共 50 条
- [41] Wireless Network Security Policy Based on Integrated Vulnerability Management 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 225 - 228
- [42] Resource management policy orienting IETF integrated services network Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (10):
- [43] Service-Aware Design Policy of End-to-End Network Slicing for 5G Use Cases IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 962 - 975
- [44] Multi-Agent Reinforcement Learning-Based Resource Management for End-to-End Network Slicing IEEE ACCESS, 2021, 9 : 56178 - 56190
- [45] Network Slicing PROCEEDINGS OF THE 2019 2ND LATIN AMERICAN CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITS LATAM), 2019,
- [46] QoE Inference and Improvement Without End-Host Control 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 43 - 57
- [48] An efficient end-host architecture for cluster communication services 2004 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING, 2004, : 83 - 92
- [49] End-host architecture for QoS-adaptive communication FOURTH IEEE REAL-TIME TECHNOLOGY AND APPLICATIONS SYMPOSIUM - PROCEEDINGS, 1998, : 121 - 130