Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NFV Anomaly Detection: Case Study through a Security Module., , , , and . IEEE Commun. Mag., 60 (2): 18-24 (2022)Extending Kubernetes Clusters to Low-Resource Edge Devices Using Virtual Kubelets., , and . IEEE Trans. Cloud Comput., 10 (4): 2623-2636 (2022)Service Relationship Orchestration: Lessons Learned From Running Large Scale Smart City Platforms on Kubernetes., , , , and . IEEE Access, (2021)BRAHMA+: A Framework for Resource Scaling of Streaming and ASAP Time-Varying Workflows., , , and . IEEE Trans. Netw. Serv. Manag., 15 (3): 894-908 (2018)Resource Provisioning in Fog Computing through Deep Reinforcement Learning., , , and . IM, page 431-437. IEEE, (2021)Evaluation of Grid Scheduling Strategies Through a Network-Aware Grid Simulator., , , , and . PDPTA, page 31-35. CSREA Press, (2003)Demo abstract: RPiaaS: A raspberry pi testbed for validation of cloud resource management strategies., , , and . INFOCOM Workshops, page 946-947. IEEE, (2017)Single-path versus multi-path advance reservation in media production networks., , , and . NOF, page 1-6. IEEE, (2015)Self-organizing Fog Support Services for Responsive Edge Computing., , and . J. Netw. Syst. Manag., 29 (2): 16 (2021)Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques., , , , and . J. Netw. Syst. Manag., 30 (1): 12 (2022)