Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Réseau virtuel"'
Autor:
Bista, Ghoshana
Publikováno v:
Information Theory [cs.IT]. Ecole normale supérieure de lyon-ENS LYON, 2023. English. ⟨NNT : 2023ENSL0003⟩
Today, a massive shift is ongoing in telecommunication networks with the emergence of softwarization and cloudification. Among the technologies which are assisting these shifts, one of them is NFV (Network Function Virtualization). NFV is the network
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::2bc802ddcf34e4cc8d4192acd018d4a8
https://theses.hal.science/tel-04074989/file/BISTA_Ghoshana_2023ENSL0003_These.pdf
https://theses.hal.science/tel-04074989/file/BISTA_Ghoshana_2023ENSL0003_These.pdf
Publikováno v:
Distributed, Parallel, and Cluster Computing [cs.DC]. École normale supérieure de Lyon, 2023. English. ⟨NNT : ⟩
Today, a massive shift is ongoing in telecommunication networks with the emergence of softwarization and cloudification. Among the technologies which are assisting these shifts, one of them is NFV (Network Function Virtualization). NFV is the network
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5ca420b7a1ec726d8a7484bc47f1b930
https://hal.inria.fr/tel-04016919/file/Manuscript.pdf
https://hal.inria.fr/tel-04016919/file/Manuscript.pdf
The high-value Internet services that have been significantly enhanced with the integration of network virtualization and Software Defined Networking (SDN) technology are increasingly attracting the attention of end-users and major computer network c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=06cdd3ff4700::b89fe1b5be9a680152ee9b7c4d61df38
https://arima.episciences.org/5321
https://arima.episciences.org/5321
Autor:
Behrad, Shanay
Publikováno v:
Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2020. English. ⟨NNT : 2020IPPAS007⟩
The fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements, e.g. concerning quality of service or security. Using the virtualization technologies and the concept of network slicing, the 5G net
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::fbf0d95f03f71e6e4b0ed35f120c1af5
https://theses.hal.science/tel-02614232
https://theses.hal.science/tel-02614232
Autor:
Boutigny, François
Publikováno v:
Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2019. English. ⟨NNT : 2019IPPAS002⟩
5G brings a new concept called network slicing. This technology makes it possible to generalize the business model of MVNOs to companies in need to operate a network, without it being their core business. Each slice is an end-to-end, dedicated and cu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::2d9414266f72156b83d284106a1e863e
https://tel.archives-ouvertes.fr/tel-02469417
https://tel.archives-ouvertes.fr/tel-02469417
Autor:
Boutigny, François
Publikováno v:
Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris, 2019. English. ⟨NNT : 2019IPPAS002⟩
5G brings a new concept called network slicing. This technology makes it possible to generalize the business model of MVNOs to companies in need to operate a network, without it being their core business. Each slice is an end-to-end, dedicated and cu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::2d9414266f72156b83d284106a1e863e
https://theses.hal.science/tel-02469417
https://theses.hal.science/tel-02469417
La détection tardive des menaces à la sécurité entraîne une augmentation significative du risque de dommages irréparables, invalidant toute tentative de défense. En conséquence, la détection rapide des menaces en temps réel est obligatoire
Externí odkaz:
http://www.theses.fr/2018SORUS035/document
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université; Universidade federal do Rio de Janeiro, 2018. English. ⟨NNT : 2018SORUS035⟩
The late detection of security threats causes a significant increase in the risk of irreparable damages, disabling any defense attempt. As a consequence, fast real-time threat detection is mandatory for security administration. In addition, Network F
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::87a34abe520b023c3df4b7f40833850b
https://tel.archives-ouvertes.fr/tel-02111017/file/2018SORUS035.pdf
https://tel.archives-ouvertes.fr/tel-02111017/file/2018SORUS035.pdf
Autor:
Jmila, Houda
L’informatique en nuage (Cloud computing) est une technologie prometteuse facilitant la réservation et de l'utilisation des ressources d’une manière flexible et dynamique. En plus des ressources informatiques traditionnelles, les utilisateurs d
Externí odkaz:
http://www.theses.fr/2015TELE0023/document
Autor:
Vincent Autefage, Damien Magoni
Publikováno v:
JRES 2013 : 10èmes journées réseaux
JRES 2013 : 10èmes journées réseaux, Dec 2013, Montpellier, France. pp.Article 111
HAL
JRES 2013 : 10èmes journées réseaux, Dec 2013, Montpellier, France. pp.Article 111
HAL
National audience; NEmu (Network Emulator for mobile universes) est un environnement permettant d'instancier des réseaux virtuels statiques, dynamiques ou mobiles avec un contrôle accru sur les propriétés de la topologie ainsi que sur la configur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::66aea7fb8d0bd496bfc3e6fe3c5df980
https://hal.archives-ouvertes.fr/hal-00917673
https://hal.archives-ouvertes.fr/hal-00917673