Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Protection based on Searchable Encryption and Anonymization Techniques., , , , , , and . NOMS, page 1-5. IEEE, (2023)A Reputation and Security Mechanism for Heterogeneous Vehicular Networks., , , , and . ISCC, page 1-6. IEEE, (2022)Abstraction of Heterogeneous IoT Devices for Management of Smart Homes., , , , and . LATINCOM, page 1-6. IEEE, (2019)Aplicando Redes Neurais e Análise Temporal para Predição Adaptativa de Desempenho de Rede., , , , and . SBRC, page 490-503. (2023)A Bandwidth-Feasibility Algorithm for Reliable Virtual Network Allocation., , and . AINA, page 504-511. IEEE Computer Society, (2014)Strategies for daytime slicing in future internet service providers., , , , and . Trans. Emerg. Telecommun. Technol., (2020)Software-Defined Management of Edge as a Service Networks., , , , and . IEEE Trans. Netw. Serv. Manag., 13 (2): 226-239 (2016)Scalable Channels Allocation in Smart Environments Considering Cross-Interference., , , and . DCOSS, page 228-235. IEEE, (2021)A framework for SLA establishment of virtual networks based on QoS classes., , and . IM, page 1175-1178. IEEE, (2013)Energy-Aware Slicing of Network Resources based on Elastic Demand through Daytime., , , , , and . IM, page 604-608. IFIP, (2019)