Author of the publication

Hey, Lumi! Using Natural Language for Intent-Based Network Management.

, , , , , , and . USENIX ATC, page 625-639. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Refining Network Intents for Self-Driving Networks., , , and . SelfDN@SIGCOMM, page 15-21. ACM, (2018)A deterministic approach for extracting network security intents., , , , , , , and . Comput. Networks, (2022)Examining the Centralization of Email Industry: A Landscape Analysis for IPv4 and IPv6., , , and . ISCC, page 360-366. IEEE, (2023)SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management., , , , , , and . CNSM, page 1-7. IEEE, (2020)Artificial neural network model to predict affinity for virtual network functions., , , , , and . NOMS, page 1-9. IEEE, (2018)Affinity measurement for NFV-enabled networks: A criteria-based approach., , , , , and . IM, page 125-133. IEEE, (2017)A Bottom-Up Approach for Extracting Network Intents., , , , , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 858-870. Springer, (2020)AI/ML for Network Security: The Emperor has no Clothes., , , , , and . CCS, page 1537-1551. ACM, (2022)DWT in P4: Periodicity Detection in the Data Plane., , , , , , and . GLOBECOM, page 6343-6348. IEEE, (2022)Predicting Elephant Flows in Internet Exchange Point Programmable Networks., , , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 485-497. Springer, (2019)