Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protection plan design for cloud tenants with bandwidth guarantees., , and . DRCN, page 115-122. IEEE, (2016)Towards Scalable Traffic Management in Cloud Data Centers., , , and . IEEE Trans. Commun., 62 (3): 1033-1045 (2014)Multicast Virtual Network Embedding in Cloud Data Centers with Delay Constraints., , and . IEEE CLOUD, page 482-489. IEEE Computer Society, (2014)Breaking Service Function Chains with Khaleesi., , and . Networking, page 64-72. IFIP, (2018)Energy-Aware Mapping and Scheduling of Network Flows With Deadlines on VNFs., , , and . TGCN, 3 (1): 192-204 (2019)Offering Resilient and Bandwidth Guaranteed Services in Multi-Tenant Cloud Networks:Harnessing the Sharing Opportunities, , and . 28th International Teletraffic Congress (ITC 28), Würzburg, Germany, (September 2016)Guest Editors' Introduction: Special Section on Design and Management of Reliable Communication Networks., , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 2455-2459 (2021)Traffic engineering in cloud data centers: A column generation approach., , , and . NOMS, page 1-5. IEEE, (2014)Traffic Refinery: Cost-Aware Data Representation for Machine Learning on Network Traffic., , , , , and . SIGMETRICS (Abstracts), page 7-8. ACM, (2022)New approach for the dynamic enforcement of Web services security., , , and . PST, page 189-196. IEEE, (2010)