\n \n \n
\n
\n\n \n \n \n \n \n \n The effect of (non-)competing brokers on the quality and price of differentiated internet services.\n \n \n \n \n\n\n \n Ghasemi, M.; Matta, I.; and Esposito, F.\n\n\n \n\n\n\n
Comput. Networks, 160: 144–164. 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/cn/GhasemiME19,\n author = {Maryam Ghasemi and\n Ibrahim Matta and\n Flavio Esposito},\n title = {The effect of (non-)competing brokers on the quality and price of\n differentiated internet services},\n journal = {Comput. Networks},\n volume = {160},\n pages = {144--164},\n year = {2019},\n url = {https://doi.org/10.1016/j.comnet.2019.06.012},\n doi = {10.1016/J.COMNET.2019.06.012},\n timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/cn/GhasemiME19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives.\n \n \n \n \n\n\n \n Wang, J.; Pan, J.; Esposito, F.; Calyam, P.; Yang, Z.; and Mohapatra, P.\n\n\n \n\n\n\n
ACM Comput. Surv., 52(1): 2:1–2:23. 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/csur/WangPECYM19,\n author = {Jianyu Wang and\n Jianli Pan and\n Flavio Esposito and\n Prasad Calyam and\n Zhicheng Yang and\n Prasant Mohapatra},\n title = {Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives},\n journal = {{ACM} Comput. Surv.},\n volume = {52},\n number = {1},\n pages = {2:1--2:23},\n year = {2019},\n url = {https://doi.org/10.1145/3284387},\n doi = {10.1145/3284387},\n timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/csur/WangPECYM19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n AGRA: AI-augmented geographic routing approach for IoT-based incident-supporting applications.\n \n \n \n \n\n\n \n Chemodanov, D.; Esposito, F.; Sukhov, A. M.; Calyam, P.; Trinh, H.; and Oraibi, Z. A.\n\n\n \n\n\n\n
Future Gener. Comput. Syst., 92: 1051–1065. 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/ChemodanovESCTO19,\n author = {Dmitrii Chemodanov and\n Flavio Esposito and\n Andrei M. Sukhov and\n Prasad Calyam and\n Huy Trinh and\n Zakariya A. Oraibi},\n title = {{AGRA:} AI-augmented geographic routing approach for IoT-based incident-supporting\n applications},\n journal = {Future Gener. Comput. Syst.},\n volume = {92},\n pages = {1051--1065},\n year = {2019},\n url = {https://doi.org/10.1016/j.future.2017.08.009},\n doi = {10.1016/J.FUTURE.2017.08.009},\n timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/fgcs/ChemodanovESCTO19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n IoT Security via Address Shuffling: The Easy Way.\n \n \n \n \n\n\n \n Nizzi, F.; Pecorella, T.; Esposito, F.; Pierucci, L.; and Fantacci, R.\n\n\n \n\n\n\n
IEEE Internet Things J., 6(2): 3764–3774. 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/iotj/NizziPEPF19,\n author = {Francesca Nizzi and\n Tommaso Pecorella and\n Flavio Esposito and\n Laura Pierucci and\n Romano Fantacci},\n title = {IoT Security via Address Shuffling: The Easy Way},\n journal = {{IEEE} Internet Things J.},\n volume = {6},\n number = {2},\n pages = {3764--3774},\n year = {2019},\n url = {https://doi.org/10.1109/JIOT.2019.2892003},\n doi = {10.1109/JIOT.2019.2892003},\n timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/iotj/NizziPEPF19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Teaching software-defined network security through malicious tenant detection.\n \n \n \n \n\n\n \n Abazari, F.; Esposito, F.; Takabi, H.; Hosseinvand, H.; and Pecorella, T.\n\n\n \n\n\n\n
Internet Technol. Lett., 2(6). 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/itl/AbazariETHP19,\n author = {Farzaneh Abazari and\n Flavio Esposito and\n Hassan Takabi and\n Hamid Hosseinvand and\n Tommaso Pecorella},\n title = {Teaching software-defined network security through malicious tenant\n detection},\n journal = {Internet Technol. Lett.},\n volume = {2},\n number = {6},\n year = {2019},\n url = {https://doi.org/10.1002/itl2.131},\n doi = {10.1002/ITL2.131},\n timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/itl/AbazariETHP19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n UAV-Based High Resolution Thermal Imaging for Vegetation Monitoring, and Plant Phenotyping Using ICI 8640 P, FLIR Vue Pro R 640, and thermoMap Cameras.\n \n \n \n \n\n\n \n Sagan, V.; Maimaitijiang, M.; Sidike, P.; Eblimit, K.; Peterson, K. T.; Hartling, S.; Esposito, F.; Khanal, K.; Newcomb, M.; Pauli, D.; Ward, R.; Fritschi, F. B.; Shakoor, N.; and Mockler, T. C.\n\n\n \n\n\n\n
Remote. Sens., 11(3): 330. 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/remotesensing/SaganMSEPHEKNPW19,\n author = {Vasit Sagan and\n Maitiniyazi Maimaitijiang and\n Paheding Sidike and\n Kevin Eblimit and\n Kyle T. Peterson and\n Sean Hartling and\n Flavio Esposito and\n Kapil Khanal and\n Maria Newcomb and\n Duke Pauli and\n Rick Ward and\n Felix B. Fritschi and\n Nadia Shakoor and\n Todd C. Mockler},\n title = {UAV-Based High Resolution Thermal Imaging for Vegetation Monitoring,\n and Plant Phenotyping Using {ICI} 8640 P, {FLIR} Vue Pro {R} 640,\n and thermoMap Cameras},\n journal = {Remote. Sens.},\n volume = {11},\n number = {3},\n pages = {330},\n year = {2019},\n url = {https://doi.org/10.3390/rs11030330},\n doi = {10.3390/RS11030330},\n timestamp = {Tue, 18 Jun 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/remotesensing/SaganMSEPHEKNPW19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Constrained Shortest Path Scheme for Virtual Network Service Management.\n \n \n \n \n\n\n \n Chemodanov, D.; Esposito, F.; Calyam, P.; and Sukhov, A. M.\n\n\n \n\n\n\n
IEEE Trans. Netw. Serv. Manag., 16(1): 127–142. 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/tnsm/ChemodanovECS19,\n author = {Dmitrii Chemodanov and\n Flavio Esposito and\n Prasad Calyam and\n Andrei M. Sukhov},\n title = {A Constrained Shortest Path Scheme for Virtual Network Service Management},\n journal = {{IEEE} Trans. Netw. Serv. Manag.},\n volume = {16},\n number = {1},\n pages = {127--142},\n year = {2019},\n url = {https://doi.org/10.1109/TNSM.2018.2865204},\n doi = {10.1109/TNSM.2018.2865204},\n timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/tnsm/ChemodanovECS19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications.\n \n \n \n \n\n\n \n Mucchi, L.; Nizzi, F.; Pecorella, T.; Fantacci, R.; and Esposito, F.\n\n\n \n\n\n\n In
7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, Sochi, Russia, June 3-6, 2019, pages 1–3, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/blackseecom/MucchiNPFE19,\n author = {Lorenzo Mucchi and\n Francesca Nizzi and\n Tommaso Pecorella and\n Romano Fantacci and\n Flavio Esposito},\n title = {Benefits of Physical Layer Security to Cryptography: Tradeoff and\n Applications},\n booktitle = {7th {IEEE} International Black Sea Conference on Communications and\n Networking BlackSeaCom 2019, Sochi, Russia, June 3-6, 2019},\n pages = {1--3},\n year = {2019},\n crossref = {DBLP:conf/blackseecom/2019},\n url = {https://doi.org/10.1109/BlackSeaCom.2019.8812778},\n doi = {10.1109/BLACKSEACOM.2019.8812778},\n timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},\n biburl = {https://dblp.org/rec/conf/blackseecom/MucchiNPFE19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n The Password Literacy in North Macedonia: A Case Study.\n \n \n \n \n\n\n \n Cvetkovski, A.; and Esposito, F.\n\n\n \n\n\n\n In
Proceedings of the Third Central European Cybersecurity Conference, CECC 2019, Munich, Germany, November 14-15, 2019, pages 14:1–14:6, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cecc/CvetkovskiE19,\n author = {Andrej Cvetkovski and\n Flavio Esposito},\n title = {The Password Literacy in North Macedonia: {A} Case Study},\n booktitle = {Proceedings of the Third Central European Cybersecurity Conference,\n {CECC} 2019, Munich, Germany, November 14-15, 2019},\n pages = {14:1--14:6},\n year = {2019},\n crossref = {DBLP:conf/cecc/2019},\n url = {https://doi.org/10.1145/3360664.3360678},\n doi = {10.1145/3360664.3360678},\n timestamp = {Mon, 28 Oct 2019 08:10:46 +0100},\n biburl = {https://dblp.org/rec/conf/cecc/CvetkovskiE19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n APRON: an Architecture for Adaptive Task Planning of Internet of Things in Challenged Edge Networks.\n \n \n \n \n\n\n \n Ventrella, A. V.; Esposito, F.; Sacco, A.; Flocco, M.; Marchetto, G.; and Gururajan, S.\n\n\n \n\n\n\n In
2019 IEEE 8th International Conference on Cloud Networking, CloudNet 2019, Coimbra, Portugal, November 4-6, 2019, pages 1–6, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cloudnet/VentrellaESFMG19,\n author = {Agnese V. Ventrella and\n Flavio Esposito and\n Alessio Sacco and\n Matteo Flocco and\n Guido Marchetto and\n Srikanth Gururajan},\n title = {{APRON:} an Architecture for Adaptive Task Planning of Internet of\n Things in Challenged Edge Networks},\n booktitle = {2019 {IEEE} 8th International Conference on Cloud Networking, CloudNet\n 2019, Coimbra, Portugal, November 4-6, 2019},\n pages = {1--6},\n year = {2019},\n crossref = {DBLP:conf/cloudnet/2019},\n url = {https://doi.org/10.1109/CloudNet47604.2019.9064091},\n doi = {10.1109/CLOUDNET47604.2019.9064091},\n timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/cloudnet/VentrellaESFMG19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Steering Traffic via Recurrent Neural Networks in Challenged Edge Scenarios.\n \n \n \n \n\n\n \n Gaballo, A.; Flocco, M.; Esposito, F.; and Marchetto, G.\n\n\n \n\n\n\n In
15th International Conference on Network and Service Management, CNSM 2019, Halifax, NS, Canada, October 21-25, 2019, pages 1–5, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cnsm/GaballoFEM19,\n author = {Alessandro Gaballo and\n Matteo Flocco and\n Flavio Esposito and\n Guido Marchetto},\n title = {Steering Traffic via Recurrent Neural Networks in Challenged Edge\n Scenarios},\n booktitle = {15th International Conference on Network and Service Management, {CNSM}\n 2019, Halifax, NS, Canada, October 21-25, 2019},\n pages = {1--5},\n year = {2019},\n crossref = {DBLP:conf/cnsm/2019},\n url = {https://doi.org/10.23919/CNSM46954.2019.9012661},\n doi = {10.23919/CNSM46954.2019.9012661},\n timestamp = {Fri, 08 Dec 2023 07:53:07 +0100},\n biburl = {https://dblp.org/rec/conf/cnsm/GaballoFEM19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Towards security-as-a-service in multi-access edge.\n \n \n \n \n\n\n \n Tourani, R.; Bos, A.; Misra, S.; and Esposito, F.\n\n\n \n\n\n\n In
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019, Arlington, Virginia, USA, November 7-9, 2019, pages 358–363, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/edge/TouraniBME19,\n author = {Reza Tourani and\n Austin Bos and\n Satyajayant Misra and\n Flavio Esposito},\n title = {Towards security-as-a-service in multi-access edge},\n booktitle = {Proceedings of the 4th {ACM/IEEE} Symposium on Edge Computing, {SEC}\n 2019, Arlington, Virginia, USA, November 7-9, 2019},\n pages = {358--363},\n year = {2019},\n crossref = {DBLP:conf/edge/2019sec},\n url = {https://doi.org/10.1145/3318216.3363335},\n doi = {10.1145/3318216.3363335},\n timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/edge/TouraniBME19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n EVA: an evolutionary architecture for network virtualization.\n \n \n \n \n\n\n \n Holdener, E. A.; Esposito, F.; and Chemodanov, D.\n\n\n \n\n\n\n In
Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2019, Prague, Czech Republic, July 13-17, 2019, pages 1192–1197, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gecco/HoldenerEC19,\n author = {Ekaterina A. Holdener and\n Flavio Esposito and\n Dmitrii Chemodanov},\n title = {{EVA:} an evolutionary architecture for network virtualization},\n booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference,\n {GECCO} 2019, Prague, Czech Republic, July 13-17, 2019},\n pages = {1192--1197},\n year = {2019},\n crossref = {DBLP:conf/gecco/2019},\n url = {https://doi.org/10.1145/3321707.3321744},\n doi = {10.1145/3321707.3321744},\n timestamp = {Thu, 04 Jul 2019 11:07:32 +0200},\n biburl = {https://dblp.org/rec/conf/gecco/HoldenerEC19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n LiveMicro: An Edge Computing System for Collaborative Telepathology.\n \n \n \n \n\n\n \n Sacco, A.; Esposito, F.; Okorie, P.; and Marchetto, G.\n\n\n \n\n\n\n In
2nd USENIX Workshop on Hot Topics in Edge Computing, HotEdge 2019, Renton, WA, USA, July 9, 2019, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hotedge/SaccoEOM19,\n author = {Alessio Sacco and\n Flavio Esposito and\n Princewill Okorie and\n Guido Marchetto},\n title = {LiveMicro: An Edge Computing System for Collaborative Telepathology},\n booktitle = {2nd {USENIX} Workshop on Hot Topics in Edge Computing, HotEdge 2019,\n Renton, WA, USA, July 9, 2019},\n year = {2019},\n crossref = {DBLP:conf/hotedge/2019},\n url = {https://www.usenix.org/conference/hotedge19/presentation/sacco},\n timestamp = {Fri, 04 Jun 2021 11:57:43 +0200},\n biburl = {https://dblp.org/rec/conf/hotedge/SaccoEOM19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n ADELE: An Architecture for Steering Traffic and Computations via Deep Learning in Challenged Edge Networks.\n \n \n \n \n\n\n \n Gaballo, A.; Flocco, M.; Esposito, F.; and Marchetto, G.\n\n\n \n\n\n\n In
2019 4th International Conference on Computing, Communications and Security (ICCCS), Rome, Italy, October 10-12, 2019, pages 1–8, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icccs/GaballoFEM19,\n author = {Alessandro Gaballo and\n Matteo Flocco and\n Flavio Esposito and\n Guido Marchetto},\n title = {{ADELE:} An Architecture for Steering Traffic and Computations via\n Deep Learning in Challenged Edge Networks},\n booktitle = {2019 4th International Conference on Computing, Communications and\n Security (ICCCS), Rome, Italy, October 10-12, 2019},\n pages = {1--8},\n year = {2019},\n crossref = {DBLP:conf/icccs/2019},\n url = {https://doi.org/10.1109/CCCS.2019.8888120},\n doi = {10.1109/CCCS.2019.8888120},\n timestamp = {Tue, 12 Nov 2019 16:15:20 +0100},\n biburl = {https://dblp.org/rec/conf/icccs/GaballoFEM19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Near Optimal Reliable Composition Approach for Geo-Distributed Latency-Sensitive Service Chains.\n \n \n \n \n\n\n \n Chemodanov, D.; Calyam, P.; and Esposito, F.\n\n\n \n\n\n\n In
2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019, pages 1792–1800, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/ChemodanovCE19,\n author = {Dmitrii Chemodanov and\n Prasad Calyam and\n Flavio Esposito},\n title = {A Near Optimal Reliable Composition Approach for Geo-Distributed Latency-Sensitive\n Service Chains},\n booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,\n Paris, France, April 29 - May 2, 2019},\n pages = {1792--1800},\n year = {2019},\n crossref = {DBLP:conf/infocom/2019},\n url = {https://doi.org/10.1109/INFOCOM.2019.8737498},\n doi = {10.1109/INFOCOM.2019.8737498},\n timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},\n biburl = {https://dblp.org/rec/conf/infocom/ChemodanovCE19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Distributed Orchestration Algorithm for Edge Computing Resources with Guarantees.\n \n \n \n \n\n\n \n Castellano, G.; Esposito, F.; and Risso, F.\n\n\n \n\n\n\n In
2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019, pages 2548–2556, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/CastellanoER19,\n author = {Gabriele Castellano and\n Flavio Esposito and\n Fulvio Risso},\n title = {A Distributed Orchestration Algorithm for Edge Computing Resources\n with Guarantees},\n booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,\n Paris, France, April 29 - May 2, 2019},\n pages = {2548--2556},\n year = {2019},\n crossref = {DBLP:conf/infocom/2019},\n url = {https://doi.org/10.1109/INFOCOM.2019.8737532},\n doi = {10.1109/INFOCOM.2019.8737532},\n timestamp = {Mon, 24 Jun 2019 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/infocom/CastellanoER19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Propelling Haptic Devices into the Mobile World to Advance K-12 STEM Learning.\n \n \n \n \n\n\n \n Sangiorgi, A.; Esposito, F.; Gorlewicz, J. L.; and Schembra, G.\n\n\n \n\n\n\n In
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Mobihoc 2019, Catania, Italy, July 2-5, 2019, pages 403–404, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mobihoc/SangiorgiEGS19,\n author = {Alessandro Sangiorgi and\n Flavio Esposito and\n Jenna L. Gorlewicz and\n Giovanni Schembra},\n title = {Propelling Haptic Devices into the Mobile World to Advance {K-12}\n {STEM} Learning},\n booktitle = {Proceedings of the Twentieth {ACM} International Symposium on Mobile\n Ad Hoc Networking and Computing, Mobihoc 2019, Catania, Italy, July\n 2-5, 2019},\n pages = {403--404},\n year = {2019},\n crossref = {DBLP:conf/mobihoc/2019},\n url = {https://doi.org/10.1145/3323679.3326620},\n doi = {10.1145/3323679.3326620},\n timestamp = {Wed, 05 Jun 2019 08:39:17 +0200},\n biburl = {https://dblp.org/rec/conf/mobihoc/SangiorgiEGS19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Policy-Based Architecture for Container Migration in Software Defined Infrastructures.\n \n \n \n \n\n\n \n Tao, X.; Esposito, F.; Sacco, A.; and Marchetto, G.\n\n\n \n\n\n\n In
5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019, pages 198–202, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/netsoft/TaoESM19,\n author = {Xu Tao and\n Flavio Esposito and\n Alessio Sacco and\n Guido Marchetto},\n title = {A Policy-Based Architecture for Container Migration in Software Defined\n Infrastructures},\n booktitle = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris,\n France, June 24-28, 2019},\n pages = {198--202},\n year = {2019},\n crossref = {DBLP:conf/netsoft/2019},\n url = {https://doi.org/10.1109/NETSOFT.2019.8806659},\n doi = {10.1109/NETSOFT.2019.8806659},\n timestamp = {Fri, 04 Jul 2025 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/netsoft/TaoESM19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Battle of Microservices: Towards Latency-Optimal Heuristic Scheduling for Edge Computing.\n \n \n \n \n\n\n \n Samanta, A.; Li, Y.; and Esposito, F.\n\n\n \n\n\n\n In
5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019, pages 223–227, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/netsoft/Samanta0E19,\n author = {Amit Samanta and\n Yong Li and\n Flavio Esposito},\n title = {Battle of Microservices: Towards Latency-Optimal Heuristic Scheduling\n for Edge Computing},\n booktitle = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris,\n France, June 24-28, 2019},\n pages = {223--227},\n year = {2019},\n crossref = {DBLP:conf/netsoft/2019},\n url = {https://doi.org/10.1109/NETSOFT.2019.8806674},\n doi = {10.1109/NETSOFT.2019.8806674},\n timestamp = {Tue, 18 Apr 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/netsoft/Samanta0E19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Scalable Provisioning of Virtual Network Functions via Supervised Learning.\n \n \n \n \n\n\n \n Scalingi, A.; Esposito, F.; Muhammad, W.; and Pescapè, A.\n\n\n \n\n\n\n In
5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019, pages 423–431, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/netsoft/ScalingiEMP19,\n author = {Alessio Scalingi and\n Flavio Esposito and\n Waqar Muhammad and\n Antonio Pescap{\\`{e}}},\n title = {Scalable Provisioning of Virtual Network Functions via Supervised\n Learning},\n booktitle = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris,\n France, June 24-28, 2019},\n pages = {423--431},\n year = {2019},\n crossref = {DBLP:conf/netsoft/2019},\n url = {https://doi.org/10.1109/NETSOFT.2019.8806638},\n doi = {10.1109/NETSOFT.2019.8806638},\n timestamp = {Wed, 28 Aug 2019 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/netsoft/ScalingiEMP19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Flock: A Live Migration Protocol for SDN Controllers.\n \n \n \n \n\n\n \n Contoli, C.; Palumbo, F.; Esposito, F.; Callegati, F.; and Pescapè, A.\n\n\n \n\n\n\n In
IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2019, Dallas, TX, USA, November 12-14, 2019, pages 1–5, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/nfvsdn/ContoliPECP19,\n author = {Chiara Contoli and\n Fabio Palumbo and\n Flavio Esposito and\n Franco Callegati and\n Antonio Pescap{\\`{e}}},\n title = {Flock: {A} Live Migration Protocol for {SDN} Controllers},\n booktitle = {{IEEE} Conference on Network Function Virtualization and Software\n Defined Networks, {NFV-SDN} 2019, Dallas, TX, USA, November 12-14,\n 2019},\n pages = {1--5},\n year = {2019},\n crossref = {DBLP:conf/nfvsdn/2019},\n url = {https://doi.org/10.1109/NFV-SDN47374.2019.9040146},\n doi = {10.1109/NFV-SDN47374.2019.9040146},\n timestamp = {Mon, 01 May 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/nfvsdn/ContoliPECP19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Network Management Protocol for Sonification of Software-Defined Infrastructures.\n \n \n \n \n\n\n \n Davoli, G.; Esposito, F.; and Cerroni, W.\n\n\n \n\n\n\n In
IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2019, Dallas, TX, USA, November 12-14, 2019, pages 1–7, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/nfvsdn/DavoliEC19,\n author = {Gianluca Davoli and\n Flavio Esposito and\n Walter Cerroni},\n title = {A Network Management Protocol for Sonification of Software-Defined\n Infrastructures},\n booktitle = {{IEEE} Conference on Network Function Virtualization and Software\n Defined Networks, {NFV-SDN} 2019, Dallas, TX, USA, November 12-14,\n 2019},\n pages = {1--7},\n year = {2019},\n crossref = {DBLP:conf/nfvsdn/2019},\n url = {https://doi.org/10.1109/NFV-SDN47374.2019.9039998},\n doi = {10.1109/NFV-SDN47374.2019.9039998},\n timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/nfvsdn/DavoliEC19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n 5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019.\n \n \n \n \n\n\n \n Jacquenet, C.; Turck, F. D.; Chemouil, P.; Esposito, F.; Festor, O.; Cerroni, W.; and Secci, S.,\n editors.\n \n\n\n \n\n\n\n IEEE. 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/netsoft/2019,\n editor = {Christian Jacquenet and\n Filip De Turck and\n Prosper Chemouil and\n Flavio Esposito and\n Olivier Festor and\n Walter Cerroni and\n Stefano Secci},\n title = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris,\n France, June 24-28, 2019},\n publisher = {{IEEE}},\n year = {2019},\n url = {https://ieeexplore.ieee.org/xpl/conhome/8792325/proceeding},\n isbn = {978-1-5386-9376-6},\n timestamp = {Thu, 18 Dec 2025 16:44:30 +0100},\n biburl = {https://dblp.org/rec/conf/netsoft/2019.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n