Author of the publication

Survivor: An enhanced controller placement strategy for improving SDN survivability.

, , , , and . GLOBECOM, page 1909-1915. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating high-throughput reliable multicast for grid applications in production networks., , , , and . CCGRID, page 442-449. IEEE Computer Society, (2005)Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems., , , , , and . IM, page 435-442. IEEE, (2013)Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions., , , , and . IM, page 98-106. IEEE, (2015)Funnel: Choking Polluters in BitTorrent File Sharing Communities., , , and . IEEE Trans. Network and Service Management, 8 (4): 310-321 (2011)POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based Verification., , , and . ACM Conference on Computer and Communications Security, page 2495-2497. ACM, (2017)Optimal Service Function Chain Composition in Network Functions Virtualization., , , , , , , , and . AIMS, volume 10356 of Lecture Notes in Computer Science, page 62-76. Springer, (2017)AGRADC: An architecture for autonomous deployment and configuration of grid computing applications., , , , and . ISCC, page 805-810. IEEE Computer Society, (2009)Disconnecting to connect: Understanding optimistic disconnection in BitTorrent., , , and . P2P, page 138-148. IEEE, (2012)CCNrel: Leveraging relations among objects to improve the performance of CCN., , , , , and . IM, page 199-206. IEEE, (2015)Decentralized proof of location in vehicular Ad Hoc networks., , and . Computer Communications, (2019)