Abstract is missing.
- Software-Defined Network Design driven by Availability RequirementsDorabella Santos, Teresa Gomes, David Tipper. 1-7 [doi]
- Formal Modeling and Analysis of Multi-Rogue Backoff Manipulation Attacks in Unlicensed NetworksJordi Navarrette, Subash Shankar, Xiaojie Zhang, Saptarshi Debroy. 1-7 [doi]
- Hardware-accelerator aware VNF-chain recoveryGourav Prateek Sharma, Wouter Tavernier, Didier Colle, Mario Pickavet. 1-6 [doi]
- Robust Optimization Model for Probabilistic Protection under Uncertain Virtual Machine Capacity in CloudMitsuki Ito, Fujun He, Eiji Oki. 1-8 [doi]
- Improving the Connectivity Resilience of a Telecommunications Network to Multiple Link Failures Through a Third-Party NetworkAmaro de Sousa. 1-6 [doi]
- Virtual Network Embedding Satisfying Resiliency of Cooperative ServicesNagao Ogino, Takeshi Kitahara. 1-8 [doi]
- On the Resilience of the NFV-MANO: An Availability Model of a Cloud-native ArchitectureBesmir Tola, Yuming Jiang, Bjarne E. Helvik. 1-7 [doi]
- A Framework for Network Function Decomposition and DeploymentDaniele Moro, Giacomo Verticale, Antonio Capone. 1-6 [doi]
- On the Number of Steiner Trees in a GraphA. Sen, C. Zhou, A. Mazumder, A. Das, K. Basu, K. Walkowiak. 1-5 [doi]
- A Cross-Layer Heuristic Algorithm for Addressing Shadowing Problem in Optical Attocell NetworksYuhui Wu, Mario Pickavet, Didier Colle. 1-6 [doi]
- Toward Disaster-Resilient Optical Networks with Open and Disaggregated Subsystems [Invited]Sugang Xu, Noboru Yoshikane, Masaki Shiraiwa, Yusuke Hirota, Takehiro Tsuritani, Sifat Ferdousi, Yoshinari Awaji, Naoya Wada, Biswanath Mukherjee. 1-6 [doi]
- Crosstalk-induced Impact of Coexisting DWDM Network on Continuous-variable QKDBinjie Chu, Yichen Zhang, Yijia Zhao, Yifan Xu, Xing Chen, Xiangyu Wang, Song Yu. 1-5 [doi]
- Availability-Guaranteed Service Function Chain Provisioning with Optional Shared BackupsIgor M. Araújo, Carlos Natalino, Hao Chen, Marilet De Andrade, Diego L. Cardoso, Paolo Monti 0001. 1-6 [doi]
- Throughput vs. Resilience in Multi-hop Wireless Sensor Networks with Periodic Packet TrafficBartlomiej Ostrowski, Michal Pióro, Artur Tomaszewski, Mateusz Nowak, Ilya Kalesnikau. 1-7 [doi]
- Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN ControllersSiwar Kriaa, Serge Papillon, Lalita Jagadeesan, Veena B. Mendiratta. 1-6 [doi]
- High-Availability Service Chain Realization TheorySidharth Sharma, Ashwin Gumaste, Mallik Tatipamula. 1-8 [doi]
- Resilience of 5G Networks in the Presence of Unlicensed Spectrum and Non-Terrestrial NetworksRohit Abhishek, David Tipper, Deep Medhi. 1-6 [doi]
- FRADIR Meets AvailabilityLejla Pasic, Azra Pasic, Ferenc Mogyorósi, Alija Pasic. 1-6 [doi]
- Adversary Model for Attacks Against IEC 61850 Real-Time Communication ProtocolsLivinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen D. Wolthusen. 1-8 [doi]
- Evaluating the cost benefit of real-time optical performance in dynamic optical restorationBodhisattwa Gangopadhyay, João Pedro, João Vasco Santos, Nuno Borges, Paulo Santos, Harald Bock, Neeli R. Prasad, Ramjee Prasad. 1-7 [doi]
- Paxos in the NIC: Hardware Acceleration of Distributed Consensus ProtocolsGiacomo Belocchi, Valeria Cardellini, Aniello Cammarano, Giuseppe Bianchi 0001. 1-6 [doi]
- A Unified View to Machine Learning and Control for Measurement-based Equivalent BandwidthMaurizio Mongelli, Marco Muselli, Mario Marchese. 1-6 [doi]
- Linear Massive MIMO Uplink Detector Based On Joint Jacobi and Gauss-Seidel MethodsMahmoud A. M. Albreem, Ayman A. El-Saleh, Markku J. Juntti. 1-4 [doi]
- Knowledge-Based Collective Self-learning for Alarm Prediction in Real Multi-Domain Autonomous Optical NetworksXiangdong Xing, Yongli Zhao, Yajie Li, Jie Zhang 0006. 1-5 [doi]
- Identifying Vulnerable Critical Infrastructure Zones in Smart CitiesAbdulaziz Alqahtani, David Tipper, Katrina Kelly-Pitou, Amy Babay. 1-7 [doi]
- Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic ModelsJúlio Mendonça, Ricardo Lima, Ermeson Carneiro de Andrade, Julian Araujo, Dong Seong Kim. 1-7 [doi]
- A centrality-based heuristic for network design to support availability differentiationRita Girão-Silva, Teresa Gomes, Lúcia Martins, David Tipper, Abdulaziz Alashaikh. 1-7 [doi]
- Structural Dependency Aware Service Chain Mapping for Network Function VirtualizationArunabha Sen, Sandipan Choudhuri, Kaustav Basu. 1-6 [doi]
- End-to-End Quantum Key Distribution (QKD) from Metro to Access NetworksHua Wang, Yongli Zhao, Avishek Nag, Xiaosong Yu, Xinyi He, Jie Zhang. 1-5 [doi]
- Design of Most-Reliable Cubic Networks by AugmentationsEduardo Alberto Canale, Guillermo Rela, Franco Robledo, Pablo Romero, Luis Stábile. 1-6 [doi]