Search
Now showing items 1-10 of 28
Correcting Routing Failures Using Declarative Policies and Argumentation
(2010-04-28)
Many Internet failures are caused by misconfigurations of the BGP routers that manage rout-ing of traffic between domains. The problems are usually due to a combination of human er-rors and the lack of a high-level language ...
A Declarative Approach for Secure and Robust Routing
(ACM, 2010-10-04)
Many Internet failures are caused by misconfigurations of the BGP routers that manage routing of traffic between domains. The problems are usually due to a combination of human errors and the lack of a high-level language ...
Enforcing Secure and Robust Routing with Declarative Policies
(IEEE, 2010-10-31)
Internet routers must adhere to many polices governing the selection of paths that meet potentially complex constraints on length, security, symmetry and organizational preferences. Many routing problems are caused by their ...
Utilizing semantic policies for managing BGP route dissemination
(IEEE, 2008-04-13)
Policies in BGP are implemented as routing configurations that determine how route information is shared among neighbors to control traffic flows across networks. This process is generally template driven, device centric, ...
Utilizing Semantic Tags for Policy Based Networking
(IEEE, 2007-11-26)
Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network management, access control etc. However, commonly used ...
Utilizing Semantic Policies for Secure BGP Route Dissemination
(2007-09-27)
Policies in BGP are expressed as routing configurations that determine how route information is shared among neighbors to control traffic flows across networks. This process is limited in its expressibility, time consuming ...
Collaborative Joins in a Pervasive Computing Environment
(Springer-Verlag Berlin, 2005-04-01)
Locating and obtaining context sensitive information in a mobile environment has always been a challenge.
This is especially true for pervasive computing environments where in addition to limited computing and
battery ...
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
(Springer Nature Switzerland AG., 2006-06-09)
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing environments. Available resources include ...
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
(IEEE, 2004-07-19)
We describe a new smart meeting room system called EasyMeeting that explores the use of FIPA agent technologies, Semantic Web ontologies, logic reasoning, and security and privacy policies. Building on a pervasive computing ...
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications
(IEEE, 2004-08-22)
We describe a shared ontology called SOUPA – Standard
Ontology for Ubiquitous and Pervasive Applications.
SOUPA is designed to model and support pervasive computing
applications. This ontology is expressed using the ...