Search

Your search keyword '"Stefano Secci"' showing total 88 results

Search Constraints

Start Over You searched for: Author "Stefano Secci" Remove constraint Author: "Stefano Secci" Search Limiters Full Text Remove constraint Search Limiters: Full Text
88 results on '"Stefano Secci"'

Search Results

2. Innovative In Situ and Ex Situ Conservation Strategies of the Madonie Fir Abies nebrodensis

3. Hyperbolic K-means for traffic-aware clustering in cloud and virtualized RANs

4. Augmenting DiffServ operations with dynamically learned classes of services

5. Function splitting, isolation, and placement trade-offs in network slicing

6. FastRule: Efficient Flow Entry Updates for TCAM-Based OpenFlow Switches

8. Complexity-Performance Trade-offs in Robust Access Point Clustering for Edge Computing

9. The SYRROCA AI-empowered network automation platform

10. Intelligent Reflecting Surface Assisted Anti-Jamming Communications Based on Reinforcement Learning

11. On the impact of novel function mappings, sharing policies, and split settings in network slice design

12. Game Theoretical Analysis of Cross-Chain Swaps

13. LSTM-based radiography for anomaly detection in softwarized infrastructures

14. Network Function Mapping: from 3G Entities to 5G Service-Based Functions Decomposition

15. Botnet Fingerprinting: a Frequency Distributions Scheme for Lightweight Bot Detection

16. A Vademecum on Blockchain Technologies: When, Which, and How

17. Going Beyond DiffServ in IP Traffic Classification

18. BotFP: FingerPrints Clustering for Bot Detection

19. Decentralization of 5G slice resource allocation

20. Game Theoretical Framework for Analyzing Blockchains Robustness

21. ParaCon: A Parallel Control Plane for Scaling Up Path Computation in SDN

22. An implementation of multipath TCP in ns3

23. Multi-Resource Allocation for Network Slicing

24. Error Estimate and Fairness in Resource Allocation with Inaccurate Information Sharing

25. Multi-Resource Allocation for Network Slicing under Service Level Agreements

26. Availability-driven NFV Orchestration

27. Brief Announcement: Game Theoretical Framework for Analyzing Blockchains Robustness

28. Heuristics for static cloudlet location

29. Detection of zero-day attacks: An unsupervised port-based approach

30. Optimized assignment patterns in Mobile Edge Cloud networks

31. LISP-MSX: Decentralized Interconnection of Independent LISP Mapping Systems

32. Fair Resource Allocation in Systems with Complete Information Sharing

33. ULOOF: a User Level Online Offloading Framework for Mobile Edge Computing

34. Bitcoin Pool-Hopping Detection

35. Prescriptive Analytics for MEC Orchestration

36. Multipath Transmission for the Internet: A Survey

37. Internet Acceleration with LISP Traffic Engineering and Multipath TCP

38. Crowded spot estimator for urban cellular networks

39. Can MPTCP secure Internet communications from man-in-the-middle attacks?

40. Mobile Edge Cloud Network Design Optimization

41. Achieving Sub-Second Downtimes in Large-Scale Virtual Machine Migrations with LISP

42. Estimating human trajectories and hotspots through mobile phone data

43. On the incentives and incremental deployments of ICN technologies for OTT services

44. MPTCP robustness against large-scale man-in-the-middle attacks

45. A Nucleolus-Based Approach for Resource Allocation in OFDMA Wireless Mesh Networks

46. Optimal Orchestration of Virtual Network Functions

47. A Mood Value for Fair Resource Allocations

48. Characterizing and predicting mobile application usage

49. A survey of strategies for communication networks to protect against large-scale natural disasters

50. On Fair Network Cache Allocation to Content Providers

Catalog

Books, media, physical & digital resources