Author of the publication

Research and experimentation with the HIMALIS network architecture for future internet.

, , and . Future Network & Mobile Summit, page 1-8. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity based architecture for secure communication in future internet., , , and . Digital Identity Management, page 45-48. ACM, (2010)Using identities to achieve enhanced privacy in future content delivery networks., and . Comput. Electr. Eng., 38 (2): 346-355 (2012)Repeated Leader Follower Game for Managing Cloud Networks With Limited Resources., , , and . IEEE Access, (2019)Scalable Directory Service for IoT Applications., , , and . IEEE Commun. Stand. Mag., 1 (3): 58-65 (2017)Automatic Construction of Name-Bound Virtual Networks for IoT and its Management., , , , and . J. Inf. Process., (2018)A Genetic Approach to Continuous Optimization of Virtual Network Embedding., , and . ICIN, page 70-74. IEEE, (2021)Consideration On Automation of 5G Network Slicing with Machine Learning., , , and . Kaleidoscope, page 1-8. IEEE, (2018)Integrating an identity-based control plane with the HIMALIS network architecture., , and . NetSoft, page 1-5. IEEE, (2015)Using the Total Cost of Ownership to Decide Resource Adjustment in Virtual Networks., , and . ICIN, page 329-335. IEEE, (2019)Achieving the autonomic adaptation of resources in virtualized network environments., , and . ICIN, page 52-59. IEEE, (2017)