Search Word(s) in Title, Keywords, Authors, and Abstract: Policies

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures
Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo and Hamid H. S. Javadi
Page: 865~889, Vol. 15, No.4, 2019
Keywords: Advanced Persistent Threats (APT), Cyber-Attacks, Cyber Kill Chain (CKC), Intelligence Sharing, Knowledge Sharing
Show / Hide Abstract

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
Komal Mahajan, Ansuyia Makroo and Deepak Dahiya
Page: 379~394, Vol. 9, No.3, 2013
Keywords: Virtual Machine (VM), Server affinity, VM load balancer, CloudAnalyst, Data center, Cloudlet
Show / Hide Abstract

A Method for Learning Macro-Actions for Virtual Characters Using Programming by Demonstration and Reinforcement Learning
Yunsick Sung and Kyungeun Cho
Page: 409~420, Vol. 8, No.3, 2012
Keywords: Reinforcement Learning, Monte Carlo Method, Behavior Generation Model, Programming B y Demonstration, Macro-Action, Multi-Step Action
Show / Hide Abstract

Batch Resizing Policies and Techniques for Fine-Grain Grid Tasks: The Nuts and Bolts
Nithiapidary Muthuvelu, Ian Chai, Eswaran Chikkannan and Rajkumar Buyya
Page: 299~320, Vol. 7, No.2, 2011
Keywords: Batch Resizing, Task Granularity, Global Grid, Application Turnaround Time
Show / Hide Abstract

Development of Personal Information Protection Model using a Mobile Agent
Seong-Hee Bae and Jaejoon Kim
Page: 185~196, Vol. 6, No.2, 2010
Keywords: Information Protect Model, Mobile Agent, Personal Information Protection, Privacy Protection Policy
Show / Hide Abstract

Plans and Strategies for UBcN Networks and Services
Eunyoung Lee
Page: 323~334, Vol. 6, No.3, 2010
Keywords: UBcN, Broadband, NGN, Converged Services, Policies
Show / Hide Abstract

Implementation of Advanced IP Network Technology for IPTV Service
Young-Do Joo
Page: 25~32, Vol. 5, No.1, 2009
Keywords: IPTV, Premium Backbone, QoS, Multicast, High Availability, Security
Show / Hide Abstract

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster
Junaid Ahsenali Chaudhry
Page: 69~76, Vol. 5, No.2, 2009
Keywords: Self Healing Systems, Load Estimation and Balancing, OKKAM, Entity Naming System
Show / Hide Abstract

Policy Adjuster-driven Grid Workflow Management for Collaborative Heart Disease Identification System
Shengzhong Deng, Chan-Hyun Youn, Qi Liu, Hoe Young Kim, Taoran Yu and Young Hun Kim
Page: 103~112, Vol. 4, No.3, 2008
Keywords: Grid Worfklow, Collaborative Healthcare Platform, SLA, Policy Adjuster
Show / Hide Abstract

A Delegation Model based on Agent in Distributed Systems
Kyu Il Kim, Joo Chang Lee, Won Gil Choi, Eun Ju Lee and Ung Mo Kim
Page: 82~88, Vol. 3, No.2, 2007
Keywords: XACML, SAML, Agent
Show / Hide Abstract

Determination of Optimal Cell Capacity for Initial Cell Planning in Wireless Cellular Networks
Young Ha Hwang, Sung-Kee Noh and Sang-Ha Kim
Page: 88~94, Vol. 2, No.2, 2006
Keywords: QoS, optimal cell capacity, cell planning, wireless cellular networks
Show / Hide Abstract

A New Fair Call Admission Control for Integrated Voice and Data Traffic in Wireless Mobile Networks
Young Ha Hwang, Sung-Kee Noh and Sang-Ha Kim
Page: 107~113, Vol. 2, No.2, 2006
Keywords: CAC, QoS, Fairness, Integrated service, Wireless mobile networks
Show / Hide Abstract