Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Mubeen Zulfiqar"'
Autor:
Raouf Boutaba, Jeebak Mitra, Sepehr Taeb, Nashid Shahriar, Mahdi Hemmati, Mubeen Zulfiqar, Shihabur Rahman Chowdhury
Publikováno v:
IEEE Journal on Selected Areas in Communications. 39:2734-2747
Elastic Optical Networks (EONs) enable finer-grained resource allocation and tuning of transmission configurations for right-sized resource allocation. These features make EONs excellent choice for 5G transport networks supporting highly dynamic traf
Autor:
Shihabur Rahman Chowdhury, Massimo Tornatore, Sepehr Taeb, Raouf Boutaba, Mubeen Zulfiqar, Nashid Shahriar, Mahdi Hemmati, Jeebak Mitra
Publikováno v:
IEEE Transactions on Network and Service Management. 17:1418-1431
5G network slicing allows partitioning of network resources to meet stringent end-to-end service requirements across multiple network segments, from access to transport. These requirements are shaping technical evolution in each of these segments. In
Autor:
Mubeen Zulfiqar, Massimo Tornatore, Nashid Shahriar, Shihabur Rahman Chowdhury, Sepehr Taeb, Raouf Boutaba, Jeebak Mitra, Mahdi Hemmati
Publikováno v:
Scopus-Elsevier
OFC
OFC
We present a novel re-adaptation approach to accommodate bandwidth increase of virtual links in elastic optical networks. Our approach can incorporate different objectives, as minimizing disruption, by choosing among a comprehensive set of re-adaptat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b35c0f704770168b4c392eebde8ac067
http://hdl.handle.net/11311/1134056
http://hdl.handle.net/11311/1134056
Autor:
Mubeen Zulfiqar, Raouf Boutaba, Jeebak Mitra, Massimo Tornatore, Nashid Shahriar, Sepehr Taeb, Mahdi Hemmati, Shihabur Rahman Chowdhury
Publikováno v:
CNSM
In 5G networks, slicing allows partitioning of network resources to meet stringent end-to-end service requirements across multiple network segments, from access to transport. These requirements are shaping technical evolution in each of these segment
Publikováno v:
NCA
Widespread permeation of IoT devices into our daily lives has created a diverse spectrum of security and privacy concerns unique to the IoT ecosystem. Conventional host and network security mechanisms fail to address these issues due to resource cons