Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2016
- Niels L. M. van Adrichem, Farabi Muhammad Iqbal, Fernando A. Kuipers:
Backup rules in Software-Defined Networks. NFV-SDN 2016: 179-185 - Alan Bairley, Geoffrey G. Xie:
Orchestrating network control functions via comprehensive trade-off exploration. NFV-SDN 2016: 114-120 - Jarrod N. Bakker, Ian Welch, Winston K. G. Seah:
Network-wide virtual firewall using SDN/OpenFlow. NFV-SDN 2016: 62-68 - Michael Till Beck, Juan Felipe Botero, Kai Samelin:
Resilient allocation of service Function chains. NFV-SDN 2016: 128-133 - Giuseppe Antonio Carella, Michael Pauls, Lars Grebe, Thomas Magedanz:
An extensible Autoscaling Engine (AE) for Software-based Network Functions. NFV-SDN 2016: 219-225 - Jacob H. Cox Jr., Russell J. Clark, Henry L. Owen:
Security policy transition framework for Software Defined networks. NFV-SDN 2016: 56-61 - Prasun Kanti Dey, Murat Yuksel:
CAR: Cloud-Assisted Routing. NFV-SDN 2016: 100-106 - Cristina K. Dominicini, Gilmar L. Vassoler, Moisés R. N. Ribeiro, Magnos Martinello:
VirtPhy: A fully programmable infrastructure for efficient NFV in small data centers. NFV-SDN 2016: 81-86 - Chunyan Fu, Wolfgang John, Catalin Meirosu:
EPLE: An Efficient Passive Lightweight Estimator for SDN packet loss measurement. NFV-SDN 2016: 192-198 - Cirios S. Gomes, Felipe Sampaio Dantas da Silva, Emidio P. Neto, Kevin B. Costa, João Batista da Silva:
Towards a Modular Interactive Management approach for SDN Infrastructure orchestration. NFV-SDN 2016: 1-6 - Bernardo A. Huberman, Puneet Sharma:
COMPARE: Comparative Advantage driven resource allocation for Virtual Network Functions. NFV-SDN 2016: 212-218 - Aman Jain, Sadagopan N. S, Sunny Kumar Lohani, Mythili Vutukuru:
A comparison of SDN and NFV for re-designing the LTE Packet Core. NFV-SDN 2016: 74-80 - Michail-Alexandros Kourtis, George Xilouris, Georgios Gardikis, Ioannis Koutras:
Statistical-based anomaly detection for NFV services. NFV-SDN 2016: 161-166 - Christian Makaya, Douglas M. Freimuth:
Automated virtual network functions onboarding. NFV-SDN 2016: 206-211 - Ahmed M. Medhat, Giuseppe A. Carella, Michael Pauls, Marcello Monachesi, Marius Corici, Thomas Magedanz:
Resilient orchestration of Service Functions Chains in a NFV environment. NFV-SDN 2016: 7-12 - Priyanka Naik, Dilip Kumar Shaw, Mythili Vutukuru:
NFVPerf: Online performance monitoring and bottleneck detection for NFV. NFV-SDN 2016: 154-160 - Saurav Nanda, Faheem Zafari, Casimer M. DeCusatis, Eric Wedaa, Baijian Yang:
Predicting network attack patterns in SDN using machine learning approach. NFV-SDN 2016: 167-172 - Balázs Németh, Balázs Sonkoly, Matthias Rost, Stefan Schmid:
Efficient service graph embedding: A practical approach. NFV-SDN 2016: 19-25 - Om Prakash Nirankari, Prakash Pawar, Kotaro Kataoka:
Optimizing Service Chain ID generation for flow rule compression. NFV-SDN 2016: 226-232 - Mathis Obadia, Jean-Louis Rougier, Luigi Iannone, Vania Conan, Mathieu Bouet:
Revisiting NFV orchestration with routing games. NFV-SDN 2016: 107-113 - Manuel Peuster, Holger Karl, Steven van Rossem:
MeDICINE: Rapid prototyping of production-ready network services in multi-PoP environments. NFV-SDN 2016: 148-153 - Varun S. Reddy, Andreas Baumgartner, Thomas Bauschert:
Robust embedding of VNF/service chains with delay bounds. NFV-SDN 2016: 93-99 - Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). NFV-SDN 2016: 50-55 - Amit Sheoran, Xiangyu Bu, Lianjie Cao, Puneet Sharma, Sonia Fahmy:
An empirical case for container-driven fine-grained VNF resource flexing. NFV-SDN 2016: 121-127 - Muhammad Shuaib Siddiqui, Eduard Escalona, Eleni Trouva, Michail-Alexandros Kourtis, Dimitrios Kritharidis, Konstantinos V. Katsaros, S. Spirou, C. Canales, M. Lorenzo:
Policy based virtualised security architecture for SDN/NFV enabled 5G access networks. NFV-SDN 2016: 44-49 - Liran Sidki, Yehuda Ben-Shimol, Akiva Sadovski:
Fault tolerant mechanisms for SDN controllers. NFV-SDN 2016: 173-178 - Thomas Soenen, Sahel Sahhaf, Wouter Tavernier, Pontus Sköldström, Didier Colle, Mario Pickavet:
A model to select the right infrastructure abstraction for Service Function Chaining. NFV-SDN 2016: 233-239 - Salvatore Talarico, Kiran Makhijani, Padma Pillay-Esnault:
Efficient service auto-discovery for next generation network slicing architecture. NFV-SDN 2016: 26-32 - Sinan Tatlicioglu, Seyhan Civanlar, Burak Gorkemli, Erhan Lokman, A. Metin Balci, C. Bora Eliacik:
A security services platform for Software Defined Networks. NFV-SDN 2016: 39-43 - Brendan Tschaen, Ying Zhang, Theophilus Benson, Sujata Banerjee, Jeongkeun Lee, Joon-Myung Kang:
SFC-Checker: Checking the correct forwarding behavior of Service Function chaining. NFV-SDN 2016: 134-140
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 07:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint