Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to a Fault Tolerance LISP Architecture., , , , , , and . WWIC, volume 6649 of Lecture Notes in Computer Science, page 338-349. Springer, (2011)Ontology-Based Information Extraction from the Configuration Command Line of Network Routers., , , and . MIKE, volume 8891 of Lecture Notes in Computer Science, page 312-322. Springer, (2014)Network coding-based protection scheme for Elastic Optical Networks., , , , , and . DRCN, page 1-8. IEEE, (2014)Improving reliability in multi-layer networks with Network Coding Protection., , , , , , and . ONDM, page 240-245. IEEE, (2014)Handling service allocation in combined Fog-cloud scenarios., , , , , and . ICC, page 1-5. IEEE, (2016)Managing resilience in carrier grade networks: Survey, open issues and trends., , , and . Comput. Commun., (2015)A novel predictive PCE-based protection strategy for resilient transport networks., , and . Comput. Commun., (2016)Proactive vs reactive failure recovery assessment in combined Fog-to-Cloud (F2C) systems., , , , and . CAMAD, page 1-5. IEEE, (2017)Dynamic slicing reconfiguration for virtualized 5G networks using ML forecasting of computing capacity., , , , , , , , , and 1 other author(s). Comput. Networks, (November 2023)Route leak detection using real-time analytics on local BGP information., , , , , and . GLOBECOM, page 1942-1948. IEEE, (2014)