


default search action
Journal of Internet Services and Applications, Volume 4
Volume 4, Number 1, December 2013
- Morris Riedel
, Peter Wittenburg, Johannes Reetz
, Mark van de Sanden
, Jedrzej Rybicki, Benedikt von St. Vieth, Giuseppe Fiameni, Giacomo Mariani, Alberto Michelini
, Claudio Cacciari, Willem Elbers, Daan Broeder, Robert Verkerk, Elena Erastova, Michael Lautenschlaeger, Reinhard Budig, Hannes Thiemann, Peter V. Coveney, Stefan J. Zasada, Ali Nasrat Haidar, Otto Buechner, Cristina Manzano
, A. Shiraz Memon, Ahmed Shiraz Memon
, Heikki Helin, Jari Suhonen, Damien Lecarpentier, Kimmo Koski, Thomas Lippert:
A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service. 1:1-1:17 - Rajiv Ranjan
, Karan Mitra
, Dimitrios Georgakopoulos
:
MediaWise cloud content orchestrator. 2:1-2:14 - Gustavo Prado Alkmim, Daniel Macêdo Batista
, Nelson L. S. da Fonseca
:
Mapping virtual networks onto substrate networks. 3:1-3:15 - Meirong Liu, Erkki Harjula, Mika Ylianttila
:
An efficient selection algorithm for building a super-peer overlay. 4:1-4:12 - Keiko Hashizume, David Garcia Rosado
, Eduardo Fernández-Medina
, Eduardo B. Fernández:
An analysis of security issues for cloud computing. 5:1-5:13 - Fady Samuel, Mosharaf Chowdhury, Raouf Boutaba:
PolyViNE: policy-based virtual network embedding across multiple domains. 6:1-6:23 - Kleber Stroeh, Edmundo Roberto Mauro Madeira
, Siome Klein Goldenstein:
An approach to the correlation of security events based on machine learning techniques. 7:1-7:16 - Ahmed Mihoob, Carlos Molina-Jiménez, Santosh K. Shrivastava:
Consumer-centric resource accounting in the cloud. 8:1-8:16 - Guang Cheng, Yongning Tang:
PortView: identifying port roles based on port fuzzy macroscopic behavior. 9:1-9:12 - Jason Milad Daivandy, Denis Hünich, René Jäkel
, Steffen Metzger, Ralph Müller-Pfefferkorn
, Bernd Schuller
:
Heterogeneous resource federation with a centralized security model for information extraction. 10:1-10:14 - Christian Senk:
Adoption of security as a service. 11:1-11:16 - Sérgio Esteves, João Nuno de Oliveira e Silva, Luís Veiga
:
F l u χ: a quality-driven dataflow model for data intensive computing. 12:1-12:23 - Paul Rabinovich:
Secure cross-domain cookies for HTTP. 13:1-13:12 - Vincent Wing-Hei Luk, Albert Kai-Sun Wong
, Chin-Tau A. Lea
, Wentao Robin Ouyang:
RRG: redundancy reduced gossip protocol for real-time N-to-N dynamic group communication. 14:1-14:19 - Malik Loudini, Sawsen Rezig, Yahia Salhi:
Incorporate intelligence into the differentiated services strategies of a Web server: an advanced feedback control approach. 15:1-15:16 - Lincoln David, Rafael Vasconcelos
, Lucas Alves, Rafael André, Markus Endler:
A DDS-based middleware for scalable tracking, communication and collaboration of mobile nodes. 16:1-16:15 - Khalid Elgazzar, Ali Ejaz, Hossam S. Hassanein
:
AppaaS: offering mobile applications as a cloud service. 17:1-17:12 - Fernando Costa, Luís Veiga
, Paulo Ferreira:
Internet-scale support for map-reduce processing. 18:1-18:17 - Yanik Ngoko, Alfredo Goldman
, Dejan S. Milojicic
:
Service selection in web service compositions optimizing energy consumption and service response time. 19:1-19:12 - Yongning Tang, Guang Cheng, James T. Yu, Bin Zhang:
Catching modern botnets using active integrated evidential reasoning. 20:1-20:10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.