Abstract is missing.
- Resource allocation for network slicing in WiFi access pointsMatias Richart, Javier Baliosian, Joan Serrat, Juan-Luis Gorricho, Ramón Agüero, Nazim Agoulmine. 1-4 [doi]
- Large-scale antennas analysis of untrusted relay system with cooperative jammingXing Tan, Rui Zhao, Yuanjian Li. 1-5 [doi]
- High-end LTE service evolution in Korea: 4 years of nationwide mobile network measurementsJonghwan Hyun, Youngjoon Won, Kenjiro Cho, Romain Fontugne, Jae Yoon Chung, James Won-Ki Hong. 1-7 [doi]
- Connectivity extraction in cloud infrastructuresPernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, Eric Totel. 1-5 [doi]
- Automated synthesis of NFV topology: A security requirement-oriented designA. H. M. Jakaria, Mohammad Ashiqur Rahman, Carol J. Fung. 1-5 [doi]
- InFEP - Lightweight virtualization of distributed control on white-box networking hardwareThomas Kohler 0001, Frank Dürr, Christian Baumlisberger, Kurt Rothermel. 1-6 [doi]
- Flexible functional split in 5G networksDavit Harutyunyan, Roberto Riggio. 1-9 [doi]
- Adaptive and distributed monitoring mechanism in software-defined networksXuan Thien Phan, Ignacio Dominguez Martinez-Casanueva, Kensuke Fukuda. 1-5 [doi]
- Enabling low latency and high reliability for IMS-NFVMuhammad Taqi Raza, Songwu Lu. 1-9 [doi]
- Two-way communication with wait-slot scheme for neighbor discovery process in dense Bluetooth low energy networksTing-Ting Yang, Hsueh-Wen Tseng. 1-7 [doi]
- Scalability and reliability aware SDN controller placement strategiesFetia Bannour, Sami Souihi, Abdelhamid Mellouk. 1-4 [doi]
- Data driven selection of DRX for energy efficient 5G RANDiarmuid Corcoran, Loghman Andimeh, Andreas Ermedahl, Per Kreuger, Christian Schulte. 1-9 [doi]
- On demand QoS with a SDN traffic engineering management (STEM) moduleCedric Morin, Géraldine Texier, Cao-Thanh Phan. 1-6 [doi]
- Automated selection of offloadable tasks for mobile computation offloading in edge computingAlessandro Zanni, Se-Young Yu, Paolo Bellavista, Rami Langar, Stefano Secci. 1-5 [doi]
- Analyzing human mobility and social relationships from cellular network dataZheng Liu, Yuanyuan Qiao, Siyan Tao, Wenhui Lin, Jie Yang. 1-6 [doi]
- Dynamic algorithm selection for the logic of tasks in IoT stream processing systemsEhsan Poormohammady, Jens Helge Reelfs, Mirko Stoffers, Klaus Wehrle, Apostolos Papageorgiou. 1-5 [doi]
- Network-integrated edge computing orchestrator for application placementVasileios Karagiannis, Apostolos Papageorgiou. 1-5 [doi]
- Design of virtual gateway in virtual software defined networksDoyoung Lee, Yoonseon Han, James Won-Ki Hong. 1-6 [doi]
- SDN implementation of multipath discovery to improve network performance in distributed storage systemsLuis Guillen, Satoru Izumi, Toru Abe, Takuo Suganuma, Hiroaki Muraoka. 1-4 [doi]
- Simulation framework for impact assessment of next generation spectrum authorization regimesStephan Wirsing, Peter Reichl. 1-8 [doi]
- Modeling and analyzing power system failures on cloud servicesDaniel Rosendo, Patricia Takako Endo, Guto Leoni Santos, Demis Moacir Gomes, Glauco Estacio Gonçalves, André Moreira, Judith Kelner, Djamel Sadok, Mozhgan Mahloo. 1-7 [doi]
- An adaptive mechanism for LTE P-GW virtualization using SDN and NFVLuciano Jerez Chaves, Islene Calciolari Garcia, Edmundo Roberto Mauro Madeira. 1-9 [doi]
- SDN enhancements for the sliced, deep programmable 5G coreFabian Eichhorn, Marius Iulian Corici, Thomas Magedanz, Ping Du, Yoshiaki Kiriha, Akihiro Nakao. 1-4 [doi]
- Evaluating the impact of SDN-induced frequent route changes on TCP flowsRadu Carpa, Marcos Dias de Assunção, Olivier Glück, Laurent Lefèvre, Jean-Christophe Mignot. 1-9 [doi]
- Delay-aware VNF placement and chaining based on a flexible resource allocation approachAbdelhamid Alleg, Toufik Ahmed, Mohamed Mosbah, Roberto Riggio, Raouf Boutaba. 1-7 [doi]
- Resource provisioning for IoT application services in smart citiesJose Santos, Tim Wauters, Bruno Volckaert, Filip De Turck. 1-9 [doi]
- Performance evaluation of selective flow monitoring in the ONOS controllerAnh Nguyen-Ngoc, Stanislav Lange, Thomas Zinner, Michael Seufert, Phuoc Tran-Gia, Nieke Aerts, David Hock. 1-6 [doi]
- Design of SDN based end-to-end routing over multiple domains for mobility managementMisumi Hata, Mustafa Soylu, Satoru Izumi, Toru Abe, Takuo Suganuma. 1-4 [doi]
- Measuring exposure in DDoS protection servicesMattijs Jonker, Anna Sperotto. 1-9 [doi]
- Can MPTCP secure Internet communications from man-in-the-middle attacks?Ho Dac Duy Nguyen, Chi-Dung Phung, Stefano Secci, Benevid Felix, Michele Nogueira. 1-7 [doi]
- AutoFocus: Automatically scoping the impact of anomalous service eventsRen Quinn, Zihui Ge, He Yan, Jacobus E. van der Merwe. 1-5 [doi]
- MD-IDN: Multi-domain intent-driven networking in software-defined infrastructuresSaeed Arezoumand, Kristina Dzeparoska, Hadi Bannazadeh, Alberto Leon-Garcia. 1-7 [doi]
- NeuRoute: Predictive dynamic routing for software-defined networksAbdelhadi Azzouni, Raouf Boutaba, Guy Pujolle. 1-6 [doi]
- An adaptive scaling mechanism for managing performance variations in network functions virtualization: A case study in an NFV-based EPCCarlos Hernan Tobar Arteaga, Fulvio Rissoi, Oscar Mauricio Caicedo Rendon. 1-7 [doi]
- vFetch: Video prefetching using pseudo subscriptions and user channel affinity in YouTubeChristian Koch 0003, Benedikt Lins, Amr Rizk, Ralf Steinmetz, David Hausheer. 1-6 [doi]
- Applicability and limitations of a simple WiFi hotspot model for citiesMichael Seufert, Christian Moldovan, Valentin Burger, Tobias Hoßfeld. 1-7 [doi]
- Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphsMartín Barrère, Rodrigo Vieira Steiner, Rabih Mohsen, Emil C. Lupu. 1-7 [doi]
- An evolutionary controllers' placement algorithm for reliable SDN networksJean-Michel Sanner, Yassine Hadjadj Aoul, Meryem Ouzzif, Gerardo Rubino. 1-6 [doi]
- Efficient big link allocation scheme in virtualized software-defined networkingWontae Jeong, Gyeongsik Yang, Seong-Mun Kim, Chuck Yoo. 1-7 [doi]
- Reliable service function chain provisioning in software-defined networkingYansen Xu, Ved P. Kafle. 1-4 [doi]
- Wireless LAN access point deployment and pricing with location-based advertisingCheng Zhang 0007, Zhi Liu, Bo Gu, Kyoko Yamori, Yoshiaki Tanaka. 1-7 [doi]
- MULE: Multi-layer virtual network embeddingShihabur Rahman Chowdhury, Sara Ayoubi, Reaz Ahmed, Nashid Shahriar, Raouf Boutaba, Jeebak Mitra, Liu Liu. 1-9 [doi]
- BFD-based link latency measurement in software defined networkingSeong-Mun Kim, Gyeongsik Yang, Chuck Yoo, Sung-Gi Min. 1-6 [doi]
- Charting an intent driven networkYehia Elkhatib, Geoff Coulson, Gareth Tyson. 1-5 [doi]
- Cost- and energy-aware multi-flow mobile data offloading under time dependent pricingCheng Zhang 0007, Bo Gu, Zhi Liu, Kyoko Yamori, Yoshiaki Tanaka. 1-6 [doi]
- Anomaly detection for openstack services with process-related topological analysisTomonobu Niwa, Yuki Kasuya, Takeshi Kitahara. 1-5 [doi]
- Real-time security services for SDN-based datacentersPál Varga, Georgios Kathareios, Akos Mate, Rolf Clauberg, Andreea Anghel, Peter Orosz, Balázs Nagy, Tamas Tothfalusi, László Kovács, Mitch Gusat. 1-9 [doi]
- DiMob: Scalable and seamless mobility in SDN managed wireless networksIan Vermeulen, Patrick Bosch, Tom De Schepper, Steven Latré. 1-6 [doi]
- Software-defined multipath-TCP for smart mobile devicesTom De Schepper, Jakob Struye, Ensar Zeljkovic, Steven Latré, Jeroen Famaey. 1-6 [doi]
- Identification of communication devices from analysis of traffic patternsHiroki Kawai, Shingo Ata, Nobuyuki Nakamura, Ikuo Oka. 1-5 [doi]
- A software-defined firewall bypass for congestion offloadingFlorian Heimgaertner, Mark Schmidt, David Morgenstern, Michael Menth. 1-9 [doi]
- Fill-in the gaps: Spatial-temporal models for missing dataJi Xue, Bin Nie, Evgenia Smirni. 1-9 [doi]
- An autonomic and policy-based authorization framework for OpenFlow networksDaniel Rosendo, Patricia Takako Endo, Djamel Sadok, Judith Kelner. 1-5 [doi]
- User association for load balancing in cellular network with hybrid cognitive radio relaysHongfu Guo, Fanqin Zhou, Lei Feng, Peng Yu 0001, Wenjing Li 0001. 1-8 [doi]
- Accurate delay measurement for parallel monitoring of probe flowsKohei Watabe, Shintaro Hirakawa, Kenji Nakagawa. 1-9 [doi]
- An empirical study of software reliability in SDN controllersPetra Vizarreta, Kishor S. Trivedi, Bjarne E. Helvik, Poul E. Heegaard, Wolfgang Kellerer, Carmen Mas Machuca. 1-9 [doi]
- Resource-aware placement of softwarised security services in cloud data centersAbeer Ali, Christos Anagnostopoulos, Dimitrios P. Pezaros. 1-5 [doi]
- Architecture for building hybrid kernel-user space virtual network functionsNguyen Van Tu, Kyungchan Ko, James Won-Ki Hong. 1-6 [doi]
- Scheduling service function chains for ultra-low latency network servicesHyame Assem Alameddine, Long Qu, Chadi Assi. 1-9 [doi]
- Assessing the value of containers for NFVs: A detailed network performance studyJakob Struye, Bart Spinnewyn, Kathleen Spaey, Kristiaan Bonjean, Steven Latré. 1-7 [doi]
- Distributed-collaborative managed dash video servicesKemal E. Sahin, K. Tolga Bagci, A. Murat Tekalp. 1-5 [doi]
- Deadline-aware and energy-efficient dynamic flow scheduling in data center networkZan Yao, Ying Wang, Junhua Ba, Junran Zong, Sixiang Feng, Zhanwei Wu. 1-4 [doi]
- A lightweight snapshot-based DDoS detectorGilles Roudiere, Philippe Owezarski. 1-7 [doi]
- Risk prediction of the SCADA communication network based on entropy-gray modelMeng Li, Wenjing Li 0001, Peng Yu, Fanqin Zhou. 1-5 [doi]
- A path layer for the Internet: Enabling network operations on encrypted protocolsMirja Kühlewind, Tobias Bühler, Brian Trammell, Stephan Neuhaus, Roman Muntener, Gorry Fairhurst. 1-9 [doi]
- Regulating wireless access costs for not vertically integrated content providersXinyi Hu, George Kesidis, Seung Jun Baek. 1-8 [doi]
- IPv6-specific misconfigurations in the DNSLuuk Hendriks, Pieter-Tjerk de Boer, Aiko Pras. 1-5 [doi]
- Enforcing free roaming among EU countries: An economic analysisPatrick Maillé, Bruno Tuffin. 1-4 [doi]
- Cost-effective replica management in fault-tolerant cloud environmentsBart Spinnewyn, Juan Felipe Botero, Steven Latré. 1-9 [doi]
- Enhanced fast BSS transition on enterprise WLAN with SDN-based distribution systemHyundong Hwang, Young-Tak Kim. 1-5 [doi]
- Android malicious application detection using support vector machine and active learningBahman Rashidi, Carol J. Fung, Elisa Bertino. 1-9 [doi]
- Pre-provisioning of local protection for handling dual-failures in OpenFlow-based networksPankaj Thorat, Seil Jeon, Syed M. Raza, Hyunseung Choo. 1-6 [doi]
- Auto scaling of data plane VNFs in 5G networksTulja Vamshi Kiran Buyakar, Anil Kumar Rangisetti, A. Antony Franklin, Bheemarjuna Reddy Tamma. 1-4 [doi]
- Wireless sensor network-based service provision: A three-sided market modelLuis Guijarro, José R. Vidal, Vicent Pla, Maurizio Naldi. 1-7 [doi]
- ORCHESTRA: Virtualized and programmable orchestration of heterogeneous WLANsEnsar Zeljkovic, Tom De Schepper, Patrick Bosch, Ian Vermeulen, Jetmir Haxhibeqiri, Jeroen Hoebeke, Jeroen Famaey, Steven Latré. 1-9 [doi]
- A prediction-based dynamic resource management approach for network virtualizationJiacong Li, Ying Wang, Zhanwei Wu, Sixiang Feng, Xuesong Qiu. 1-5 [doi]
- A model-based application autonomic manager with fine granular bandwidth controlNasim Beigi Mohammadi, Mark Shtern, Marin Litoiu. 1-5 [doi]
- Agent composition for 5G management and orchestrationVilho Raisanen. 1-4 [doi]
- GML learning, a generic machine learning model for network measurements analysisPedro Casas, Juan Martin Vanerio, Kensuke Fukuda. 1-9 [doi]
- Traffic optimization in anonymous networksPatrik Kristel, Jan Lucansky, Ivan Kotuliak. 1-5 [doi]
- Programmable residues defined networks for edge data centresMagnos Martinello, Alextian B. Liberato, Arash Farhadi Beldachi, Koteswararao Kondepu, Roberta L. Gomes, Rodolfo da Silva Villaça, Moisés R. N. Ribeiro, Yan Yan, Emilio Hugues-Salas, Dimitra Simeonidou. 1-9 [doi]
- Adaptive traffic monitoring for software dataplanesGioacchino Tangari, Marinos Charalambides, Daphné Tuncer, George Pavlou. 1-9 [doi]
- Arena: Adaptive real-time update anomaly prediction in cloud systemsShaohan Huang, Carol J. Fung, Chang Liu, Shupeng Zhang, Guang-wei, Zhongzhi Luan, Depei Qian. 1-9 [doi]
- Control plane latency reduction for service chaining in mobile edge computing systemChi-Hsiang Hung, Yao-Chou Hsieh, Li-Chun Wang. 1-5 [doi]
- Managing the availability of VNFs with the availability management frameworkPradheba C. Rangarajan, Ferhat Khendek, Maria Toeroe. 1-4 [doi]
- Capacity optimization for ultra-reliable low-latency communication in 5G - The SON perspectiveElke Roth-Mandutz, Abubaker-Matovu Waswa, Andreas Mitschele-Thiel. 1-8 [doi]
- Attacking strategies and temporal analysis involving Facebook discussion groupsChun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick McDaniel, Hasan Cam. 1-9 [doi]
- A path planning method of wireless sensor networks based on service priorityPeng Li, Si-Ya Xu, Kang Sun, Xuesong Qiu, Feng Qi. 1-4 [doi]
- Simulation toolbox for studying energy consumption in wired networksAnne-Cécile Orgerie, Betsegaw Lemma Amersho, Timothée HAUDEBOURG, Martin Quinson, Myriana Rifai, Dino Lopez Pacheco, Laurent Lefèvre. 1-5 [doi]
- Duopoly price competition in secondary spectrum marketsXianwei Li, Bo Gu, Cheng Zhang 0007, Zhi Liu, Kyoko Yamori, Yoshiaki Tanaka. 1-5 [doi]
- Network slice embedding under traffic uncertainties - A light robust approachAndreas Baumgartner, Thomas Bauschert, Abdul A. Blzarour, Varun S. Reddy. 1-5 [doi]