Abstract is missing.
- Cognitive policy based SON management demonstratorTony Daher, Sana Ben Jemaa, Laurent Decreusefond. 1-3 [doi]
- Density-aware cell zoomingOkan Yaman, Alperen Eroglu, Ertan Onur. 1-8 [doi]
- A modeling approach for dependability analysis of smart distribution gridsTesfaye Amare, Bjarne E. Helvik, Poul E. Heegaard. 1-8 [doi]
- On providing deadline-aware cloud storage servicesGhada Tlili, Mohamed Faten Zhani, Halima Elbiaze. 1-8 [doi]
- Designing a high availability subnetwork to support availability differentiationAbdulaziz S. Alashaikh, David Tipper, Teresa Gomes. 1-8 [doi]
- Experimenting with cache peering in multi-tenant 5G networksKonstantinos V. Katsaros, Vasilis Glykantzis. 1-5 [doi]
- Testing a Q-learning approach for derivation of scaling policies in cloud-based applicationsYue Jin, Makram Bouzid, Dimitre Kostadinov, Armen Aghasaryan. 1-3 [doi]
- Design of C-RAN fronthaul for LTE networksHugo da Silva, Luís M. Correia, Pompeu Costa. 1-5 [doi]
- Monitoring 5G radio access networks with cloud-based stream processing platformsDrissa Houatra, Yuchia Tseng. 1-5 [doi]
- Reliability maximization in stochastic binary systemsHéctor Cancela, Gustavo Guerberoff, Franco Robledo, Pablo Romero. 1-7 [doi]
- LUMEN: A global fault management framework for network virtualization environmentsSihem Cherrared, Sofiane Imadali, Eric Fabre, Gregor Goessler. 1-8 [doi]
- A systematic fault-tolerant computational model for both crash failures and silent data corruptionXiaolong Cui, Zaeem Hussain, Taieb Znati, Rami G. Melhem. 1-8 [doi]
- Performance evaluation of CQIC and TCP BBR in mobile networkZhenzhe Zhong, Isabelle Hamchaoui, Rida Khatoun, Ahmed Serhrouchni. 1-5 [doi]
- An extension of radio network information interfaces for connectivity managementEvelina Pencheva. 1-8 [doi]
- Anticipating minimum resources needed to avoid service disruption of emergency support systemsPedro Martinez-Julia, Ved P. Kafle, Hiroaki Harai. 1-8 [doi]
- Information retention for disaster-affected networks using content-centric networkingAdeel Mohammad Malik, Elias Andersson, Börje Ohlman. 1-3 [doi]
- Forecast scheduling and its extensions to account for random eventsHind Zaaraoui, Zwi Altman, Eitan Altman, Tania Jiménez. 1-8 [doi]
- Privacy-preserving user identity in Identity-as-a-ServiceTri Hoang Vo, Woldemar F. Fuhrmann, Klaus Peter Fischer-Hellmann. 1-8 [doi]
- A DNS-based information-centric network architecture open to multiple protocols for transfer of data objectsAnders Eriksson, Adeel Mohammad Malik. 1-8 [doi]
- Dynamic reallocation of SLA parameters in passive optical network based on clustering analysisNejm Eddine Frigui, Tayeb Lemlouma, Stéphane Gosselin, Benoit Radier, Renaud Le Meur, Jean-Marie Bonnin. 1-8 [doi]
- A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environmentsAdel Abusitta, Martine Bellaïche, Michel Dagenais. 1-8 [doi]
- Demo: A deep learning based SLA management for NFV-based servicesJaafar Bendriss, Imen Grida Ben Yahia, Roberto Riggio, Djamal Zeghlache. 1-3 [doi]
- Pricing and quantization of memory for cloud services with uniform request distributionAnwar Alyatama. 1-7 [doi]
- Analysis of component-based approaches toward componentized 5GElie El Hayek, Imen Grida Ben Yahia, Damian Arellanes, Kung-Kiu Lau. 1-5 [doi]
- Technology assessment for mission-critical services on automotive virtual edge communicator (AVEC)Rebecca Copeland, Shohreh Ahvar, Noël Crespi, Romain Durand, Michael Copeland, Jean-Michel Duquerrois, Federica Paganelli, Federica Battisti, Alessandro Neri. 1-8 [doi]
- 5G & SLAs: Automated proposition and management of agreements towards QoS enforcementEvgenia Kapassa, Marios Touloupou, Argyro Mavrogiorgou, Dimosthenis Kyriazis. 1-5 [doi]
- Reducing the latency of OpenFlow rule changes in data centre networksJonathan Sherwin, Cormac J. Sreenan. 1-5 [doi]
- Multi-level SDN with vehicles as fog computing infrastructures: A new integrated architecture for 5G-VANETsAhmed Soua, Samir Tohmé. 1-8 [doi]
- Implementation of content poisoning attack detection and reaction in virtualized NDN networksHoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli. 1-3 [doi]
- Modelling NFV concepts with ontologiesIan Oliver, Sakshyam Panda, Ke Wang, Aapo Kalliola. 1-7 [doi]
- A trust model based on evidence-based subjective logic for securing wireless mesh networksFreshta Popalyar, Akmal Yaqini. 1-5 [doi]
- A data flow architecture for smart city applicationsJean-Charles Grégoire. 1-5 [doi]
- Scalable request routing for VR-ready CDNsPierre-Louis Poirion, Jeremie Leguay, Liu Ruosi. 1-6 [doi]
- Internet acceleration with LISP traffic engineering and multipath TCPChi-Dung Phung, Matthieu Coudron, Stefano Secci. 1-8 [doi]
- A big switch abstraction to support service function chaining in cloud infrastructureTien Van Do, Nam H. Do, Isvan Kispal, Nandor Galambosi, Csaba Rotter, Lorant Nemeth. 1-5 [doi]
- ThingNet: A micro-service based IoT macro-programming platform over edges and cloudYuansong Qiao, Robert Nolani, Saul Gill, Guiming Fang, Brian Lee. 1-4 [doi]
- Self provisioning framework for virtualized network functionsMarouane Mechteri, Imen Grida Ben Yahia. 1-3 [doi]
- Robust SDN controller placement to malicious node attacksDorabella Santos, Amaro de Sousa, Carmen Mas Machuca. 1-8 [doi]
- Spectral utilization efficient coarse granular routing optical networks with resiliency against multiple failuresTomohiro Ishikawa, Yojiro Mori, Hiroshi Hasegawa, Ken-ichi Sato. 1-8 [doi]
- An advanced telco cloud simulator and its usage on modelling multi-cloud and 5G multi-access environmentsPéter Hegyi, Norbert Varga, László Bokor. 1-3 [doi]
- GreenPOD: Leveraging queuing networks for reducing energy consumption in data centersFatoumata Balde, Halima Elbiaze, Bamba Gueye. 1-8 [doi]
- Towards multi-SDN services: Dangers of concurrent resource allocation from multiple providersGuillaume Fraysse, Imen Grida Ben Yahia, Jonathan Lejeune, Pierre Sens, Julien Sopena. 1-5 [doi]
- An open-source extendable, highly-accurate and security aware simulator for cloud applicationsAndreas Brokalakis, Nikolaos Tampouratzis, Antonios Nikitakis, Ioannis Papaefstathiou, Stamatis Andrianakis, Apostolos Dollas, Marco Paracchini, Marco Marcon, Danilo Pietro Pau, Emanuele Plebani. 1-3 [doi]
- Demo of a big switch abstraction for service function chainingNam H. Do, Tien Van Do, Isvan Kispal, Nandor Galambosi, Csaba Rotter, Lorant Nemeth. 1-3 [doi]
- Energy-efficient path allocation heuristic for service function chainingMohammad Mahdi Tajiki, Stefano Salsano, Mohammad Shojafar, Luca Chiaraviglio, Behzad Akbari. 1-8 [doi]
- TANC: Towards autonomic network connectivity: Guidelines for extending the network & IT infrastructure at the edgeNathalie Omnès, Karine Guillouard, Meryem Ouzzif, Roland Picard, Pierrick Seite. 1-7 [doi]
- Cloud based content classification with global-connected net (GC-Net)Zhi Chen, Pin-Han Ho. 1-6 [doi]
- Securing authentication for mobile networks, a survey on 4G issues and 5G answersShanay Behrad, Emmanuel Bertin, Noël Crespi. 1-8 [doi]
- Real-time performance modeling of link layer protocols for multi-layer protocol aggregationPaul J. Kuehn. 1-5 [doi]
- An experimental evaluation of MPTCP-tunnel-based hybrid accessArthur Holzner, Rolf Winter. 1-7 [doi]
- Model-free resource management of cloud-based applications using reinforcement learningYue Jin, Makram Bouzid, Dimitre Kostadinov, Armen Aghasaryan. 1-6 [doi]
- Digital assistance for the automated discovery and deployment of IoT servicesMichel Le Pallec, Ludovic Noirie, Pierre Peloso, Dinh Thai Bui, Nicolas Le Sauze. 1-3 [doi]
- Intent-based cloud service managementWu Chao, Shingo Horiuchi. 1-5 [doi]
- Optimal design of 5G superfluid networks: Problem formulation and solutionsLuca Chiaraviglio, Fabio D'Andreagiovanni, Giulio Sidoretti, Nicola Blefari-Melazzi, Stefano Salsano. 1-8 [doi]
- OTF: Optical Torus-based fault-tolerant DCNSaeedeh Akbari Rokn Abari, Somayyeh Koohi. 1-8 [doi]
- Set-top box virtualization as a personal cloud server for 5G usersGabriele Baldoni, Christian Grasso, Alfio Lombardo, Corrado Rametta, Andrea Scala, Silvia Sottile. 1-3 [doi]
- Destination-specific maximally redundant trees: Design, performance comparison, and applicationsWolfgang Braun, Daniel Merling, Michael Menth. 1-8 [doi]
- A globally optimised multipath routing algorithm using SDNNoel Farrugia, Victor Buttigieg, Johann A. Briffa. 1-8 [doi]
- Evaluation of algorithms for multipath route selection over the InternetFabian Helfert, Heiko Niedermayer, Georg Carle. 1-8 [doi]
- A scalable resource allocation scheme for NFV: Balancing utilization and path stretchYordanos Woldeyohannes, Ali Mohammadkhan, K. K. Ramakrishnan, Yuming Jiang. 1-8 [doi]
- Classification of URL bitstreams using bag of bytesKeiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi. 1-5 [doi]
- Traffic modeling for aggregated periodic IoT dataTobias Hoßfeld, Florian Metzger, Poul E. Heegaard. 1-8 [doi]
- ITU-T network model extension for virtualized network architecturesBenoit Lemoine. 1-5 [doi]