The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Network Function Virtualization (NFV) technologies are fundamental enablers to meet the objectives of 5G networks. In this work, we first introduce the architecture for dynamic deployment and composition of virtual functions proposed by the Superfluidity project. Then we consider a case study based on a typical 5G scenario. In particular, we detail the design and implementation of a Video Streaming...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Video streaming has established itself as the main method to consume multimedia content on the Internet. The most widespread technique is HTTP Adaptive Streaming which is used by large video service platforms such as YouTube and Netflix. In order to guarantee a high QoE, different adaptation strategies have been developed that lead to different video playout patterns. While some strategies may be...
WebRTC is a promising standard for real-time communication in the browser. It supports transfer of delay sensitive real-time video and audio material using SRTP, as well as transfer of arbitrary data using SCTP. The congestion control algorithms of these two transport protocols are optimized for two different goals: While RTP tries to keep delays minimal, SCTP tries to maximize throughput. This contradiction...
Data centers consume substantial amounts of energy. Server clusters, being an integral part of data centers, take the largest share. Load balancing policies in server clusters have historically been optimized for performance or simplicity. However, the choice of load balancing policy, together with the power provisioning policy, can greatly impact energy efficiency of a server cluster. In this paper...
Bio-inspired paradigms are proving to be useful in analysing propagation and dissemination of information in networks. In this paper we explore the use of multi-type branching processes to analyse viral properties of content in a social network, with and without competition from other sources. We derive and compute various virality measures, e.g., probability of virality, expected number of shares,...
Intrusion Detection Systems (IDS) are aimed at analyzing and detecting security problems. IDS based on anomaly detection and, in particular, on statistical analysis, inspect each traffic flow in order to get its statistical characterization, which represents the fingerprint of the flow. Software Defined Networking (SDN) is revolutionizing the networking industry by enabling programmability, easier...
Commercial-off-the-shelf (COTS) components are used in numerous communication systems and application fields for cost reduction. While this trend is adopted in various home and business scenarios, most components for safety critical systems are proprietary or significantly modified. This also applies to networks using IP over Ethernet. Hardly any accepted methods to certify safety critical communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.