Skip to main content
This paper presents an optimization framework for finding efficient deployment mappings of replicated service components (to nodes), while accounting for multiple services simultaneously and adhering to non-functional requirements.... more
    • by  and +2
    •   4  
      Ant Colony OptimizationNon Functional RequirementLoad BalanceSelf Organizing Systems
The ISO/ITU standard MPEG is expected to be of extensive use for the transfer of video/ moving pictures traffic in the coming ATM high capacity networks. This traffic will stem from both multimedia services like teleconferencing and video... more
    • by  and +1
    •   2  
      Importance SamplingMultimedia Services
Cell losses should be extremely rare events in ATM systems. An end-to-end loss rate of 10 -9 is a typical objective. In spite of this, cell losses represent severe service degradations, and measurements of cell losses are important to... more
    • by  and +1
    •   3  
      Real TimeImportance SamplingCarrying Capacity
We investigate a means for efficient deployment of distributed services comprising of software components. Our work can be viewed as an intersection between model-based service development and novel network management architectures. In a... more
    • by  and +1
We address the problem of efficient deployment of software services into a networked environment. Services are considered that are provided by collaborating components. The problem of obtaining efficient mappings for components to host in... more
    • by  and +1
    •   2  
      Quality of ServiceHeuristic algorithm
We study the problem of efficient deployment of software components in a service engineering context. Run-time manipulation, adaptation and composition of entities forming a distributed service is a multi-faceted problem challenged by a... more
    • by  and +1
    •   11  
      Network ManagementSystem DesignArtificial IntelligentNon Functional Requirement
The ISO/ITU standard MPEG is expected to be of extensive use for the transfer of video/ moving pictures traffic in the coming ATM high capacity networks. This traffic will stem from both multimedia services like teleconferencing and video... more
    • by  and +2
    •   2  
      Importance SamplingMultimedia Services
Cell losses should be extremely rare events in ATM systems. An end-to-end loss rate of 10 -9 is a typical objective. In spite of this, cell losses represent severe service degradations, and measurements of cell losses are important to... more
    • by  and +1
    •   3  
      Real TimeImportance SamplingCarrying Capacity
Combinatorial optimization algorithms are used in many and diverse applica- tions; for instance, in the planning, management, and operation of manufacturing and logistic systems and communication networks. For scalability and... more
    • by  and +2
    •   8  
      Combinatorial OptimizationSwarm IntelligenceNetwork ManagementReal Time
Virtual path management in dynamic networks poses a number of challenges related to combinatorial optimisation, fault and traffic handling. Ideally such management should react immediately on changes in the operational conditions, and be... more
    • by  and +1
    •   7  
      Swarm IntelligenceNetwork ManagementCase StudyCombinatorial optimisation
This paper describes a trace driven, fast simulation approach applicable to deal with the performance evaluation of a multiplex of heterogeneous traffic streams with variable bit rate and long lived serial correlation offered routers in... more
    • by  and +1
The notion of speci®cation frameworks transposes the framework approach from software development to the level of formal modeling and analysis. A speci®cation framework is devoted to a special application domain. It supplies reusable... more
    • by 
    • Model Based Systems Engineering
Presently, many communication protocols are under development which are tailored to the e cient high-speed data transfer meeting di erent application-speci c requirements. Our approach concentrates on a framework which facilitates the... more
    • by 
    • Model Based Systems Engineering
Software component technology on the one hand supports the cost-effective development of specialized applications. On the other hand, however it introduces special security problems. Some major problems can be solved by the automated... more
    • by 
    •   2  
      TrustTrust Management
Component-structured software, which is coupled from independently developed software components, introduces new security problems. In particular, a component may attack components of its environment and, in consequence, spoil the... more
    • by 
    • Model Based Systems Engineering
    • by 
    •   2  
      Network SecurityModel Based Systems Engineering
Transfer protocols are composed from basic protocol mechanisms and accordingly a complex protocol can be veri ed by a series of relatively simple mechanism proofs. Our approach applies L. Lamport's Temporal Logic of Actions (TLA). It is... more
    • by 
    • Model Based Systems Engineering
    • by 
    • Model Based Systems Engineering
Software component technology supports the cost-effective design of applications suited to the particular needs of the application owners. This design method, however, causes two new security risks. At first, a malicious component may... more
    • by 
    •   3  
      TrustTrust ManagementModel Based Systems Engineering
The purpose of this paper is to formally describe new optimization models for distributed telecommunication networks. Modern distributed networks put more focus on the processing of information and less on the actual transportation of... more
    • by  and +1
    •   2  
      Telecommunication NetworksDecision Support