Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Bottom-Up Approach for Extracting Network Intents., , , , , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 858-870. Springer, (2020)On the design and development of emulation platforms for NFV-based infrastructures., , , , , , , , , and 1 other author(s). Int. J. Grid Util. Comput., 11 (2): 230-242 (2020)Beyond VNFM: Filling the gaps of the ETSI VNF manager to fully support VNF life cycle operations., , , , , , , , , and . Int. J. Netw. Manag., (2021)A deterministic approach for extracting network security intents., , , , , , , and . Comput. Networks, (2022)HashCuckoo: Predicting Elephant Flows using Meta-Heuristics in Programmable Data Planes., , and . GLOBECOM, page 6337-6342. IEEE, (2022)An Efficient Multipath Mechanism Based on the Flowlet Abstraction and P4., and . GLOBECOM, page 1-6. IEEE, (2018)Abordagem de Composição de Programas P4 em Redes Programáveis., , and . SBRC, page 1028-1041. (2019)NIEP: NFV Infrastructure Emulation Platform., , , , , , , , , and 1 other author(s). AINA, page 173-180. IEEE Computer Society, (2018)