Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PredCloud: Providing predictable network performance in large-scale OpenFlow-enabled cloud platforms through trust-based allocation of resources., , , , and . Comput. Commun., (2016)IoNCloud: Exploring application affinity to improve utilization and predictability in datacenters., , , , , , and . ICC, page 5497-5503. IEEE, (2015)A toolset for efficient privacy-oriented virtual network embedding and its instantiation on SDN/OpenFlow-based substrates., , , , and . Comput. Commun., (2016)No more backups: Toward efficient embedding of survivable virtual networks., , , , , , and . ICC, page 2128-2132. IEEE, (2013)Opportunistic resilience embedding (ORE): Toward cost-efficient resilient virtual networks., , , , , , and . Comput. Networks, (2015)A heuristic-based algorithm for privacy-oriented virtual network embedding., , , , and . NOMS, page 1-8. IEEE, (2014)Survivor: An enhanced controller placement strategy for improving SDN survivability., , , , and . GLOBECOM, page 1909-1915. IEEE, (2014)DoS-resilient virtual networks through multipath embedding and opportunistic recovery., , , , , , and . SAC, page 597-602. ACM, (2013)Virtual network security: threats, countermeasures, and challenges., , , , and . J. Internet Serv. Appl., 6 (1): 1:1-1:19 (2015)An intelligent model for logistics management based on geofencing algorithms and RFID technology., , , , and . Expert Syst. Appl., 42 (15-16): 6082-6097 (2015)