NFV resource allocation: A systematic review and taxonomy of VNF forwarding graph embedding
Abstract The emergence of Network Functions Virtualisation (NFV) is drastically reshaping
the arrangement of network functions. Instead of being built on dedicated hardware (network …
the arrangement of network functions. Instead of being built on dedicated hardware (network …
Service function chain placement in distributed scenarios: a systematic review
The network function virtualization (NFV) paradigm is an emerging technology that provides
network flexibility by allowing the allocation of network functions over commodity hardware …
network flexibility by allowing the allocation of network functions over commodity hardware …
Compute-and data-intensive networks: The key to the metaverse
The worlds of computing, communication, and storage have for a long time been treated
separately, and even the recent trends of cloud computing, distributed computing, and …
separately, and even the recent trends of cloud computing, distributed computing, and …
Efficient computing resource sharing for mobile edge-cloud computing networks
Both the edge and the cloud can provide computing services for mobile devices to enhance
their performance. The edge can reduce the conveying delay by providing local computing …
their performance. The edge can reduce the conveying delay by providing local computing …
Wireless networked multirobot systems in smart factories
Smart manufacturing based on artificial intelligence and information communication
technology will become the main contributor to the digital economy of the upcoming …
technology will become the main contributor to the digital economy of the upcoming …
A secure end-to-end verifiable e-voting system using blockchain and cloud server
S Panja, B Roy - Journal of Information Security and Applications, 2021 - Elsevier
We propose a cryptographic technique for an authenticated, end-to-end verifiable and secret
ballot election. Currently, almost all verifiable e-voting systems require trusted authorities to …
ballot election. Currently, almost all verifiable e-voting systems require trusted authorities to …
Shortest path and maximum flow problems under service function chaining constraints
With the advent of Network Function Virtualization (NFV), Physical Network Functions
(PNFs) are gradually being replaced by Virtual Network Functions (VNFs) that are hosted on …
(PNFs) are gradually being replaced by Virtual Network Functions (VNFs) that are hosted on …
Joint compute-caching-communication control for online data-intensive service delivery
Data-intensive augmented information (AgI) services (eg, metaverse applications such as
virtual/augmented reality), designed to deliver highly interactive experiences resulting from …
virtual/augmented reality), designed to deliver highly interactive experiences resulting from …
Fairness-aware dynamic rate control and flow scheduling for network utility maximization in network service chain
Network function virtualization (NFV) decouples the traditional network functions from
specific or proprietary hardware, such that virtualized network functions (VNFs) can run in …
specific or proprietary hardware, such that virtualized network functions (VNFs) can run in …
Joint placement and allocation of virtual network functions with budget and capacity constraints
With the advent of Network Function Virtualization (NFV), network services that traditionally
run on proprietary dedicated hardware can now be realized using Virtual Network Functions …
run on proprietary dedicated hardware can now be realized using Virtual Network Functions …