Mostrando 10 resultados de: 14
Publisher
Computer Networks(2)
DRCN 2014 - Proceedings, 10th International Conference on Design of Reliable Communication Networks(2)
IEEE Communications Magazine(2)
2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2014(1)
2014 IEEE Global Communications Conference, GLOBECOM 2014(1)
Área temáticas
Ciencias de la computación(12)
Física aplicada(4)
Programación informática, programas, datos, seguridad(3)
Derechos civiles y políticos(1)
El proceso político(1)
Área de conocimiento
Ciencias de la computación(10)
Red informática(8)
Computación en la nube(3)
Comunicación(3)
Estadísticas(1)
A new era for cities with fog computing
ArticleAbstract: In this article, the authors dissect the technical challenges that cities face when implementing smaPalabras claves:CLOUD COMPUTING, fog computing, internet of things, Internet/Web technologies, IOT, Smart cities, VirtualizationAutores:Carrera D., Chacin P., Corsaro A., Diego Montero, Flores M.M., Jain A., Olive A., Parellada O.L., Pérez-Camaño J.L., Van Lingen F., Yannuzzi M.Fuentes:googlescopusA survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing
ArticleAbstract: The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol in the Internet, thuPalabras claves:BGP, BGPSEC, Inter-domain, internet, routing, securityAutores:Diego Montero, Masip-Bruin X., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusDiagnosis of route leaks among autonomous systems in the Internet
Conference ObjectAbstract: Border Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was dPalabras claves:Autores:Diego Montero, Masip-Bruin X., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusImproving TCP performance and reducing self-induced congestion with receive window modulation
Conference ObjectAbstract: We present a control module for software edge routers called Receive Window Modulation - RWM. Its maPalabras claves:Edge router, Rate limiting, Self-induced congestion, TCP flow controlAutores:Arcas-Abella O., Ciaccia F., Diego Montero, Milito R., Nemirovsky M., Romero I., Serral-Gracià R.Fuentes:googlescopusKey ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing
Conference ObjectAbstract: This paper examines some of the most promising and challenging scenarios in IoT, and shows why currePalabras claves:actuation, CLOUD COMPUTING, data analytics, fog computing, IOT, mobility, Real-time control, securityAutores:Diego Montero, Milito R., Nemirovsky M., Serral-Gracià R., Yannuzzi M.Fuentes:googlescopusRoute leak detection using real-time analytics on local BGP information
Conference ObjectAbstract: A route leak can be defined as a security gap that occurs due to the infringement of the routing polPalabras claves:BGP, Inter-domain routing, Route leaks, securityAutores:Diego Montero, Masip-Bruin X., Ramirez W., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusRoute leak identification: A step toward making inter-domain routing more reliable
Conference ObjectAbstract: Route leaks are one of the anomalies of inter-domain routing that have the capacity to produce largePalabras claves:Autores:Diego Montero, Masip-Bruin X., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusSABES: Statistical Available Bandwidth EStimation from passive TCP measurements
Conference ObjectAbstract: Estimating available network resources is fundamental when adapting the sending rate both at the appPalabras claves:Available bandwidth, network machine learning, passive probingAutores:Arcas-Abella O., Ciaccia F., Diego Montero, Nemirovsky M., Romero I., Serral-Gracià R.Fuentes:googlescopusNetwork coding-based protection scheme for elastic optical networks
Conference ObjectAbstract: Optical technologies are the foundations supporting the current telecommunication network backbonesPalabras claves:Elastic Optical Networks, Network Coding, Proactive ProtectionAutores:Diego Montero, Lopez V., Martinez A., Masip-Bruin X., Ramirez W., Yannuzzi M.Fuentes:googlescopusOffloading personal security applications to the Network Edge: A mobile user case scenario
Conference ObjectAbstract: This paper discusses some challenges that user mobility imposes over the user-centric protection modPalabras claves:fog computing, mobility, NFV, Offloading, SDN, security, VirtualizationAutores:D Montero, Diego Montero, Serral-Gracià R.Fuentes:googlerraaescopus