Results 271 to 280 of about 8,415,746 (332)
Some of the next articles are maybe not open access.
DYVINE: Fitness-Based Dynamic Virtual Network Embedding in Cloud Computing
IEEE Journal on Selected Areas in Communications, 2019Virtual network embedding (VNE) is the process of embedding the set of interconnected virtual machines onto the set of interconnected physical servers (PSs) in the cloud computing environment. The level of complexity of VNE problem increases when a large
C. Dehury, P. Sahoo
semanticscholar +1 more source
ACM SIGOPS Operating Systems Review, 2010
Over a decade ago, virtual networking started with a simple bridging of VM's virtual network adapter to host's physical network adapter in VMware's Workstation product. With VMware's vSphere 4 product, virtual networking has evolved to a distributed virtual networking infrastructure with pluggable packet switching and filtering modules, under the ...
openaire +1 more source
Over a decade ago, virtual networking started with a simple bridging of VM's virtual network adapter to host's physical network adapter in VMware's Workstation product. With VMware's vSphere 4 product, virtual networking has evolved to a distributed virtual networking infrastructure with pluggable packet switching and filtering modules, under the ...
openaire +1 more source
Interoperable networked virtual environments
Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241), 2002The interoperability between heterogeneous distributed virtual environments is one of the main problem virtual reality will have to face in the very near future. This article presents the main concepts we propose in NOVA (Networked Open Virtual Environment).
Soto, Michel, Allongue, Sébastien
openaire +2 more sources
User Programmable Virtualized Networks
2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06), 2006This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that developers can program as part of a users application. The use of special tokens in data or control packets is the basis of a practical, yet powerful security and AAA ...
Meijer, R.J. +3 more
openaire +2 more sources
2005
Today small businesses, public schools, local governments, universities, international conglomerates, and nonprofit agencies all feel the pressure to have informative and interactive presences on the Web. This new Web-based information economy has helped to significantly narrow the gap between the technical writing needs of profit and nonprofit ...
openaire +1 more source
Today small businesses, public schools, local governments, universities, international conglomerates, and nonprofit agencies all feel the pressure to have informative and interactive presences on the Web. This new Web-based information economy has helped to significantly narrow the gap between the technical writing needs of profit and nonprofit ...
openaire +1 more source
Machine Learning-Driven Scaling and Placement of Virtual Network Functions at the Network Edges
IEEE Conference on Network Softwarization, 2019Network Function Virtualization is a promising technology that proposes to decouple the network functions from their underlying hardware and transform them into software entities called Virtual Network Functions (VNFs).
T. Subramanya, R. Riggio
semanticscholar +1 more source
Parametrized complexity of virtual network embeddings: dynamic & linear programming approximations
CCRV, 2019This paper makes the case for a parametrized complexity approach to tackle the fundamental but notoriously hard Virtual Network Embedding Problem. In particular, we show that the structure of the to-be-embedded virtual network requests can be exploited ...
Olivier Bonaventure
semanticscholar +1 more source
BT Technology Journal, 2000
Existing technologies, including frame relay and ATM, can be used to create virtual private networks (VPNs) over a shared infrastructure. However, two new technologies, tag switching and IP security, may be used to create IP VPNs that are independent of the access network and the core technology. This paper examines these technologies, compares them to
S Hills, D McGlaughlin, N Hanafi
openaire +1 more source
Existing technologies, including frame relay and ATM, can be used to create virtual private networks (VPNs) over a shared infrastructure. However, two new technologies, tag switching and IP security, may be used to create IP VPNs that are independent of the access network and the core technology. This paper examines these technologies, compares them to
S Hills, D McGlaughlin, N Hanafi
openaire +1 more source
LS-SDV: Virtual Network Management in Large-Scale Software-Defined IoT
IEEE Journal on Selected Areas in Communications, 2019Internet of Things (IoT) becomes a very important area for providing various services on connected smart devices. For the isolation of different services in IoT, software-defined networking (SDN)-based virtual networks will be a scalable and flexible ...
He Li, K. Ota, M. Dong
semanticscholar +1 more source
Elastic virtualized network services
2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET), 2012As public could offerings get more numerous and a growing number of enterprises embrace cloud-based IT solutions, the shortcomings of deploying traditional network gear and architectures in virtualized environments become more apparent. In scenarios where (virtual) end-systems are dynamically provisioned, dimensioned, and moved, the network services ...
BALDI, MARIO, Marco Di Benedetto
openaire +2 more sources

