Author of the publication

Managing service level agreements in Premium IP networks: a business-oriented approach.

, , , , and . Comput. Networks, 46 (6): 853-866 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient approach to the network division problem, VLANs configuration and WLANs hosts grouping., , and . LANMAN, page 241-246. IEEE, (2004)Dynamic SLA-Based Management of Virtual Private Networks., , , and . IWDC, volume 2170 of Lecture Notes in Computer Science, page 642-659. Springer, (2001)Evaluating Pattern Recognition Techniques in Intrusion Detection Systems., , , , and . PRIS, page 144-153. INSTICC Press, (2005)Time-aware admission control on top of time-unaware network infrastructures., , , and . Comput. Commun., 28 (4): 405-416 (2005)Cadenus: creation and deployment of end-user services in premium IP networks., , , , , , and . IEEE Communications Magazine, 41 (1): 54-60 (2003)An active network approach to virtual private networks., , , , and . ISCC, page 502-507. IEEE Computer Society, (2002)Pinball Caching: Improving Performance of a Framework for Dynamic Web-Content Adaptation and Deliver., , and . ISCC, page 768-773. IEEE Computer Society, (2006)Real Time Detection of Novel Attacks by Means of Data Mining Techniques., , , , and . ICEIS (3), page 120-127. (2005)Resource allocation in multi-domain networks based on service level specifications., , , , and . J. Commun. Networks, 8 (1): 106-115 (2006)Techniques for available bandwidth measurement in IP networks: A performance comparison., , , and . Comput. Networks, 50 (3): 332-349 (2006)