Proceedings of the Tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems 2014
DOI: 10.1145/2658260.2658261
|View full text |Cite
|
Sign up to set email alerts
|

ElastiCon

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 164 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…On the other hand, increasing the time interval will cause the network to operate suboptimally for a longer duration. In the literature, the time slot is assumed to be either in seconds or minutes [37, 144].Furthermore, we observe that the network traffic profile has a long‐term and short‐term behavior. For instance, in a data center kind of environment, the aggregate traffic is high during the day but decreases at night [144].…”
Section: Discussion and Future Research Directionmentioning
confidence: 99%
See 3 more Smart Citations
“…On the other hand, increasing the time interval will cause the network to operate suboptimally for a longer duration. In the literature, the time slot is assumed to be either in seconds or minutes [37, 144].Furthermore, we observe that the network traffic profile has a long‐term and short‐term behavior. For instance, in a data center kind of environment, the aggregate traffic is high during the day but decreases at night [144].…”
Section: Discussion and Future Research Directionmentioning
confidence: 99%
“…On the other hand, increasing the time interval will cause the network to operate suboptimally for a longer duration. In the literature, the time slot is assumed to be either in seconds or minutes [37, 144].…”
Section: Discussion and Future Research Directionmentioning
confidence: 99%
See 2 more Smart Citations
“…As the NBIs in SDN are nonstandardized, they are very diverse and are more challenging to secure. One approach is to use APIs such as general APIs (Java, C, or Python etc) RESTful API RESTCONF, SDMN API, PANE API, NVP NBAPI, etc. Another approach is to use programming languages such as FML, Frenetic, Nettle, Procera, Pyretic, NetKAT, NetCore, and other query‐based languages which specify the security constraints to the app‐to‐control access.…”
Section: First Dimension: Essential Components Of the Sdn Controllermentioning
confidence: 99%