Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 81 matches
- 2022
- Haruna Umar Adoga, Yehia Elkhatib, Dimitrios P. Pezaros:
On the Performance Benefits of Heterogeneous Virtual Network Function Execution Frameworks. NetSoft 2022: 109-114 - Sagar Agarwal, Venkatarami Reddy Chintapalli, Bheemarjuna Reddy Tamma:
FlexSFC: Flexible Resource Allocation and VNF Parallelism for Improved SFC Placement. NetSoft 2022: 302-306 - Paul Alcock, Ben Simms, Will Fantom, Charalampos Rotsos, Nicholas J. P. Race:
Improving Intent Correctness with Automated Testing. NetSoft 2022: 61-66 - Abrar S. Alhazmi, Sanaa H. Mohamed, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani:
OWC-enabled Spine and Leaf Architecture Towards Energy Efficient Data Center Networks. NetSoft 2022: 13-18 - Antonino Angi, Alessio Sacco, Flavio Esposito, Guido Marchetto, Alexander Clemm:
NLP4: An Architecture for Intent-Driven Data Plane Programmability. NetSoft 2022: 25-30 - Yacine Anser, Chrystel Gaber, Jean-Philippe Wary, Sara Nieves Matheu-García, Samia Bouzefrane:
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum. NetSoft 2022: 321-329 - Hiroki Baba, Shiku Hirai, Takayuki Nakamura, Sho Kanemaru, Kensuke Takahashi, Taisuke Omoto, Shinsaku Akiyama, Senri Hirabaru:
End-to-end 5G network slice resource management and orchestration architecture. NetSoft 2022: 269-271 - Sherry Bai, Hyojoon Kim, Jennifer Rexford:
Passive OS Fingerprinting on Commodity Switches. NetSoft 2022: 264-268 - Ahmet Cihat Baktir, Amadeu do Nascimento Júnior, András Zahemszky, Ankita Likhyani, Dagnachew Azene Temesgene, Dinand Roeland, Elham Dehghan Biyar, Refik Fatih Ustok, Marin Orlic, Mirko D'Angelo:
Intent-based cognitive closed-loop management with built-in conflict handling. NetSoft 2022: 73-78 - Fetia Bannour, Stefania Dumbrava, Alex Danduran-Lembezat:
GOX: Towards a Scalable Graph Database-Driven SDN Controller. NetSoft 2022: 278-280 - Cataldo Basile, Daniele Canavese, Leonardo Regano, Ignazio Pedone, Antonio Lioy:
A model of capabilities of Network Security Functions. NetSoft 2022: 474-479 - Elia Battiston, Daniele Moro, Giacomo Verticale, Antonio Capone:
CHIMA: a Framework for Network Services Deployment and Performance Assurance. NetSoft 2022: 163-170 - Conor Black, Sandra Scott-Hayward:
Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks. NetSoft 2022: 411-419 - Raffaele Bolla, Roberto Bruschi, Alessandro Carrega, Franco Davoli, Chiara Lombardo:
Trading off Power Consumption and Delay in the Execution of Network Functions by Dynamic Activation of Processing Units. NetSoft 2022: 1-6 - Davide Borsatti, Walter Cerroni, Stuart Clayman:
From Category Theory to Functional Programming: A Formal Representation of Intent. NetSoft 2022: 31-36 - Badre Bousalem, Vinicius F. Silva, Rami Langar, Sylvain Cherrier:
Deep Learning-based Approach for DDoS Attacks Detection and Mitigation in 5G and Beyond Mobile Networks. NetSoft 2022: 228-230 - Matthew Buckley, Sepehr Abbasi Zadeh, Mohammad Amin Beiruti, Soheil Abbasloo, Yashar Ganjali:
Switch Migration Scheduling in Distributed SDN Controllers. NetSoft 2022: 348-356 - Simone Bussa, Riccardo Sisto, Fulvio Valenza:
Security Automation using Traffic Flow Modeling. NetSoft 2022: 486-491 - Pedro Casas, Michael Seufert, Sarah Wassermann, Bruno Gardlo, Nikolas Wehner, Raimund Schatz:
DeepCrypt - Deep Learning for QoE Monitoring and Fingerprinting of User Actions in Adaptive Video Streaming. NetSoft 2022: 259-263 - Alexander Clemm, Cédric Westphal:
Challenges and Opportunities in Green Networking. NetSoft 2022: 43-48 - Roberto Doriguzzi Corin, Silvio Cretti, Tiziana Catena, Simone Magnani, Domenico Siracusa:
Towards Application-Aware Provisioning of Security Services with Kubernetes. NetSoft 2022: 284-286 - Francesco D'Alterio, Marco Teodori, Luca Rea, Francesco Matera:
Probability-based dispatching framework for speed-test applications: design and implementation. NetSoft 2022: 157-162 - Oscar Delgado, Brigitte Jaumard, Zhiyi Ding, Fadi Bishay, Vincent Bissonnette:
Demo: A Network Simulator for 5G Virtualized Networks. NetSoft 2022: 237-239 - Rafael Direito, Diogo Gomes, Rui L. Aguiar:
Towards a Fully Automated System for Testing and Validating NetApps. NetSoft 2022: 231-233 - Korian Edeline, Thomas Carlisi, Justin Iurman, Benoit Claise, Benoit Donnet:
Towards a Closed-Looped Automation for Service Assurance with the DxAgent. NetSoft 2022: 67-72 - Hao Fu, Timothy O'Farrell:
The Spectral and Energy Efficiency of Ultra-Dense IoT Networks. NetSoft 2022: 55-60 - Lluis Gifre, Carlos Manso, Ramon Casellas, Ricardo Martínez, Ricard Vilalta, Raul Muñoz:
Experimental Demonstration of End-to-end NFV Orchestration on Top of the ADRENALINE Testbed. NetSoft 2022: 281-283 - Daniel González-Sánchez, Ignacio Dominguez Martinez-Casanueva, Antonio Pastor, Luis Bellido Triana, Cristina Pinar Muñoz Zamarro, Alejandro Antonio Moreno Sancho, David Fernández Cambronero, Diego R. López:
Model-Driven Network Monitoring Using NetFlow Applied to Threat Detection. NetSoft 2022: 450-455 - Giovanni Grieco, Domenico Striccoli, Giuseppe Piro, Raffaele Bolla, Gennaro Boggia, Luigi Alfredo Grieco:
Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains. NetSoft 2022: 468-473 - Himank Gupta, A. Antony Franklin, Mayank Kumar, Bheemarjuna Reddy Tamma:
Traffic-Aware Dynamic Functional Split for 5G Cloud Radio Access Networks. NetSoft 2022: 297-301
skipping 51 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-22 18:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint