management | Instant messaging
Journal Article
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), 05/2012, pp. 164 - 171
We propose a policy-based framework for the automated establishment of SLAs for cloud computing services... 
Context | Protocols | Computational modeling | Decision making | policy-based framework | interaction protocol | SLA | decision-making strategy | IP networks | Context modeling
Conference Proceeding
ARPN journal of engineering and applied sciences, 04/2016, Volume 11, Issue 7, pp. 4485 - 4491
Journal Article
Journal of network and computer applications, ISSN 1084-8045, 02/2017, Volume 79, pp. 68 - 87
Journal Article
International journal of software engineering and knowledge engineering, ISSN 0218-1940, 10/2016, Volume 26, Issue 8, pp. 1255 - 1283
Autonomic and self-* systems of all kinds are expected to operate in a stable and predictable way. This in a natural way implies the need for pre-deployment... 
Petri nets | AGILE policy | Policy-based computing | Engineering | Technology | Computer Science | Engineering, Electrical & Electronic | Computer Science, Artificial Intelligence | Computer Science, Software Engineering | Science & Technology
Journal Article
2017, Synthesis Lectures on Information Concepts, Retrieval, and Services, ISBN 9781627059725, Volume 57, 131
Policy-based data management enables the creation of community-specific collections. Every collection is created for a purpose. The purpose defines the set of... 
Computing and Processing | Database management | Computer programs | iRODS (Computer system)
eBook
2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2015, 12/2015, pp. 1 - 6
Autonomous service adaptation in cloud environments requires both location-awareness and the acquisition and utilization of contextual information. Statically... 
mobility | location tracking | quality of service | location prediction | cloud computing | Policy-based management | Electrical engineering | Networks | Cloud computing | Computer simulation | Conferences | Tracking (position) | Real time | Adaptation
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9311, pp. 120 - 133
Conference Proceeding
Proceedings of the Fourth International Workshop on Network-Aware Data Management, 11/2014, pp. 1 - 8
Conference Proceeding
2019 Global IoT Summit (GIoTS), 06/2019, pp. 1 - 6
In recent years, Fog computing has been proposed to complement well-known Cloud components, in order to realize delay-sensitive and location-aware services... 
Cloud computing | Policy-based orchestration | Computer architecture | Fog Computing | Real-time systems | C-ITS | Internet of Things | Security | Resource management | Edge computing
Conference Proceeding
Communications in Computer and Information Science, ISSN 1865-0929, 2011, Volume 187, pp. 130 - 137
Conference Proceeding
IEICE transactions on communications, ISSN 0916-8516, 2008, Volume E91-B, Issue 12, pp. 4009 - 4012
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.