Academic literature on the topic 'Network services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Network services"

1

Mahmudova, S. "SOCIAL NETWORKING SERVICES." Slovak international scientific journal, no. 83 (May 14, 2024): 24–25. https://doi.org/10.5281/zenodo.11188937.

Full text
Abstract:
In the article, the services of Internet-media and social networks, this potential world trade, implementation of network monitoring, as well as production in the field of monitoring Internet-media resources, etc. investigated in studies. Nowadays, everyone can benefit from social networks. It can be network usage or otherwise oriented. Shab provides the abundance and availability of information, making the learning process more optimal and comfortable. Over the past 10 years, online social networks have become integral parts.
APA, Harvard, Vancouver, ISO, and other styles
2

Anusha, L., and G. S. Nagaraja. "Mobile Cloud Computing Provides Service Availability using A Context Aware Architecture." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 1 (May 30, 2021): 252–55. https://doi.org/10.35940/ijrte.A5924.0510121.

Full text
Abstract:
Mobile systems are becoming increasingly important, and new promising paradigms such as Mobile Cloud Computing. Mobile Cloud Computing is an application that allows data to be stored and processed outside of the mobile node. There is a lot of interest in using the resources that can be accessed by transparently using distributed resource pooling offered by nearby mobile nodes. This type of device is used in emergency, education, and tourism. Systems basically use dynamic network topologies in which network partitions and disconnection occurs frequently, so the availability of the services has been compromised. In this paper proposes the context aware architecture to provide availability of the services deployed in mobile and dynamic network environments which provides better response time, the services need not be migrated at real time, so the bandwidth and energy used has been more efficient.
APA, Harvard, Vancouver, ISO, and other styles
3

R L, Hemanth Kumar, Varsha N, and G. S. Nagaraja. "High Speed Network Design for Health Care Application Services via Cloud based Services." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 1553–58. http://dx.doi.org/10.22214/ijraset.2023.51604.

Full text
Abstract:
Abstract: This paper presents a design for high-speed networks for healthcare application activities and services via cloud-based services using Cisco Packet Tracer. The design includes a network topology that incorporates various healthcare applications such as telemedicine, electronic health records, medical imaging, and remote patient monitoring. We utilize Cisco Packet Tracer to simulate the network and evaluate its performance under different traffic loads and network conditions. The proposed network design takes into account key factors such as low latency, high throughput, and reliability, and includes techniques such as traffic engineering, QoS, and load balancing to optimize network performance. Our aim is to provide a practical implementation of high-speed networks for healthcare services using Cisco Packet Tracer, and to help healthcare organizations make informed decisions about network design for their cloud-based healthcare services.
APA, Harvard, Vancouver, ISO, and other styles
4

Twum, Frimpong, Kwadwo Asante, and Michael Asante. "Implementation of Network Services on IPV6 Networks." International Journal of Computer Applications 142, no. 5 (May 17, 2016): 11–16. http://dx.doi.org/10.5120/ijca2016909788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Planka, Daniela. "Network directory services." Library Hi Tech 8, no. 4 (April 1, 1990): 93–103. http://dx.doi.org/10.1108/eb047811.

Full text
Abstract:
The Directory (CCITT X.500/ISO 9594) is an international standard, which was ratified jointly by ISO and CCITT in December 1988. The standard describes the structure and services of a global, logically centralized but physically distributed, electronic network directory that will support the evolving telecommunications environment. Directory pilot projects are underway in both North America and Europe and commercial implementations of the Directory standard are becoming increasingly available. As the bibliographic community becomes more dependent on the use of networks, it is essential that library professionals understand the capabilities of this powerful new standard.
APA, Harvard, Vancouver, ISO, and other styles
6

Podlesny, Maxim, and Sergey Gorinsky. "Rd network services." ACM SIGCOMM Computer Communication Review 38, no. 4 (October 2008): 255–66. http://dx.doi.org/10.1145/1402946.1402988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

House, Robert G., and Lynn A. DeLozier. "Network services-outsourcing." International Journal of Network Management 1, no. 1 (September 1991): 39–43. http://dx.doi.org/10.1002/nem.4560010106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jacobs, Stephen, Paul Rouse, and Matthew Parsons. "Leading change within health services." Leadership in Health Services 27, no. 2 (April 28, 2014): 72–86. http://dx.doi.org/10.1108/lhs-10-2012-0033.

Full text
Abstract:
Purpose – Much health service delivery occurs within a network structure, with co-operation and competition coexisting. Leading change for successful outcomes is a difficult task even outside of this multi-layered complex context, with reports that up to two-thirds of change processes are unsuccessfully implemented. This can have a major impact on stress, effectiveness and efficiency. This paper aims to address these issues. Design/methodology/approach – Theories supporting a generic implementation system for managers were explored so that people placed into situations in which they needed to lead and manage change could access a systematic approach that enabled clarification of the network's goal(s), valid communication among members of the network, and performance measurement using indicators the network agrees are meaningful. Findings – The implementation pathway developed provides a change process leaders and managers of change can use within networks. Practical implications – Health service funders and managers will be helped by this systematic implementation process. Originality/value – Health service funders and managers will be assisted by the systematic implementation process.
APA, Harvard, Vancouver, ISO, and other styles
9

Buford, John. "Telecommunication Services and Service Management Challenges." JUCS - Journal of Universal Computer Science 7, no. (5) (May 28, 2001): 355–65. https://doi.org/10.3217/jucs-007-05-0355.

Full text
Abstract:
Trends in telecommunications networks including network convergence, requirements for QoS and service level agreements, and open service architectures are impacting the service mangement systems and processes. New results in three areas of IP service management are described. The architecture of a new platform for service management is presented. This is the first reported service assurance platform to use ASP technology as its infrastructure. A new performance mangement suite is described. This suite currently supports measurement and reporting of web and stream servers and VoIP softswitches. Finally, a recent result in customer care automation for processing large volumes of email sent to a customer care center is reviewed.
APA, Harvard, Vancouver, ISO, and other styles
10

Pshenichnikov, Anatoliy P., Victoria I. Korotkova, and Leonid S. Poskotin. "Promising infocommunication technologies and network services." H&ES Research 15, no. 3 (2023): 57–64. http://dx.doi.org/10.36724/2409-5419-2023-15-3-57-64.

Full text
Abstract:
The essence of the Fourth Industrial Revolution is not only the emergence of new technologies, but also the integration of existing ones in a single system available for widespread use. The technological revolution penetrates in all spheres of public life, automates production processes, and adjusts the connection between physical and computing resources. Such innovations as cyber-physical systems, artificial intelligence, big data, the Internet of Things, robotics, cloud technologies, space technologies, virtual reality and some others supported these transformations. New digital technologies can have both a positive and a negative impact on various spheres of society, for example: unemployment, inequality, economic development, security and others. The aim of the work is to obtain a minimum level of understanding of digital breakthrough technologies, to reveal their potential and their connection with the systemic changes caused by the industrial revolution. When considering the impact of breakthrough technologies on the implementation of the Fourth Industrial Revolution, a systematic methodology should be used. Promising technologies are considered that significantly affect the implementation of the industrial revolution. Discussion: graphical dependences of the speed of fixed communication networks in the implementation of their development concepts for the period 1960&2030 and graphical dependences of the speed of cellular mobile networks of generations 1G&6G for the period 1970&2030 are given. It is noted that the change of concepts for the development of fixed communication networks and generations of cellular mobile communication networks since 2000 are consistent in time in accordance with the "10&year rule". The evolution of technologies and services of cellular mobile and fixed-line networks is presented. In future networks, basic and composite network services are predicted. The paper briefly discusses basic network services with a list of necessary functions for the implementation of communications. Similarly, a brief analysis of composite network services and applications is presented, listing the network requirements for their implementation. In order to fully unlock the potential of innovative technologies and services of the industrial revolution, significant reforms are needed in the economic, social, political and spiritual spheres of society.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Network services"

1

Yang, Weilai. "Pricing Network Resources for Differentiated Service Networks." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5227.

Full text
Abstract:
We developed a price-based resource allocation scheme for Differentiated Service (DiffServ) data networks. The DiffServ framework was proposed to provide multiple QoS classes over IP networks. Since the provider supports multiple service classes, we need a differentiated pricing scheme, as supposed to the flat-rate scheme employed by the Internet service providers of today. Charging efficiently is a big issue. The utility of a client correlates to the amount of bandwidth allocated. One difficulty we face is that determining the appropriate amount of bandwidth to provision and allocate is problematic due to different time scales, multiple QoS classes and the unpredictable nature of users. To approach this problem, we designed a pricing strategy for Admission Control and bandwidth assignment. Despite the variety of existing pricing strategies, the common theme is that the appropriate pricing policy rewards users for behaving in ways to improve the overall utilization and performance of the network. Among existing schemes, we chose auction because it is scalable, and efficiently and fairly shares resources. Our pricing model takes the system's availability and each customer's requirements as inputs and outputs the set of clients who are admitted into the network and their allocated resource. Each client proposes a desired bandwidth and a price that they are willing to pay for it. The service provider collects this information and produces parameters for each class of service they provide. This information is used to decide which customers to admit. We proposed an optimal solution to the problem of maximizing the provider's revenue for the special case where there is only one bottleneck link in the network. Then for the generalized network, we resort to a simple but effective heuristic method. We validate both the optimal solution and the heuristic algorithm with simulations driven by a real traffic scenario. Finally, we allow customers to bid on the duration for which the service is needed. Then we study the performance of those heuristic algorithms in this new setting and propose possible improvements.
APA, Harvard, Vancouver, ISO, and other styles
2

Tang, Chen. "Forecasting Service Metrics for Network Services." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284505.

Full text
Abstract:
As the size and complexity of the internet increased dramatically in recent years,the burden of network service management also became heavier. The need foran intelligent way for data analysis and forecasting becomes urgent. The wideimplementation of machine learning and data analysis methods provides a newway to analyze large amounts of data.In this project, I study and evaluate data forecasting methods using machinelearning techniques and time series analysis methods on data collected fromthe KTH testbed. Comparing different methods with respect to accuracy andcomputing overhead I propose the best method for data forecasting for differentscenarios.The results show that machine learning techniques using regression can achievebetter performance with higher accuracy and smaller computing overhead. Timeseries data analysis methods have relatively lower accuracy, and the computingoverhead is much higher than machine learning techniques on the datasetsevaluated in this project.<br>Eftersom storleken och komplexiteten på internet har ökat dramatiskt under de senaste åren så har belastningen av nätverkshantering också blivit tyngre. Behovet av ett intelligent sätt för dataanalys och prognos blir brådskande. Den breda implementeringen av maskininlärningsmetoder och dataanalysmetoder ger ett nytt sätt att analysera stora mängder data.I detta projekt studerar och utvärderar jag dataprognosmetoder med hjälp av maskininlärningstekniker och analyser av tidsserier som samlats in från KTHtestbädden. Baserat på jämförelse av olika metoder med avseende på noggrannhet och beräkningskostnader, så föreslår jag föreslår den bästa metoden för dataprognoser för olika scenarier.Resultaten visar att maskininlärningstekniker som använder regression kan uppnå bättre prestanda med högre noggrannhet och mindre datoromkostnader. Metoderför dataanalys av tidsserier har relativt lägre noggrannhet, och beräkningsomkostnaderna är mycket högre än maskininlärningstekniker på de datauppsättningar som utvärderatsi detta projekt.
APA, Harvard, Vancouver, ISO, and other styles
3

Ruf, Lukas [Verfasser]. "Network Services on Service Extensible Routers / Lukas Ruf." Aachen : Shaker, 2006. http://d-nb.info/1170530850/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Hua. "Advanced intelligent network services." Thesis, University of Ottawa (Canada), 1996. http://hdl.handle.net/10393/9648.

Full text
Abstract:
The telecommunications industry is undergoing a fundamental revolution with the introduction of intelligent networks. In this thesis, we first give an overview of the intelligent network, which includes the review of the motivation, technology, evolution, standards, components and the open issues of the intelligent network. The emphasis of the thesis is put on the intelligent network service creation. Three AIN (Advanced Intelligent Network) services, namely, the call by name, the automatic telephone directory service and the information query service, are designed and implemented in the AIN Service Creation Environment (SCE). An AIN multimedia fax service which is a novel application of the AIN technology is proposed. With a gateway between the telephone network and the Internet, we use AIN to provide automatic addressing, dynamic routing and flexible selecting of document type for the multimedia fax service. The idea and the technique used in this AIN multimedia fax service bring up a new AIN service opportunity which allows telephone subscribers to access abundant Internet resources. The performance of this service is evaluated based on the simulation model of priority queuing system.
APA, Harvard, Vancouver, ISO, and other styles
5

Norangshol, Roy Sindre. "Open network topology services." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23100.

Full text
Abstract:
This master project examines whether there is an existing model fordescribing network topologies in abstract and generic manner. I alsolooked for networking protocols for exchanging network topologiesand handling of dynamically creation of circuit connections acrossdomains. I?ve also been working on a prototype for visualization ofnetwork topologies using Network Administration Visualized (NAV)as a data backend, and further to check the possibilities to use thefound topology model in my prototype.My findings shows that there is progress towards creating a stan-dard topology model to describe network topologies in an abstractand generic manner. There is also progress in creating a network ar-chitecture with networking protocols for exchanging network topolo-gies across domains and providing a connection reservation service tohandle creation of dynamically circuit connections. Prototype showsthere is lots of ideas for further works on what to implement in re-gards of the found network topology model and networking systemsthat was found.
APA, Harvard, Vancouver, ISO, and other styles
6

Shrinivas, V. Prasanna. "Pricing Multicast Network Services." Thesis, Indian Institute of Science, 2001. https://etd.iisc.ac.in/handle/2005/270.

Full text
Abstract:
Multicast has long been considered an attractive service for the Internet for the provision of multiparty applications. For over a decade now multicast has been a proposed IETF standard. Though there is a strong industry push towards deploying multicast, there has been little multicast deployment by commercial Internet Service Providers (ISPs) and more importantly most end-users still lack multicast capabilities. Depending on the underlying network infrastructure, the ISP has several options of implementing his multicast capabilities. With significantly faster and more sophisticated protocols being designed and prototyped, it is expected that a whole new gamut of applications that are delay sensitive will come into being. However, the incentives to resolve the conflicting interests of the ISPs and the end-users have to be provided for successful implementation of these protocols. Thus we arrive at the following economic questions: What is the strategy that will enable the ISP recover his costs ? How can the end-user be made aware of the cost of his actions ? Naturally, the strategies of the ISP and the end-user depend on each other and form an economic game. The research problems addressed in this thesis are: A pricing model that is independent of the underlying transmission protocols is prefered. We have proposed such a pricing scheme for multicast independent of the underlying protocols, by introducing the concept of pricing points* These pricing points provide a range of prices that the users can expect during a particular time period and tune their usage accordingly. Our pricing scheme makes both the sender and receiver accountable. Our scheme also provides for catering to heterogeneous users and gives incentive for differential pricing. We explore a number of formulations of resource allocation problems arising in communication networks as optimization models. Optimization-based methods were only employed for unicast congestion control. We have extended this method for single rate multicast. We have also devised an optimization-based approach for multicast congestion control that finds an allocation rate to maximize the social welfare. Finally we also show that the session-splitting problem can also be cast as an optimization problem. The commonly used "max-min" fairness criteria suffers from serious limitations like discriminating sessions that traverse large number of links and poor network utilization. We provide an allocation scheme that reduces discrimination towards multicast sessions that traverse many links and also improves network utilization.
APA, Harvard, Vancouver, ISO, and other styles
7

Shrinivas, V. Prasanna. "Pricing Multicast Network Services." Thesis, Indian Institute of Science, 2001. http://hdl.handle.net/2005/270.

Full text
Abstract:
Multicast has long been considered an attractive service for the Internet for the provision of multiparty applications. For over a decade now multicast has been a proposed IETF standard. Though there is a strong industry push towards deploying multicast, there has been little multicast deployment by commercial Internet Service Providers (ISPs) and more importantly most end-users still lack multicast capabilities. Depending on the underlying network infrastructure, the ISP has several options of implementing his multicast capabilities. With significantly faster and more sophisticated protocols being designed and prototyped, it is expected that a whole new gamut of applications that are delay sensitive will come into being. However, the incentives to resolve the conflicting interests of the ISPs and the end-users have to be provided for successful implementation of these protocols. Thus we arrive at the following economic questions: What is the strategy that will enable the ISP recover his costs ? How can the end-user be made aware of the cost of his actions ? Naturally, the strategies of the ISP and the end-user depend on each other and form an economic game. The research problems addressed in this thesis are: A pricing model that is independent of the underlying transmission protocols is prefered. We have proposed such a pricing scheme for multicast independent of the underlying protocols, by introducing the concept of pricing points* These pricing points provide a range of prices that the users can expect during a particular time period and tune their usage accordingly. Our pricing scheme makes both the sender and receiver accountable. Our scheme also provides for catering to heterogeneous users and gives incentive for differential pricing. We explore a number of formulations of resource allocation problems arising in communication networks as optimization models. Optimization-based methods were only employed for unicast congestion control. We have extended this method for single rate multicast. We have also devised an optimization-based approach for multicast congestion control that finds an allocation rate to maximize the social welfare. Finally we also show that the session-splitting problem can also be cast as an optimization problem. The commonly used "max-min" fairness criteria suffers from serious limitations like discriminating sessions that traverse large number of links and poor network utilization. We provide an allocation scheme that reduces discrimination towards multicast sessions that traverse many links and also improves network utilization.
APA, Harvard, Vancouver, ISO, and other styles
8

Tham, Kevin Wen Kaye. "Developing security services for network architectures." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16546/.

Full text
Abstract:
In the last 15 years, the adoption of enterprise level data networks had increased dramatically. This is mainly due to reasons, such as better use of IT resources, and even better coordination between departments and business units. These great demands have fuelled the push for better and faster connectivity to and from these networks, and even within the networks. We have moved from the slow 10Mbps to 1Gbps connectivity for end-point connections and moved from copper-based ISDN to fibre-linked connections for enterprise connections to the Internet. We now even include wireless network technologies in the mix, because of the greater convenience it offers. Such rapid progress is accompanied by ramifications, especially if not all aspects of networking technologies are improved linearly. Since the 1960s and 1970s, the only form of security had been along the line of authentication and authorisation. This is because of the widely used mainframes in that era. When the Internet and, ultimately, the wide-spread use of the Internet influxed in the 1980s, network security was born, and it was not until the late 1980s that saw the first Internet Worm that caused damage to information and systems on the Internet. Fast forward to today, and we see that although we have come a long way in terms of connectivity (connect to anywhere, and anytime, from anywhere else), the proposed use of network security and network security methods have not improved very much. Microsoft Windows XP recently switched from using their own authentication method, to the use of Kerberos, which was last revised 10 years ago. This thesis describes the many problems we face in the world of network security today, and proposes several new methods for future implementation, and to a certain extend, modification to current standards to encompass future developments. Discussion will include a proposed overview of what a secure network architecture should include, and this will lead into several aspects that can be improved on. All problems identified in this thesis have proposed solutions, except for one. The critical flaw found in the standard IEEE802.11 wireless technology was discovered during the course of this research. This flaw is explained and covered in great detail, and also, an explanation is given as to why this critical flaw is not fixable.
APA, Harvard, Vancouver, ISO, and other styles
9

Tham, Kevin Wen Kaye. "Developing security services for network architectures." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16546/1/Kevin_Wen_Kaye_Tham_Thesis.pdf.

Full text
Abstract:
In the last 15 years, the adoption of enterprise level data networks had increased dramatically. This is mainly due to reasons, such as better use of IT resources, and even better coordination between departments and business units. These great demands have fuelled the push for better and faster connectivity to and from these networks, and even within the networks. We have moved from the slow 10Mbps to 1Gbps connectivity for end-point connections and moved from copper-based ISDN to fibre-linked connections for enterprise connections to the Internet. We now even include wireless network technologies in the mix, because of the greater convenience it offers. Such rapid progress is accompanied by ramifications, especially if not all aspects of networking technologies are improved linearly. Since the 1960s and 1970s, the only form of security had been along the line of authentication and authorisation. This is because of the widely used mainframes in that era. When the Internet and, ultimately, the wide-spread use of the Internet influxed in the 1980s, network security was born, and it was not until the late 1980s that saw the first Internet Worm that caused damage to information and systems on the Internet. Fast forward to today, and we see that although we have come a long way in terms of connectivity (connect to anywhere, and anytime, from anywhere else), the proposed use of network security and network security methods have not improved very much. Microsoft Windows XP recently switched from using their own authentication method, to the use of Kerberos, which was last revised 10 years ago. This thesis describes the many problems we face in the world of network security today, and proposes several new methods for future implementation, and to a certain extend, modification to current standards to encompass future developments. Discussion will include a proposed overview of what a secure network architecture should include, and this will lead into several aspects that can be improved on. All problems identified in this thesis have proposed solutions, except for one. The critical flaw found in the standard IEEE802.11 wireless technology was discovered during the course of this research. This flaw is explained and covered in great detail, and also, an explanation is given as to why this critical flaw is not fixable.
APA, Harvard, Vancouver, ISO, and other styles
10

Naidoo, Vaughn. "Policy Based Network management of legacy network elements in next generation networks for Voice Services." Thesis, University of the Western Cape, 2002. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5830_1370595582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Network services"

1

Karol, Szlichcinski, ed. Financial network services. London: Blenheim Online Publications, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cougias, Dorian J. AppleTalk network services. Boston: AP Professional, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Group, Yankee, ed. Managed network services. Boston, MA (200 Portland St., Boston 02114): The Group, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Communications/Information Systems Planning and Critical Path Planning Service., ed. Financial network services. Boston, MA (89 Broad St., Boston 02110): Yankee Group, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blomeley, Frances. Networks and network services: A user's guide. Hove: Immediate, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Danthine, André, and Christophe Diot, eds. From Multimedia Services to Network Services. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0026614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jin, Cheng, Sugih Jamin, Danny Raz, and Yuval Shavitt. Building Scalable Network Services. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4419-8897-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Andrew, Schmidt, ed. Network layer switched services. New York: Wiley Computer Pub., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wood, Robert. Next-generation network services. Indianapolis, Ind: Cisco Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ho, Kim Seng Peter. Bridging local area networks with integrated services digital network. Salford: University of Salford, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Network services"

1

O’Leary, Mike. "Network Services." In Cyber Operations, 311–65. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Basin, David, Patrick Schaller, and Michael Schläpfer. "Network Services." In Applied Information Security, 27–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jin, Cheng, Sugih Jamin, Danny Raz, and Yuval Shavitt. "Network Services." In Building Scalable Network Services, 1–4. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4419-8897-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

O’Leary, Mike. "Network Services." In Cyber Operations, 649–720. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4294-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roussos, George. "Network Services." In Networked RFID, 113–28. London: Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-153-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baclit, Ryan, Chivas Sicam, Peter Membrey, and John Newbigin. "Network Services." In Foundations of CentOS Linux, 227–60. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1965-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gumaste, Ashwin, Csaba A. Szabó, and Imrich Chlamtac. "Backbone Optical Network Design for Community Networks." In Broadband Services, 141–61. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470022515.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kralicek, Eric. "Network Services Architecture." In The Accidental SysAdmin Handbook, 61–87. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1817-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sinha, Sudhi R., and Youngchoon Park. "Building Network Services." In Building an Effective IoT Ecosystem for Your Business, 49–61. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57391-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Oppliger, Rolf, and Philipp J. Stüssi. "Managed Network Services." In Unternehmensweite Kommunikationsnetze, 107–24. Wiesbaden: Vieweg+Teubner Verlag, 1994. http://dx.doi.org/10.1007/978-3-322-84256-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Network services"

1

Sugiyama, Kouhei, Hiroyuki Ohsaki, Makoto Imase, Takeshi Yagi, and Junichi Murayama. "NMF: Network Mining Framework Using Topological Structure of Complex Networks." In 2008 IEEE Congress on Services Part II (SERVICES-2). IEEE, 2008. http://dx.doi.org/10.1109/services-2.2008.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oh-ishi, T., T. Iwata, S. Tokumoto, and N. Shimamoto. "Network services using service-composition technology." In 11th International Telecommunications Network Strategy and Planning Symposium. IEEE, 2004. http://dx.doi.org/10.1109/netwks.2004.241058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oyekanlu, Emmanuel, and Kevin Scoles. "Real-Time Distributed Computing at Network Edges for Large Scale Industrial IoT Networks." In 2018 IEEE World Congress on Services (SERVICES). IEEE, 2018. http://dx.doi.org/10.1109/services.2018.00045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nazarzadeoghaz, Navid, Ferhat Khendek, and Maria Toeroe. "Automated Design of Network Services from Network Service Requirements." In 2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN). IEEE, 2020. http://dx.doi.org/10.1109/icin48450.2020.9059324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Duan, Qiang. "Modeling and Performance Analysis on Network Virtualization for Composite Network-Cloud Service Provisioning." In 2011 IEEE World Congress on Services (SERVICES). IEEE, 2011. http://dx.doi.org/10.1109/services.2011.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Duan, Qiang, and Shangguang Wang. "Network Cloudification Enabling Network - Cloud/Fog Service Unification: State of the Art and Challenges." In 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. http://dx.doi.org/10.1109/services.2019.00046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Hui, Zhiyong Feng, Yang Sui, and Shizhan Chen. "Service network: An infrastructure of web services." In 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2009). IEEE, 2009. http://dx.doi.org/10.1109/icicisys.2009.5358185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barshefsky, Alvin, and Hemi Trickey. "e-Services Architecture." In Networks 2006. 12th International Telecommunications Network Strategy and Planning Symposium. IEEE, 2006. http://dx.doi.org/10.1109/netwks.2006.300402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Licciardi, C. A., and T. Mota. "A service platform for integrated IN-internet services." In Proceedings 2000 IEEE Intelligent Network Workshop. IEEE, 2000. http://dx.doi.org/10.1109/inw.2000.868182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pang, Yue, Danshi Wang, Dongdong Wang, Luyao Guan, Chunyu Zhang, and Min Zhang. "A Space-Air-Ground Integrated Network Assisted Maritime Communication Network Based on Mobile Edge Computing." In 2020 IEEE World Congress on Services (SERVICES). IEEE, 2020. http://dx.doi.org/10.1109/services48979.2020.00060.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Network services"

1

Kille, S., and N. Freed. Network Services Monitoring MIB. RFC Editor, January 1994. http://dx.doi.org/10.17487/rfc1565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Freed, N., and S. Kille. Network Services Monitoring MIB. RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Freed, N., and S. Kille. Network Services Monitoring MIB. RFC Editor, March 2000. http://dx.doi.org/10.17487/rfc2788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sitzler, D., P. Smith, and A. Marine. Building a Network Information Services Infrastructure. RFC Editor, February 1992. http://dx.doi.org/10.17487/rfc1302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Van, J., and A. Spitzer. Basic Network Media Services with SIP. Edited by E. Burger. RFC Editor, December 2005. http://dx.doi.org/10.17487/rfc4240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Haynes, R. A., and L. G. Pierson. Performance modeling of network data services. Office of Scientific and Technical Information (OSTI), January 1997. http://dx.doi.org/10.2172/437719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schilling, Donald L., Tarek Saadawi, and Daniel L. Walk. Transmission Techniques Tactical Switched Network Services. Fort Belvoir, VA: Defense Technical Information Center, June 1992. http://dx.doi.org/10.21236/ada296443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stokesberry, Daniel P., Daniel P. Stokesberry, and Kathleen M. Roberts. Integrated services digital network conformance testing. Gaithersburg, MD: National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.sp.823-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stokesberry, Daniel P., Daniel P. Stokesberry, Leslie Collica, and Kathleen M. Roberts. Integrated services digital network conformance testing. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.823-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bartoletti, A., and N. Tang. Characterizing Network Services through Cluster-Set Variations. Office of Scientific and Technical Information (OSTI), March 2005. http://dx.doi.org/10.2172/15016408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!