323 results on '"Stefano Secci"'
Search Results
2. Flexible Association and Placement for Open-RAN.
3. Network Slice Robustness with Function Sets.
4. Function Placement for In-network Federated Learning.
5. Experiences with Disaggregated RAN Integrations.
6. ELoRa: End-to-end Emulation of Massive IoT LoRaWAN Infrastructures.
7. Packet Delivery Ratio Guarantees for Differentiated LoRaWanServices.
8. A Lightweight Southbound Interface for Standalone P4-NetFPGA SmartNICs.
9. An Open Dataset for Beyond-5G Data-driven Network Automation Experiments.
10. Anomaly Detection for 5G Softwarized Infrastructures with Federated Learning.
11. Function Placement and Acceleration for In-Network Federated Learning Services.
12. Traffic Control and Channel Assignment for Quality Differentiation in Dense Urban LoRaWANs.
13. Line rate botnet detection with SmartNIC-embedded feature extraction.
14. Distributed Algorithms for Multi-Resource Allocation.
15. Function Splitting, Isolation, and Placement Trade-Offs in Network Slicing.
16. An AI-Empowered Framework for Cross-Layer Softwarized Infrastructure State Assessment.
17. Robust Access Point Clustering in Edge Computing Resource Optimization.
18. Complexity-Performance Trade-offs in Robust Access Point Clustering for Edge Computing.
19. A Math-Heuristic for Network Slice Design.
20. Game Theoretical Framework for Analyzing Blockchains Robustness.
21. The SYRROCA AI-empowered network automation platform.
22. LSTM-based radiography for anomaly detection in softwarized infrastructures.
23. Decentralization of 5G slice resource allocation.
24. BotFP: FingerPrints Clustering for Bot Detection.
25. Going Beyond DiffServ in IP Traffic Classification.
26. Game Theoretical Analysis of Cross-Chain Swaps.
27. Intelligent Reflecting Surface Assisted Anti-Jamming Communications Based on Reinforcement Learning.
28. On the impact of novel function mappings, sharing policies, and split settings in network slice design.
29. Resilient NFV Technology and Solutions.
30. Scalable and Collaborative Intrusion Detection and Prevention Systems Based on SDN and NFV.
31. Hyperbolic K-means for traffic-aware clustering in cloud and virtualized RANs.
32. Multi-Resource Allocation for Network Slicing under Service Level Agreements.
33. Numerical evaluation of MPTCP schedulers in terms of throughput and reliability.
34. Split and Merge: Detecting Unknown Botnets.
35. Brief Announcement: Game Theoretical Framework for Analyzing Blockchains Robustness.
36. Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection.
37. Multi-Resource Allocation for Network Slicing.
38. Network Function Mapping: From 3G Entities to 5G Service-Based Functions Decomposition.
39. Special issue on blockchain networks and distributed protocols.
40. Internet acceleration with LISP traffic engineering and multipath TCP.
41. Redundant Packet Scheduling by Uncorrelated Paths in Heterogeneous Wireless Networks.
42. Bitcoin Pool-Hopping Detection.
43. Fast Lookup Is Not Enough: Towards Efficient and Scalable Flow Entry Updates for TCAM-Based OpenFlow Switches.
44. Prescriptive Analytics for MEC Orchestration.
45. FastRule: Efficient Flow Entry Updates for TCAM-Based OpenFlow Switches.
46. Efficient Recovery Path Computation for Fast Reroute in Large-Scale Software-Defined Networks.
47. A Vademecum on Blockchain Technologies: When, Which, and How.
48. Error Estimate and Fairness in Resource Allocation With Inaccurate Information Sharing.
49. LISP-MSX: Decentralized Interconnection of Independent LISP Mapping Systems.
50. Optimized assignment patterns in Mobile Edge Cloud networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.