Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XTC: A Throughput Control Mechanism for Xen-Based Virtualized Software Routers., , and . GLOBECOM, page 1-6. IEEE, (2011)Building an IaaS cloud with droplets: a collaborative experience with OpenStack., , , , , , , , and . J. Netw. Comput. Appl., (2018)Um Algoritmo de Posicionamento de Pontos de Coleta para uma Rede de Sensores Baseada em Ônibus Urbanos., , and . SBRC, (2017)Avaliação de Desempenho de um Proxy HTTP Implementado como Função Virtual de Rede., , and . SBRC, page 1-14. (2018)Virtual networks: isolation, performance, and trends., , , , , , , , and . Annales des Télécommunications, 66 (5-6): 339-355 (2011)Performance evaluation of a virtualized HTTP proxy in KVM and Docker., , and . NOF, page 1-5. IEEE, (2016)VNEXT: Virtual network management for Xen-based Testbeds., , , , , , , , and . NOF, page 41-45. IEEE, (2011)Improving Image-recognition Edge Caches with a Generative Adversarial Network., , and . CoRR, (2022)Early-exit deep neural networks for distorted images: providing an efficient edge offloading., , and . GLOBECOM, page 1-6. IEEE, (2021)Using Degree Centrality to Identify Market Manipulation on Bitcoin., and . DPM/CBT@ESORICS, volume 13140 of Lecture Notes in Computer Science, page 208-223. Springer, (2021)