Nome |
# |
Optimizing Deep Packet Inspection for High-Speed Traffic Analysis, file e384c42e-1049-d4b2-e053-9f05fe0a1d67
|
2732
|
Introducing Network-Aware Scheduling Capabilities in OpenStack, file e384c42e-3b31-d4b2-e053-9f05fe0a1d67
|
1805
|
Assessing the Performance of Virtualization Technologies for NFV: a Preliminary Benchmarking, file e384c42d-c6b7-d4b2-e053-9f05fe0a1d67
|
1579
|
Lightweight, Payload-Based Traffic Classification: An Experimental Evaluation, file e384c42d-fbda-d4b2-e053-9f05fe0a1d67
|
1541
|
Clarifying fog computing and networking: 10 questions and answers, file e384c42f-96a4-d4b2-e053-9f05fe0a1d67
|
1462
|
An Architecture for High Performance Network Analysis, file e384c42d-f9ea-d4b2-e053-9f05fe0a1d67
|
1362
|
NetPDL: An Extensible XML-Based Language for Packet Header Description, file e384c42d-f5d5-d4b2-e053-9f05fe0a1d67
|
1074
|
Customizing Data-plane Processing in Edge Routers, file e384c42e-1f20-d4b2-e053-9f05fe0a1d67
|
1056
|
Virtualized Security at the Network Edge: A User-centric Approach, file e384c42e-39c4-d4b2-e053-9f05fe0a1d67
|
954
|
Modeling filtering predicates composition with Finite State Automata, file e384c42e-13b3-d4b2-e053-9f05fe0a1d67
|
907
|
Creating portable and efficient packet processing applications, file e384c42e-1486-d4b2-e053-9f05fe0a1d67
|
881
|
Filtering Network Traffic Based on Protocol Encapsulation Rules, file e384c42e-1f22-d4b2-e053-9f05fe0a1d67
|
860
|
Offloading personal security applications to a secure and trusted network node, file e384c42e-3b32-d4b2-e053-9f05fe0a1d67
|
806
|
Fog Computing and Networking: Part 2, file e384c42f-965d-d4b2-e053-9f05fe0a1d67
|
802
|
Efficient Multistriding of Large Non-deterministic Finite State Automata for Deep Packet Inspection, file e384c42e-1f24-d4b2-e053-9f05fe0a1d67
|
790
|
iNFAnt: NFA pattern matching on GPGPU devices, file e384c42e-1701-d4b2-e053-9f05fe0a1d67
|
781
|
Decoupling Bandwidth and Delay Properties in Class Based Queuing, file e384c42d-edee-d4b2-e053-9f05fe0a1d67
|
723
|
Supporting Fine-Grained Network Functions through Intel DPDK, file e384c42e-3400-d4b2-e053-9f05fe0a1d67
|
699
|
Migrating to IPv6: The Problem of the Applications, file e384c42d-efa5-d4b2-e053-9f05fe0a1d67
|
684
|
Comparing P2PTV Traffic Classifiers, file e384c42e-0e7b-d4b2-e053-9f05fe0a1d67
|
682
|
Comparative Evaluation of Packet Classification Algorithms for Implementation on Resource Constrained Systems, file e384c42d-f05e-d4b2-e053-9f05fe0a1d67
|
679
|
Using XML for Efficient and Modular Packet Processing, file e384c42d-f571-d4b2-e053-9f05fe0a1d67
|
662
|
Increasing Performances of TCP Data Transfers Through Multiple Parallel Connections, file e384c42e-08a9-d4b2-e053-9f05fe0a1d67
|
662
|
Network Virtual Machine (NetVM): A New Architecture for Efficient and Portable Packet Processing Applications, file e384c42d-f05c-d4b2-e053-9f05fe0a1d67
|
651
|
Some Controversial Opinions on Software-Defined Data Plane Services, file e384c42e-2af4-d4b2-e053-9f05fe0a1d67
|
629
|
Service-Based Traffic Classification: Principles and Validation, file e384c42e-05ab-d4b2-e053-9f05fe0a1d67
|
627
|
GT: Picking up the Truth from the Ground for Internet Traffic, file e384c42e-04dd-d4b2-e053-9f05fe0a1d67
|
625
|
Automatic Configuration of Opaque Network Functions in CMS, file e384c42e-2f99-d4b2-e053-9f05fe0a1d67
|
614
|
An Experimental Evaluation of the Computational Cost of a DPI Traffic Classifier, file e384c42e-08f6-d4b2-e053-9f05fe0a1d67
|
613
|
Improving cost and accuracy of DPI traffic classifiers, file e384c42e-178c-d4b2-e053-9f05fe0a1d67
|
602
|
A Framework for Rapid Development and Portable Execution of Packet-Handling Applications, file e384c42d-f062-d4b2-e053-9f05fe0a1d67
|
601
|
An Efficient Data Exchange Algorithm for Chained Network Functions, file e384c42e-303f-d4b2-e053-9f05fe0a1d67
|
596
|
Implementation and Characterization of an Advanced Scheduler, file e384c42d-edef-d4b2-e053-9f05fe0a1d67
|
592
|
Modeling Complex Packet Filters with Finite State Automata, file e384c42e-2a55-d4b2-e053-9f05fe0a1d67
|
585
|
Per-user Policy Enforcement on Mobile Apps through Network Functions Virtualization, file e384c42e-33fe-d4b2-e053-9f05fe0a1d67
|
572
|
A Tunnel-aware Language for Network Packet Filtering, file e384c42e-0b5c-d4b2-e053-9f05fe0a1d67
|
571
|
Mapping Packet Processing Applications on a Systolic Array Network Processor, file e384c42e-02b2-d4b2-e053-9f05fe0a1d67
|
564
|
Multi-Domain Service Orchestration Over Networks and Clouds: A Unified Approach, file e384c42d-be34-d4b2-e053-9f05fe0a1d67
|
563
|
A unifying orchestration operating platform for 5G, file e384c42f-94ca-d4b2-e053-9f05fe0a1d67
|
542
|
Operational and Performance Issues of a CBQ router, file e384c42d-efa2-d4b2-e053-9f05fe0a1d67
|
541
|
Vehicle Navigation Service Based on Real-Time Traffic Information, file e384c42e-1f28-d4b2-e053-9f05fe0a1d67
|
530
|
ALEX: Improving SIP Support in Systems with Multiple Network Addresses, file e384c42d-f5d4-d4b2-e053-9f05fe0a1d67
|
524
|
SPAF: Stateless FSA-Based Packet Filters, file e384c42e-0e07-d4b2-e053-9f05fe0a1d67
|
517
|
A Transparent Highway for inter-Virtual Network Function Communication with Open vSwitch, file e384c42f-217a-d4b2-e053-9f05fe0a1d67
|
517
|
On the Efficiency of PGPS-based Packet and Cell Switching Technologies for Traffic with Guaranteed Delay, file e384c42d-efa4-d4b2-e053-9f05fe0a1d67
|
516
|
Modeling Native Software Components as Virtual Network Functions, file e384c42f-28d5-d4b2-e053-9f05fe0a1d67
|
514
|
Towards Effective Portability of Packet Handling Applications Across Heterogeneous Hardware Platforms, file e384c42d-f5d2-d4b2-e053-9f05fe0a1d67
|
495
|
Toward dynamic virtualized network services in telecom operator networks, file e384c42e-c85b-d4b2-e053-9f05fe0a1d67
|
493
|
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs, file e384c42e-3906-d4b2-e053-9f05fe0a1d67
|
490
|
Fog Computing and Networking: Part 1 [Guest editorial], file e384c42f-965b-d4b2-e053-9f05fe0a1d67
|
485
|
A unifying operating platform for 5G end-to-end and multi-layer orchestration, file e384c42f-94c7-d4b2-e053-9f05fe0a1d67
|
484
|
Efficiency of Packet Voice with Deterministic Delay, file e384c42d-e3e3-d4b2-e053-9f05fe0a1d67
|
473
|
User-specific Network Service Functions in an SDN-enabled Network Node, file e384c42e-3042-d4b2-e053-9f05fe0a1d67
|
473
|
Designing a videoconference system for active networks, file e384c42d-efa8-d4b2-e053-9f05fe0a1d67
|
471
|
LMAP: A Protocol to Automate the Setup of Logical Networks, file e384c42d-f9f1-d4b2-e053-9f05fe0a1d67
|
458
|
LISP-ROAM: Network-based Host Mobility with LISP, file e384c42e-3040-d4b2-e053-9f05fe0a1d67
|
457
|
Per-user NFV services with mobility support, file e384c42f-8f4a-d4b2-e053-9f05fe0a1d67
|
454
|
Exploiting the network for securing personal devices, file e384c42e-3b3e-d4b2-e053-9f05fe0a1d67
|
445
|
CLOSER: A Collaborative Locality-aware Overlay SERvice, file e384c42e-0dcd-d4b2-e053-9f05fe0a1d67
|
440
|
Extending the NetPDL Language to Support Traffic Classification, file e384c42d-ff86-d4b2-e053-9f05fe0a1d67
|
433
|
Design and implementation of a framework for creating portable and efficient packet-processing applications, file e384c42d-ff63-d4b2-e053-9f05fe0a1d67
|
429
|
Offloading security applications into the network, file e384c42e-3871-d4b2-e053-9f05fe0a1d67
|
429
|
Comparing the Efficiency of IP and ATM Telephony, file e384c42d-f376-d4b2-e053-9f05fe0a1d67
|
424
|
Research Directions in Network Service Chaining, file e384c42e-2af2-d4b2-e053-9f05fe0a1d67
|
415
|
Designing a videoconference system for active networks, file e384c42d-f37c-d4b2-e053-9f05fe0a1d67
|
406
|
Advanced VPN Support on FreeBSD Systems, file e384c42d-f9f5-d4b2-e053-9f05fe0a1d67
|
392
|
Providing End-to-End Connectivity to SIP User Agents Behind NATs, file e384c42d-fbdb-d4b2-e053-9f05fe0a1d67
|
392
|
Partial offloading of OpenFlow rules on a traditional hardware switch ASIC, file e384c42f-94c9-d4b2-e053-9f05fe0a1d67
|
391
|
Data Mining Techniques for Effective Flow-based Analysis of Multi-Gigabit Network Traffic, file e384c42d-f9f6-d4b2-e053-9f05fe0a1d67
|
390
|
Enabling NFV Services on Resource-Constrained CPEs, file e384c42e-ff92-d4b2-e053-9f05fe0a1d67
|
384
|
WinPcap: una libreria Open Source per l'analisi di rete, file e384c42d-f9ee-d4b2-e053-9f05fe0a1d67
|
379
|
Time Driven Priority Router Implementation and First Experiments, file e384c42d-f5d8-d4b2-e053-9f05fe0a1d67
|
373
|
MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks, file e384c42e-3041-d4b2-e053-9f05fe0a1d67
|
366
|
Locating Equivalent Servants over P2P Networks, file e384c42e-187d-d4b2-e053-9f05fe0a1d67
|
362
|
Engineering a Quality of Service-Enabled Network: a Case Study, file e384c42d-f9ec-d4b2-e053-9f05fe0a1d67
|
358
|
Transparent Optimization of Inter-Virtual Network Function Communication in Open vSwitch, file e384c42e-ff0a-d4b2-e053-9f05fe0a1d67
|
341
|
DynNav: Toward Open and Interoperable Navigation Services, file e384c42e-3b30-d4b2-e053-9f05fe0a1d67
|
339
|
Data Mining Techniques For Effective and Scalable Traffic Analysis, file e384c42d-f05b-d4b2-e053-9f05fe0a1d67
|
338
|
Optimizing packet capture on symmetric multiprocessing machines, file e384c42d-f9f4-d4b2-e053-9f05fe0a1d67
|
338
|
Enabling Flexible Packet Filtering Through Dynamic Code Generation, file e384c42d-ff8c-d4b2-e053-9f05fe0a1d67
|
332
|
Creating Complex Network Services with eBPF: Experience and Lessons Learned, file e384c430-433c-d4b2-e053-9f05fe0a1d67
|
331
|
Moving Applications from the Host to the Network:
Experiences, Challenges and Findings, file e384c42e-2de9-d4b2-e053-9f05fe0a1d67
|
326
|
Mimicking a compute domain orchestrator with the ONOS SDN Controller, file e384c42f-8e8c-d4b2-e053-9f05fe0a1d67
|
313
|
End-to-end service orchestration across SDN and cloud computing domains, file e384c42f-8e41-d4b2-e053-9f05fe0a1d67
|
311
|
Distributed connectivity service for a SIP infrastructure, file e384c42d-fc14-d4b2-e053-9f05fe0a1d67
|
303
|
On the Efficiency of Packet Telephony, file e384c42d-edea-d4b2-e053-9f05fe0a1d67
|
292
|
Robustness analysis of an unstructured overlay for media communication, file e384c42e-0d7c-d4b2-e053-9f05fe0a1d67
|
284
|
Profiling and optimization of software-based network-analysis applications, file e384c42d-f9f0-d4b2-e053-9f05fe0a1d67
|
275
|
An Intrusion Detection Sensor for the NetVM Virtual Processor, file e384c42e-08a6-d4b2-e053-9f05fe0a1d67
|
273
|
Modeling filtering predicates composition with Finite State Automata, file e384c42e-13b1-d4b2-e053-9f05fe0a1d67
|
273
|
Network Virtual Machine (NetVM): Portabilità ed efficienza nell'elaborazione di pacchetti di rete, file e384c42d-f061-d4b2-e053-9f05fe0a1d67
|
247
|
Analysis of a Method for Differential TCP Service, file e384c42d-edec-d4b2-e053-9f05fe0a1d67
|
241
|
Modularità applicata all'elaborazione di pacchetti di rete: il linguaggio NetPDL, file e384c42d-f05f-d4b2-e053-9f05fe0a1d67
|
227
|
NFV service dynamicity with a DevOps approach: insights from a use-case realization, file e384c42f-8e02-d4b2-e053-9f05fe0a1d67
|
224
|
Seamless configuration of virtual network functions in data center provider networks, file e384c42f-9d82-d4b2-e053-9f05fe0a1d67
|
224
|
Enforcement of dynamic HTTP policies on resource-constrained residential gateways, file e384c42f-94c5-d4b2-e053-9f05fe0a1d67
|
197
|
D7.1 - Project leaflet and portal, file e384c42f-1f15-d4b2-e053-9f05fe0a1d67
|
191
|
NFV service dynamicity with a DevOps approach: demonstrating zero-touch deployment & operations, file e384c42f-8e40-d4b2-e053-9f05fe0a1d67
|
186
|
Defining a generic OR-VNFM interface for configuring network functions, file e384c42f-64ab-d4b2-e053-9f05fe0a1d67
|
178
|
An efficient data exchange mechanism for chained network functions, file e384c42f-e53a-d4b2-e053-9f05fe0a1d67
|
154
|
Totale |
56568 |