2018
DOI: 10.5121/ijcsitce.2018.5301
|View full text |Cite
|
Sign up to set email alerts
|

NETCDL: The Network Certification Description Language

Abstract: In this research, the Network Certification Description Language (NETCDL) is proposed as an easily human readable and writeable language that is used to describe network components and their desired behavior. The complexity of the grammar is shown to rank in the top

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…There are multiple ways to upload the flask application to the server. One is to use the PIP library and the freeze method [40], a type of encryption of all the dependencies that comprise the here presented WAF, that is, all the libraries and packages that were necessary to configure the environment of the flask application. It is also essential to create a file like req.txt with the list of dependencies so that it will load automatically when running.…”
Section: ) Server Flask Application Loadmentioning
confidence: 99%
“…There are multiple ways to upload the flask application to the server. One is to use the PIP library and the freeze method [40], a type of encryption of all the dependencies that comprise the here presented WAF, that is, all the libraries and packages that were necessary to configure the environment of the flask application. It is also essential to create a file like req.txt with the list of dependencies so that it will load automatically when running.…”
Section: ) Server Flask Application Loadmentioning
confidence: 99%
“…According to Noto (2000: 1), the dijkstra method is an algorithm to find the most optimal route.This algorithm is the search for the shortest route and minimum cost, which causes the search area to expand concentrically so that it has weaknesses which are weak efficiency, and long search time when the existing node is so large [8]. According to Fuhao (2009: 2), the weakness of the dijkstra algorithm is that if the number of nodes is very large, it will occupy a lot of CPU memory [9].…”
Section: B Djikstra Algorithmmentioning
confidence: 99%