Results 81 to 90 of about 22,423 (206)

D-STREAMON: from middlebox to distributed NFV framework for network monitoring

open access: yes, 2017
Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. On the other side, the network threats tend to
Bianchi, Giuseppe   +6 more
core   +1 more source

Creating Tailored and Adaptive Network Services with the Open Orchestration C-RAN Framework

open access: yes, 2018
Next generation wireless communications networks will leverage software-defined radio and networking technologies, combined with cloud and fog computing. A pool of resources can then be dynamically allocated to create personalized network services (NSs).
Floriach-Pigem, Marti   +3 more
core   +1 more source

A Framework for SFC Integrity in NFV Environments [PDF]

open access: yes, 2017
AbstractIndustry and academia have increased the deployment of Network Functions Virtualization (NFV) on their environments, either for reducing expenditures or taking advantage of NFV flexibility for service provisioning. In NFV, Service Function Chainings (SFC) composed of Virtualized Network Functions (VNF) are defined to deliver services to ...
Lucas Bondan   +4 more
openaire   +2 more sources

Matrix Differential Decomposition-Based Anomaly Detection and Localization in NFV Networks

open access: yesIEEE Access, 2019
Network function virtualization (NFV) is a promising network paradigm that enables the design and implementation of novel network services with lower cost, increased agility, and faster time-to-value.
Jing Chen   +3 more
doaj   +1 more source

Enhancing satellite & terrestrial networks integration through NFV/SDN technologies [PDF]

open access: yes, 2015
NFV and SDN technologies can become key facilitators for the combination of terrestrial and satellite networks. Enabling NFV into the SatCom domain will provide operators with appropriate tools and interfaces in order to establish end-to-end fully ...
Agapiou, George   +10 more
core   +1 more source

Asymptotically exact mean field theory for the Anderson model including double occupancy

open access: yes, 1993
The Anderson impurity model for finite values of the Coulomb repulsion $U$ is studied using a slave boson representation for the empty and doubly occupied $f$-level.
A. George   +26 more
core   +1 more source

Blockchain-Based Security Framework for VNF Package Protection in 5G Network Slicing Services

open access: yesTransport and Telecommunication
The demand for scalable, open and granular networks has enabled mobile networks such as 5G to adopt new concepts including NFV (Network Function Virtualization). NFV separates the dependency of network functions from the hardware component, allowing them
Boukessessa Meriem   +2 more
doaj   +1 more source

APMEC: An Automated Provisioning Framework for Multi-access Edge Computing

open access: yes, 2018
Novel use cases and verticals such as connected cars and human-robot cooperation in the areas of 5G and Tactile Internet can significantly benefit from the flexibility and reduced latency provided by Network Function Virtualization (NFV) and Multi-Access
Doan, Tung V.   +3 more
core  

SDN and NFV for satellite infrastructures [PDF]

open access: yes, 2016
The integration of SDN and NFV enablers into the satellite network could prove to be an essential means to save on physical sites, improve the time to bring new services to the market and open new ways to improve network resiliency, availability ...
Agapiou, George   +6 more
core   +1 more source

NFV [PDF]

open access: yes, 2022
openaire   +1 more source

Home - About - Disclaimer - Privacy