81 results on '"Gaspary, Luciano Paschoal"'
Search Results
2. Identifying elephant flows using dynamic thresholds in programmable IXP networks
3. A fix-and-optimize approach for efficient and large scale virtual network function placement and chaining
4. Making puzzles green and useful for adaptive identity management in large-scale distributed systems
5. Future of Network and Service Operations and Management: Trends, Developments, and Directions
6. An optimization-based approach for efficient network monitoring using in-band network telemetry
7. Adaptive placement & chaining of virtual network functions with NFV-PEAR
8. Data Plane Programmability Beyond OpenFlow: Opportunities and Challenges for Network and Service Operations and Management
9. Message from the New Editor-in-Chief
10. Virtual network security: threats, countermeasures, and challenges
11. Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems
12. Denial-of-service attacks and countermeasures on BitTorrent
13. Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
14. A framework for risk assessment based on analysis of historical information of workflow execution in IT systems
15. C hangeL edge: Change design and planning in networked systems based on reuse of knowledge and automation
16. Managing the Next Wave of Information and Communications Technologies: A Report on NOMS 2012
17. Integrated Management of Systems, Services, Processes and People in IT: A Report on DSOM 2009
18. Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
19. Spotlights on Network Operations and Management Research in Latin America—A Report on LANOMS 2005
20. MUSE: An Environment for the Conception of Java Multimedia Applications
21. Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation.
22. Dissecting the Performance of VR Video Streaming through the VR-EXP Experimentation Platform.
23. The Contour Image Style Transfer based Convolutional Neural Network.
24. MEICAN: Simplifying DCN Life-Cycle Management from End-User and Operator Perspectives in Inter-Domain Environments.
25. ASTORIA: A framework for attack simulation and evaluation in smart grids.
26. Virtual network embedding in software-defined networks.
27. Reconnecting Partitions on Physical Infrastructures: Towards an Expansion Strategy for Efficient Virtual Network Embedding.
28. Were You There? Bridging the Gap to Unveil Users' Online Sessions in Networked, Distributed Systems.
29. HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding.
30. A heuristic-based algorithm for privacy-oriented virtual network embedding.
31. Slowing down to speed up: Protecting users against massive attacks in content distribution systems.
32. Distributed Prosoft : management of tools and memory
33. Make it green and useful: Reshaping puzzles for identity management in large-scale distributed systems.
34. Trust-based grouping for cloud datacenters: Improving security in shared infrastructures.
35. Characterizing the impact of network substrate topologies on virtual network embedding.
36. Security-aware optimal resource allocation for virtual network embedding.
37. Planning in the large: Efficient generation of IT change plans on large infrastructures.
38. Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks.
39. A Runtime Constraint-Aware Solution for Automated Refinement of IT Change Plans.
40. Network-based intrusion detection systems evaluation through a short term experimental script.
41. A WSDM-Based Architecture for Global Usage Characterization of Grid Computing Infrastructures.
42. DÓRIS — Pedagogical Agent in Intelligent Tutoring Systems.
43. Efficient Model Checking of IT Change Operations.
44. Design of Distributed Multimedia Applications (DAMD).
45. Design and execution of adaptive multimedia applications in the Internet.
46. A conservative strategy to protect P2P file sharing systems from pollution attacks.
47. MUSE — An interactive networked multimedia applications specification environment with E-LOTOS translator.
48. A SNMP-Based Platform for Distributed Stateful Intrusion Detection in Enterprise Networks.
49. Advances in Networking Software.
50. Message from the CNSM general co-chairs.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.