A Classification of Future Internet Enterprise Systems Projects

2012 ◽  
pp. 249-258 ◽  
Author(s):  
Yannis Charalabidis ◽  
Fenareti Lampathaki ◽  
Charalampos Alexopoulos ◽  
Panagiotis Kokkinakos ◽  
Sotiris Koussouris
2020 ◽  
Vol 12 (2) ◽  
pp. 20 ◽  
Author(s):  
Grigorios Kakkavas ◽  
Despoina Gkatzioura ◽  
Vasileios Karyotis ◽  
Symeon Papavassiliou

Network tomography has emerged as one of the lean approaches for efficient network monitoring, especially aiming at addressing the ever-increasing requirements for scaling and efficiency in modern network architectures and infrastructures. In this paper, we explore network coding and compressed sensing as enabling technologies in the context of network tomography. Both approaches capitalize on algebraic tools for achieving accuracy while allowing scaling of operation as the size of the monitored network increases. Initially, a brief overview of the tomographic problems and the related classification of methods is provided to better comprehend the problems encountered and solutions provided to date. Subsequently, we present representative approaches that employ either one of the aforementioned technologies and we comparatively describe their fundamental operation. Eventually, we provide a qualitative comparison of features and approaches that can be used for further research and technology development for network monitoring in future Internet infrastructures.


2012 ◽  
Vol 45 (6) ◽  
pp. 1458-1463 ◽  
Author(s):  
Mihnea Alexandru Moisescu ◽  
Ioan Stefan Sacala ◽  
Aurelian Mihai Stanescu ◽  
Cristina Serbanescu

2016 ◽  
Vol 116 (8) ◽  
pp. 1636-1655 ◽  
Author(s):  
Gerald Feldman ◽  
Hanifa Shah ◽  
Craig Chapman ◽  
Ardavan Amini

Purpose Enterprise systems (ES) upgrade is a complex phenomenon, yet it is possible to reduce the complexity through understanding of the upgrade drivers. The purpose of this paper is to investigate the various upgrade drivers, in order to provide a detailed understanding of the factors driving upgrade decisions. Design/methodology/approach This research is grounded in a qualitative survey design. It utilises a web-based survey questionnaire and semi-structured interviews to collect data from 41 respondents representing 23 large organisations. The data were qualitatively analysed and coded to identify the various drivers and their influence on ES upgrade decisions. Findings The findings suggest that the upgrade decisions are dependent on establishing the need to upgrade, which is influenced by various drivers and stakeholders interests. In addition, the findings suggest that organisations would only opt to upgrade when benefits are aligned with the upgrade and when the decision makes business sense. Research limitations/implications In this paper, the authors propose that there is a relationship between the upgrade drivers and the upgrade strategy. However, qualitative studies can only formulate logical generalisations. Hence, future research could explore these associations through a quantitative study in order to provide probabilistic generalisation that offers either similar or conflicting arguments applicable to ES upgrade phenomenon. Originality/value This paper provides an alternative classification of upgrade drivers, and conceptualises an association between upgrade drivers and the upgrade strategy, which in turn facilitates minimising disruptions and upgrade risks.


2012 ◽  
pp. 259-269 ◽  
Author(s):  
Yannis Charalabidis ◽  
Fenareti Lampathaki ◽  
Sotirios Koussouris ◽  
Spyros Mouzakitis

Author(s):  
Narender M. ◽  
Yuvaraju B. N.

Software-Defined Networking (SDN) has become an essential networking concept towards escalating the networking capabilities that are highly demanded future internet system, which is immensely distributed in nature. Owing to the novel concept in the field of network, it is still shrouded with security problems. It is also found that the Distributed Denial-of-Service (DDoS) attack is one of the prominent problems in the SDN environment. After reviewing existing research solutions towards resisting DDoS attack in SDN, it is found that still there are many open-end issues. Therefore, these issues are identified and are addressed in this paper in the form of a preemptive model of security. Different from existing approaches, this model is capable of identifying any malicious activity that leads to a DDoS attack by performing a correct classification of attack strategy using a machine learning approach. The paper also discusses the applicability of best classifiers using machine learning that is effective against DDoS attack.


1966 ◽  
Vol 24 ◽  
pp. 21-23
Author(s):  
Y. Fujita

We have investigated the spectrograms (dispersion: 8Å/mm) in the photographic infrared region fromλ7500 toλ9000 of some carbon stars obtained by the coudé spectrograph of the 74-inch reflector attached to the Okayama Astrophysical Observatory. The names of the stars investigated are listed in Table 1.


Sign in / Sign up

Export Citation Format

Share Document