


default search action
CAN@CoNEXT 2017: Incheon, Republic of KoreaA
- Puneet Sharma, Jinho Hwang:
Proceedings of the 2nd Workshop on Cloud-Assisted Networking, CAN@CoNEXT 2017, Incheon, Republic of Korea, December 12, 2017. ACM 2017, ISBN 978-1-4503-5423-3 - DeokGi Hong, Jaemin Shin, Shinae Woo, Sue Moon:
Considerations on deploying high-performance container-based NFV. 1-6 - Christian Sieber, Raphael Durner, Maximilian Ehm, Wolfgang Kellerer
, Puneet Sharma:
Towards optimal adaptation of NFV packet processing to modern CPU memory architectures. 7-12 - Zhixiong Niu, Hong Xu
, Libin Liu
, Yongqiang Tian
, Peng Wang, Zhenhua Li:
Unveiling performance of NFV software dataplanes. 13-18 - Maja Curic, Georg Carle, Zoran Despotovic, Ramin Khalili, Artur Hecker
:
SDN on ACIDs. 19-24 - Huan Chen, Theophilus Benson:
Switch-visor: towards infrastructure-level virtualization of SDN switches. 25-30 - Hassan Habibi Gharakheili
, Vijay Sivaraman:
Cloud assisted home networks. 31-36 - Alessio Silvestro, Roberto Bifulco, Fabian Schneider, Xiaoming Fu
, Jussi Kangasharju
:
MISE: MIddleboxes SElection for multi-domain service function chains. 37-42 - Aggelos Lazaris, Viktor K. Prasanna:
DeepFlow: a deep learning framework for software-defined measurement. 43-48 - Fei Zhang, Bo Zhao
, Xiaoming Fu
, Ramin Yahyapour
:
Controlling migration performance of virtual machines according to user's requirements. 49-54 - Si Young Jang, Hayoung Choi, Yoonhyung Lee, Byoungheon Shin, Dongman Lee:
Semantic virtualization for Edge-IoT cloud: issues and challenges. 55-60 - Xiang Lan, Yuezhi Zhou, Di Zhang, Xinggang Wang, Xiaoming Yao, Xiaoming Fu:
Cloud-assisted trajectory data management and analysis: a case study. 61-66 - Vincentius Martin, Qiang Cao, Theophilus Benson:
Fending off IoT-hunting attacks at home networks. 67-72

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.