default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 76 matches
- 2015
- Niels L. M. van Adrichem, Fernando A. Kuipers:
NDNFlow: Software-defined Named Data Networking. NetSoft 2015: 1-5 - Amin Aflatoonian, Ahmed Bouabdallah, Karine Guillouard, Vincent Catros, Jean-Marie Bonnin:
BYOC: Bring Your Own Control a new concept to monetize SDN's openness. NetSoft 2015: 1-5 - Ahmed Al-Jawad, Ramona Trestian, Purav Shah, Orhan Gemikonakli:
BaProbSDN: A probabilistic-based QoS routing mechanism for Software Defined Networks. NetSoft 2015: 1-5 - Elian Aubry, Thomas Silverston, Isabelle Chrisment:
SRSC: SDN-based routing scheme for CCN. NetSoft 2015: 1-5 - Cataldo Basile, Antonio Lioy, Christian Pitscheider, Fulvio Valenza, Marco Vallini:
A novel approach for integrating security policy enforcement with dynamic network virtualization. NetSoft 2015: 1-5 - Andreas Baumgartner, Varun S. Reddy, Thomas Bauschert:
Mobile core network virtualization: A model for combined virtual core network function placement and topology optimization. NetSoft 2015: 1-9 - Stéphane Betgé-Brezetz, Guy-Bertrand Kamga, Monsef Tazi:
Trust support for SDN controllers and virtualized network applications. NetSoft 2015: 1-5 - Khalil Blaiech, Salaheddine Hamadi, Petko Valtchev, Omar Cherkaoui, André Béliveau:
Toward a semantic-based packet forwarding model for Openflow. NetSoft 2015: 1-6 - Jeremias Blendin, Julius Rückert, Tobias Volk, David Hausheer:
Adaptive Software Defined Multicast. NetSoft 2015: 1-9 - Roberto Bonafiglia, Francesco Ciaccia, Antonio Lioy, Mario Nemirovsky, Fulvio Risso, Tao Su:
Offloading personal security applications to a secure and trusted network node. NetSoft 2015: 1-2 - Mathieu Bouet, Jérémie Leguay, Vania Conan:
Cost-based placement of vDPI functions in NFV infrastructures. NetSoft 2015: 1-9 - Wolfgang Braun, Michael Menth:
Scalable resilience for Software-Defined Networking using Loop-Free Alternates with loop detection. NetSoft 2015: 1-6 - Matthew Broadbent, Daniel King, Sean Baildon, Nektarios Georgalas, Nicholas J. P. Race:
OpenCache: A software-defined content caching platform. NetSoft 2015: 1-5 - Cosmin Caba, José Soler:
APIs for QoS configuration in Software Defined Networks. NetSoft 2015: 1-5 - Franco Callegati, Walter Cerroni, Chiara Contoli, Giuliano Santandrea:
Dynamic chaining of Virtual Network Functions in cloud-based edge networks. NetSoft 2015: 1-5 - Igor Duarte Cardoso, João Paulo Barraca, Carlos Goncalves, Rui L. Aguiar:
Seamless integration of Cloud and Fog networks. NetSoft 2015: 1-9 - Prosper Chemouil, George Pavlou, Raouf Boutaba, Alex Galis:
NetSoft 2015 - Foreword. NetSoft 2015: 1 - Po-Wen Chi, Chien-Ting Kuo, Jing-Wei Guo, Chin-Laung Lei:
How to detect a compromised SDN switch. NetSoft 2015: 1-6 - Sakshi Chourasia, Krishna M. Sivalingam:
SDN based Evolved Packet Core architecture for efficient user mobility support. NetSoft 2015: 1-5 - Roberto Doriguzzi Corin, Elio Salvadori, Pedro A. Aranda-Gutiérrez, Christian Stritzke, Alec Leckey, Kevin Phemius, Elisa Rojas, Carmen Guerrero:
NetIDE: Removing vendor lock-in in SDN. NetSoft 2015: 1-2 - Domenico Cotroneo, Luigi De Simone, Antonio Ken Iannillo, Anna Lanzaro, Roberto Natella:
Dependability evaluation and benchmarking of Network Function Virtualization Infrastructures. NetSoft 2015: 1-9 - Thomas Dietz, Roberto Bifulco, Filipe Manco, João Martins, Hans-Joerg Kolbe, Felipe Huici:
Enhancing the BRAS through virtualization. NetSoft 2015: 1-5 - Masaki Fukushima, Keisuke Kuroki, Michiaki Hayashi:
Unified metamodel for orchestrating different domains in SDI. NetSoft 2015: 1-6 - Jokin Garay, Jon Matías, Alaitz Mendiola, Jasone Astorga, Eduardo Jacob:
Self-deploying Service Graphs over ELwUD (EHU-OEF Lightweight UNIFY Domain). NetSoft 2015: 1-2 - Matteo Gerola, Michele Santuari, Elio Salvadori, Stefano Salsano, Pier Luigi Ventre, Mauro Campanella, Francesco Lombardo, Giuseppe Siracusano:
ICONA: Inter Cluster Onos Network application. NetSoft 2015: 1-2 - Gabriela Gheorghe, Tigran Avanesov, Maria Rita Palattella, Thomas Engel, Ciprian P. Popoviciu:
SDN-RADAR: Network troubleshooting combining user experience and SDN capabilities. NetSoft 2015: 1-5 - Kostas Giotis, Yiannos Kryftis, Vasilis Maglaris:
Policy-based orchestration of NFV services in Software-Defined Networks. NetSoft 2015: 1-5 - Naman Grover, Nitin Agarwal, Kotaro Kataoka:
liteFlow: Lightweight and distributed flow monitoring platform for SDN. NetSoft 2015: 1-9 - Riccardo Guerzoni, Ishan Vaishnavi, Ansah Frimpong, Riccardo Trivisonno:
Virtual Link Mapping for delay critical services in SDN-enabled 5G networks. NetSoft 2015: 1-9 - Jong Hun Han, Gianni Antichi, Noa Zilberman, Charalampos Rotsos, Andrew W. Moore:
An integrated environment for open-source network softwarization. NetSoft 2015: 1-2
skipping 46 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-16 08:41 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint