{"title":"Third parties access to In via internet security and its impacts on software design and performance","authors":"J. Zoric, K. Eldhuset, O. Risnes","doi":"10.1109/INW.2000.868173","DOIUrl":"https://doi.org/10.1109/INW.2000.868173","url":null,"abstract":"","PeriodicalId":430457,"journal":{"name":"Proceedings 2000 IEEE Intelligent Network Workshop","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127528579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using mobile agents for IN load control","authors":"B. Carlsson, P. Davidsson, S. Johansson, M. Ohlin","doi":"10.1109/INW.2000.868188","DOIUrl":"https://doi.org/10.1109/INW.2000.868188","url":null,"abstract":"In traditional approaches to IN load control, the main focus has been on the protection of individual Service Control Points (SCPs). We argue that better overall solutions will be achieved if the usage of resources was optimized globally at the network level. We also argue that agent technology is a suitable tool for implementing this and that an agent−based solution in addition would provide increased flexibility, adaptability, openness, and robustness.","PeriodicalId":430457,"journal":{"name":"Proceedings 2000 IEEE Intelligent Network Workshop","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125969285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On provision of commercial advanced IN services - Korea Telecom s perspective","authors":"J. Song","doi":"10.1109/INW.2000.868177","DOIUrl":"https://doi.org/10.1109/INW.2000.868177","url":null,"abstract":"","PeriodicalId":430457,"journal":{"name":"Proceedings 2000 IEEE Intelligent Network Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124173004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT-technology for high available solutions in the Telco environment (RTP - reliant Telco platform)","authors":"K. Wiesneth, S. Arntzen","doi":"10.1109/INW.2000.868193","DOIUrl":"https://doi.org/10.1109/INW.2000.868193","url":null,"abstract":": This paper gives an overview about a software approach to use standard computer technique in the telecommunication environment. The most important requirements in this sector are highest availability together with short response time. Servers which fulfill these requirements are often called \"Carrier Grade Servers\". A special implementation for such a Carrier Grade Server is the Reliant Telco Platform (RTP) based on UNIX- or NT-Ciuster- Technology and an appropriate middleware layer.","PeriodicalId":430457,"journal":{"name":"Proceedings 2000 IEEE Intelligent Network Workshop","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123811234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retaining the customer profile","authors":"B. Andrew","doi":"10.1109/INW.2000.868161","DOIUrl":"https://doi.org/10.1109/INW.2000.868161","url":null,"abstract":"This article consists of a collection of slides from the author's conference presentation. Currently, the circuit switched network operator has control of his customers profiles and interfaces. This has given the network operator an advantage in service delivery over 'edge of network' Value Added Service providers. The reason the customer profile is in the hands of the operator is due to the manner in which the fixed and mobile networks have evolved and the regulatory environment. This control over the customers' profile seems to be a key factor in retaining service revenues within the network operators' domain. As we move towards the next generation of IP/ATM networks and therefore open interfaces, there will be an increasing trend towards the migration of intelligence out of the network and into intelligent CPE and edge of network servers. We are told that communications between sucrequipmentswill make use of end-to-end protocols, and may use only basic network call control for routing. As more and more applications become viable at the edge, the ownership and location of the customers profile also comes into question. We must seriously consider this as a real threat to the network operators ability to provide value added services which could ultimately result in the network operators role being reduced to that of a 'Bit' carrier. Its therefore worth looking at issues surrounding the positioning of these applications and services.","PeriodicalId":430457,"journal":{"name":"Proceedings 2000 IEEE Intelligent Network Workshop","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124154832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}