Zobrazeno 1 - 10
of 463
pro vyhledávání: '"Vieira, Marcos A."'
Network Function Virtualization (NFV) seeks to replace hardware middleboxes with software-based Network Functions (NFs). NFV systems are seeing greater deployment in the cloud and at the edge. However, especially at the edge, there is a mismatch betw
Externí odkaz:
http://arxiv.org/abs/2305.01890
Autor:
Kim, Kangchon1 (AUTHOR) kangchonsara@gmail.com, Vieira, Marcos C.1 (AUTHOR), Gouma, Sigrid2 (AUTHOR), Weirick, Madison E.2 (AUTHOR), Hensley, Scott E.2 (AUTHOR), Cobey, Sarah1 (AUTHOR)
Publikováno v:
Influenza & Other Respiratory Viruses. Nov2024, Vol. 18 Issue 11, p1-13. 13p.
Autor:
Mendonça, Ronan D., Gomes, Otávio S., Vieira, Luiz F. M., Vieira, Marcos A. M., Vieira, Alex B., Nacif, José A. M.
In this paper, we propose a blockchain-based cold chain technology for vaccine cooling track. The COVID-19 pandemic has caused the death of millions of people. An important step towards ending the pandemic is vaccination. Vaccines must be kept under
Externí odkaz:
http://arxiv.org/abs/2104.14357
Autor:
Wang, Jianfeng, Lévai, Tamás, Li, Zhuojin, Vieira, Marcos A. M., Govindan, Ramesh, Raghavan, Barath
Software is often used for Network Functions (NFs) -- such as firewalls, NAT, deep packet inspection, and encryption -- that are applied to traffic in the network. The community has hoped that NFV would enable rapid development of new NFs and leverag
Externí odkaz:
http://arxiv.org/abs/2101.06466
Autor:
Ghosh, Pradipta, Liu, Xiaochen, Qiu, Hang, Vieira, Marcos A. M., Sukhatme, Gaurav S., Govindan, Ramesh
Public cameras often have limited metadata describing their attributes. A key missing attribute is the precise location of the camera, using which it is possible to precisely pinpoint the location of events seen in the camera. In this paper, we explo
Externí odkaz:
http://arxiv.org/abs/2003.10664
Autor:
Ghosh, Pradipta, Bunton, Jonathan, Pylorof, Dimitrios, Vieira, Marcos, Chan, Kevin, Govindan, Ramesh, Sukhatme, Gaurav, Tabuada, Paulo, Verma, Gunjan
Advances in optimization and constraint satisfaction techniques, together with the availability of elastic computing resources, have spurred interest in large-scale network verification and synthesis. Motivated by this, we consider the top-down synth
Externí odkaz:
http://arxiv.org/abs/2002.04244
Publikováno v:
In Computer Networks July 2023 231
Publikováno v:
In Computer Networks June 2023 228
Publikováno v:
In Robotics and Autonomous Systems May 2023 163
Publikováno v:
In Knowledge-Based Systems 5 March 2023 263