Results 21 to 30 of about 36,043 (85)

Optimal Orchestration of Virtual Network Functions [PDF]

open access: yes, 2017
-The emergence of Network Functions Virtualization (NFV) is bringing a set of novel algorithmic challenges in the operation of communication networks. NFV introduces volatility in the management of network functions, which can be dynamically orchestrated,
Addis, Bernardetta   +3 more
core   +1 more source

ANALISA KEMAMPUAN TRANSVER DATA VPN BERBASIS OPEN SOURCE PADA KONDISI ENCRIPSI-DEKSCRIPSI DAN KOMPRENSI-DEKOMPRENSI

open access: yesJurnal Informatika, 2019
Virtual Private Network (VPN) merupakan tekhnologi komunikasi yang memungkinkan jaringan lokal bisa saling terkoneksi lewat jaringan publik. Keuntungan menggunakan Virtual Private Network (VPN) adalah dengan menggunakan jaringan publik, akan mendapatkan ...
Ronal Watrianthos, M. Nasution
semanticscholar   +1 more source

Roles of triaxiality and residual interaction in signature inversions of A~130 odd-odd nuclei

open access: yes, 1993
Rotational bands with (neutron h_11/2)^1 (proton h_11/2)^1 configurations are studied using a particle-rotor model in which a proton and a neutron quasiparticles interacting through a zero-range force are coupled with a triaxial rotor.
Andersson   +43 more
core   +1 more source

Web based system architecture for long pulse remote experimentation [PDF]

open access: yes, 2010
Remote experimentation (RE) methods will be essential in next generation fusion devices. Requirements for long pulse RE will be: on-line data visualization, on-line data acquisition processes monitoring and on-line data acquisition systems interactions ...
Barrera   +15 more
core   +2 more sources

On Usual, Virtual and Welded knotted objects up to homotopy

open access: yes, 2016
We consider several classes of knotted objects, namely usual, virtual and welded pure braids and string links, and two equivalence relations on those objects, induced by either self-crossing changes or self-virtualizations. We provide a number of results
Audoux, Benjamin   +3 more
core   +3 more sources

Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture [PDF]

open access: yes, 2020
The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures.
Hyland, Joe
core   +1 more source

Deploying elastic routing capability in an SDN/NFV-enabled environment [PDF]

open access: yes, 2015
SDN and NFV are two paradigms that introduce unseen flexibility in telecom networks. Where previously telecom services were provided by dedicated hardware and associated (vendor-specific) protocols, SDN enables to control telecom networks through ...
Colle, Didier   +6 more
core   +1 more source

Penerapan Metode Open Vpn-access Server sebagai Rancangan Jaringan Wide Area Network [PDF]

open access: yes, 2015
The development of information technology has developed rapidly from year to year. The use of the Internet as a very useful addition to mediation communications but still has weaknesses in its security.Ecosystem service assurance is one unit of work on ...
Badru, M. (Mohammad)   +1 more
core  

Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF)

open access: yesInfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan), 2019
Akses terhadap sebuah jaringan lokal yang bersifat terbatas untuk pihak tertentu dapat dilakukan dari jaringan publik dengan memanfaatkan Virtual Private Network (VPN). Akses tersebut dilakukan melalui internet dengan memanfaatkan VPN.
Hari Antoni Musril
semanticscholar   +1 more source

A model for the analysis of security policies in service function chains

open access: yes, 2017
Two emerging architectural paradigms, i.e., Software Defined Networking (SDN) and Network Function Virtualization (NFV), enable the deployment and management of Service Function Chains (SFCs).
Durante, L.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy