Luciano Paschoal Gaspary

According to our database1, Luciano Paschoal Gaspary authored at least 157 papers between 1997 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Managing Virtual Programmable Switches: Principles, Requirements, and Design Directions.
IEEE Commun. Mag., 2022

Janus: a framework to boost HPC applications in the cloud based on SDN path provisioning.
Clust. Comput., 2022

2021
Revisiting the coupon collector's problem to unveil users' online sessions in networked systems.
Peer-to-Peer Netw. Appl., 2021

A systematic review on distributed denial of service attack defense mechanisms in programmable networks.
Int. J. Netw. Manag., 2021

Watching Smartly from the Bottom: Intrusion Detection revamped through Programmable Networks and Artificial Intelligence.
CoRR, 2021

Managing Programmable Low-End Wireless Networks through Distributed SDN Controllers.
Proceedings of the 13th IFIP Wireless and Mobile Networking Conference, 2021

Programmable Low-End Networks: Powering Internet Connectivity for the Other Three Billion.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

ORACLE: An Architecture for Collaboration of Data and Control Planes to Detect DDoS Attacks.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

BUNGEE: An Adaptive Pushback Mechanism for DDoS Detection and Mitigation in P4 Data Planes.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Harnessing Cloud Computing to Power Up HPC Applications: The BRICS CloudHPC Project.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

Using Quadratic Discriminant Analysis by Intrusion Detection Systems for Port Scan and Slowloris Attack Classification.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

2020
Dissecting the Performance of VR Video Streaming through the VR-EXP Experimentation Platform.
ACM Trans. Multim. Comput. Commun. Appl., 2020

CAPEST: Offloading Network Capacity and Available Bandwidth Estimation to Programmable Data Planes.
IEEE Trans. Netw. Serv. Manag., 2020

Future of Network and Service Operations and Management: Trends, Developments, and Directions.
J. Netw. Syst. Manag., 2020

Reality shock in virtual network embedding: Flexibilizing demands for dealing with multiple operational requirements in SDNs.
J. Netw. Comput. Appl., 2020

Identifying elephant flows using dynamic thresholds in programmable IXP networks.
J. Internet Serv. Appl., 2020

ORACLE: Collaboration of Data and Control Planes to Detect DDoS Attacks.
CoRR, 2020

From 2D to Next Generation VR/AR Videos: Enabling Efficient Streaming via QoE-aware Mobile Networks.
Proceedings of the NOMS 2020, 2020

Performance and Cost-aware HPC in Clouds: A Network Interconnection Assessment.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Performance Impact of IEEE 802.3ad in Container-Based Clouds for HPC Applications.
Proceedings of the Computational Science and Its Applications - ICCSA 2020, 2020

IntSight: diagnosing SLO violations with in-band network telemetry.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
Message from the New Editor-in-Chief.
J. Netw. Syst. Manag., 2019

Adaptive placement & chaining of virtual network functions with NFV-PEAR.
J. Internet Serv. Appl., 2019

An optimization-based approach for efficient network monitoring using in-band network telemetry.
J. Internet Serv. Appl., 2019

Offloading Real-time DDoS Attack Detection to Programmable Data Planes.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Boosting HPC Applications in the Cloud Through JIT Traffic-Aware Path Provisioning.
Proceedings of the Computational Science and Its Applications - ICCSA 2019, 2019

Exploring Instance Heterogeneity in Public Cloud Providers for HPC Applications.
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019

2018
Enhancing Mobile Military Surveillance Based on Video Streaming by Employing Software Defined Networks.
Wirel. Commun. Mob. Comput., 2018

A branch-and-price algorithm for the single-path virtual network embedding problem.
Networks, 2018

MEICAN: Simplifying DCN Life-Cycle Management from End-User and Operator Perspectives in Inter-Domain Environments.
IEEE Commun. Mag., 2018

Identificação de Fluxos Elefantes em Redes de Ponto de Troca de Tráfego com Suporte à Programabilidade P4.
Proceedings of the XXXVI Brazilian Symposium on Computer Networks and Distributed Systems, 2018

Explorando Estratégias de Orquestração de Telemetria em Planos de Dados Programáveis.
Proceedings of the XXXVI Brazilian Symposium on Computer Networks and Distributed Systems, 2018

Scalable Cost-Efficient Placement and Chaining of Virtual Network Functions.
Proceedings of the Companion Proceedings of the 36th Brazilian Symposium on Computer Networks and Distributed Systems, 2018

Permitindo Maior Reprodutibilidade de Experimentos em Ambientes Distribuídos com Nodos de Baixa Confiabilidade.
Proceedings of the XXXVI Brazilian Symposium on Computer Networks and Distributed Systems, 2018

Predicting the performance of virtual reality video streaming in mobile networks.
Proceedings of the 9th ACM Multimedia Systems Conference, 2018

Scalable QoE-aware Path Selection in SDN-based Mobile Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Exploiting Load Imbalance Patterns for Heterogeneous Cloud Computing Platforms.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

2017
Data Plane Programmability Beyond OpenFlow: Opportunities and Challenges for Network and Service Operations and Management.
J. Netw. Syst. Manag., 2017

NDNrel: A mechanism based on relations among objects to improve the performance of NDN.
J. Netw. Comput. Appl., 2017

A fix-and-optimize approach for efficient and large scale virtual network function placement and chaining.
Comput. Commun., 2017

Combining Software-Defined and Delay-Tolerant Approaches in Last-Mile Tactical Edge Networking.
IEEE Commun. Mag., 2017

Advances in Networking Software.
IEEE Commun. Mag., 2017

Exploiting Price and Performance Tradeoffs in Heterogeneous Clouds.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

NFV-PEAR: Posicionamento e Encadeamento Adaptativo de Funções Virtuais de Rede.
Proceedings of the XXXV Brazilian Symposium on Computer Networks and Distributed Systems, 2017

NFV em Redes 5G: Avaliando o Desempenho de Composição de Funções Virtualizadas via Maestro.
Proceedings of the XXXV Brazilian Symposium on Computer Networks and Distributed Systems, 2017

Caracterizando Estratégias de Domínio Espacial para Gerenciamento de Regras em Redes Definidas por Software.
Proceedings of the XXXV Brazilian Symposium on Computer Networks and Distributed Systems, 2017

HPC Application Performance and Cost Efficiency in the Cloud.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Employing SDN to control video streaming applications in military mobile networks.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

A scalable approach for managing access control in Information Centric Networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Leveraging Cloud Heterogeneity for Cost-Efficient Execution of Parallel Applications.
Proceedings of the Euro-Par 2017: Parallel Processing - 23rd International Conference on Parallel and Distributed Computing, Santiago de Compostela, Spain, August 28, 2017

Optimal Service Function Chain Composition in Network Functions Virtualization.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
How physical network topologies affect virtual network embedding quality: A characterization study based on ISP and datacenter networks.
J. Netw. Comput. Appl., 2016

PredCloud: Providing predictable network performance in large-scale OpenFlow-enabled cloud platforms through trust-based allocation of resources.
Comput. Commun., 2016

A toolset for efficient privacy-oriented virtual network embedding and its instantiation on SDN/OpenFlow-based substrates.
Comput. Commun., 2016

Making puzzles green and useful for adaptive identity management in large-scale distributed systems.
Comput. Networks, 2016

ASTORIA: A framework for attack simulation and evaluation in smart grids.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Virtual network embedding in software-defined networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Network Fortune Cookie: Using Network Measurements to Predict Video Streaming Performance and QoE.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Performance Evaluation of Multiple Cloud Data Centers Allocations for HPC.
Proceedings of the High Performance Computing - Third Latin American Conference, 2016

2015
Virtual network security: threats, countermeasures, and challenges.
J. Internet Serv. Appl., 2015

Opportunistic resilience embedding (ORE): Toward cost-efficient resilient virtual networks.
Comput. Networks, 2015

Capitalizing on SDN-based SCADA systems: An anti-eavesdropping case-study.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Limiting fake accounts in large-scale distributed systems through adaptive identity management.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

CCNrel: Leveraging relations among objects to improve the performance of CCN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

IoNCloud: Exploring application affinity to improve utilization and predictability in datacenters.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Efficient Model Checking of IT Change Operations.
IEEE Trans. Netw. Serv. Manag., 2014

Reconnecting Partitions on Physical Infrastructures: Towards an Expansion Strategy for Efficient Virtual Network Embedding.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Were You There? Bridging the Gap to Unveil Users' Online Sessions in Networked, Distributed Systems.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Slowing down to speed up: Protecting users against massive attacks in content distribution systems.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A heuristic-based algorithm for privacy-oriented virtual network embedding.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Survivor: An enhanced controller placement strategy for improving SDN survivability.
Proceedings of the IEEE Global Communications Conference, 2014

HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Message from the CNSM general co-chairs.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
Managing the Next Wave of Information and Communications Technologies: A Report on NOMS 2012.
J. Netw. Syst. Manag., 2013

Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems.
Comput. Commun., 2013

DoS-resilient virtual networks through multipath embedding and opportunistic recovery.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Trust-based grouping for cloud datacenters: Improving security in shared infrastructures.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Workflow specification and scheduling with security constraints in hybrid clouds.
Proceedings of the 2nd IEEE Latin American Conference on Cloud Computing and Communications, 2013

Identifying the root cause of failures in IT changes: Novel strategies and trade-offs.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Make it green and useful: Reshaping puzzles for identity management in large-scale distributed systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

No more backups: Toward efficient embedding of survivable virtual networks.
Proceedings of IEEE International Conference on Communications, 2013

Characterizing the impact of network substrate topologies on virtual network embedding.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Denial-of-service attacks and countermeasures on BitTorrent.
Comput. Networks, 2012

Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks.
Comput. Networks, 2012

Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Planning in the large: Efficient generation of IT change plans on large infrastructures.
Proceedings of the 8th International Conference on Network and Service Management, 2012

Security-aware optimal resource allocation for virtual network embedding.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
Funnel: Choking Polluters in BitTorrent File Sharing Communities.
IEEE Trans. Netw. Serv. Manag., 2011

A conservative strategy to protect P2P file sharing systems from pollution attacks.
Concurr. Comput. Pract. Exp., 2011

A framework for risk assessment based on analysis of historical information of workflow execution in IT systems.
Comput. Networks, 2011

IT Project Variables in the Balance: A Bayesian Approach to Prediction of Support Costs.
Proceedings of the 25th Brazilian Symposium on Software Engineering, 2011

AltoStratus: A Collaboration Network Focused on the New Research Challenges and Opportunities in Cloud Computing.
Proceedings of the 25th Brazilian Symposium on Software Engineering, 2011

Challenging the feasibility of authentication mechanisms for P2P live streaming.
Proceedings of the 6th Latin America Networking Conference, 2011

A solution for identifying the root cause of problems in IT change management.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Observing the BitTorrent universe through Telescopes.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Leveraging IT project lifecycle data to predict support costs.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Securing P2P systems from Sybil attacks through adaptive identity management.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Integrated Management of Systems, Services, Processes and People in IT: A Report on DSOM 2009.
J. Netw. Syst. Manag., 2010


Choking polluters in BitTorrent file sharing communities.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

On strategies for planning the assignment of human resources to IT change activities.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Similarity metric for risk assessment in IT change plans.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
ChangeLedge: Change design and planning in networked systems based on reuse of knowledge and automation.
Comput. Networks, 2009

AGRADC: An architecture for autonomous deployment and configuration of grid computing applications.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Breaking the barriers between security mechanisms through the composition of Web Services: Towards a solution for the detection of multistage distributed attacks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009




How much management is management enough? Providing monitoring processes with online adaptation and learning capability.
Proceedings of the Integrated Network Management, 2009


ChangeAdvisor: A Solution to Support Alignment of IT Change Design with Business Objectives/Constraints.
Proceedings of the Integrated Management of Systems, 2009

2008
Distinguished experts panel.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Applying a model of configuration complexity to measure security impact on IT procedures.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Enabling rollback support in IT change management systems.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

A template-based solution to support knowledge reuse in IT change design.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

A Runtime Constraint-Aware Solution for Automated Refinement of IT Change Plans.
Proceedings of the Managing Large-Scale Service Deployment, 2008

2007
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing.
Comput. Networks, 2007

On the Performance of Web Services Management Standards - An Evaluation of MUWS and WS-Management for Network Management.
Proceedings of the Integrated Network Management, 2007

2006
Spotlights on Network Operations and Management Research in Latin America - A Report on LANOMS 2005.
J. Netw. Syst. Manag., 2006

Anahy: A Programming Environment for Cluster Computing.
Proceedings of the High Performance Computing for Computational Science, 2006

Flexible Security Configuration & Deployment in Peer-to-Peer Applications.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

A WSDM-Based Architecture for Global Usage Characterization of Grid Computing Infrastructures.
Proceedings of the Large Scale Management of Distributed Systems, 2006

Network-based intrusion detection systems evaluation through a short term experimental script.
Proceedings of the e-Business and Telecommunication Networks, 2006

2005
A SNMP-based platform for distributed stateful intrusion detection in enterprise networks.
IEEE J. Sel. Areas Commun., 2005

MUAT: An Environment for Accounting and Characterization of the Use of Computational Grids.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005

Evaluating the Impact on Data Reception and Energy Consumption of Mobile Devices using IPSec to securely access WiFi Networks.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005

On the Evaluation of a Secure Solution to Access 802.11 Networks.
Proceedings of the E-business and Telecommunication Networks, 2005

Policy-based access control in peer-to-peer grid systems.
Proceedings of the 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), 2005

2004
Towards a flexible security framework for peer-to-peer based grid computing.
Proceedings of the 2nd Workshop on Middleware for Grid Computing, 2004

Identification of Intrustion Scenarios through Classification, Characterization and Analysis of Firewall Events.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Performance Measurement of Transaction-Based Internet Applications through SNMP.
Proceedings of the ICETE 2004, 2004

Network-Based Intrusion Detection Systems Evaluation Through a Short Term Experimental Script.
Proceedings of the ICETE 2004, 2004

Assessing transaction-based Internet applications performance through a passive network traffic monitoring approach.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach.
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004

2003
On the Development of IETF-based Network Monitoring Probes for High Speed Networks.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

An SNMP Agent to Monitor Response Time of Transaction-based Internet Applications and Protocols.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

An SNMP Agent for Stateful Intrusion Inspection.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

2002
Gerenciamento distribuído e flexível de protocolos de alto nível, serviços e aplicações em redes de computadores.
PhD thesis, 2002

Trace: an open platform for high-layer protocols, services and networked applications management.
Proceedings of the Management Solutions for the New Communications World, 2002

DÓRIS - Pedagogical Agent in Intelligent Tutoring Systems.
Proceedings of the Intelligent Tutoring Systems, 6th International Conference, 2002

High-layer protocol and service management based on passive network traffic monitoring: the trace management platform.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

2001
An architecture for distributed and flexible management of high-layer protocols and network services.
J. Braz. Comput. Soc., 2001

Monitoring High-Layer Protocol Behavior Using the Trace Architecture.
Proceedings of the 2nd Latin American Network Operations and Management Symposium, 2001

Distributed Management of High-Layer Protocols and Network Services through a Programmable Agent-Based Architecture.
Proceedings of the Networking, 2001

1999
MUSE: An Environment for the Conception of Java Multimedia Applications.
Multim. Tools Appl., 1999

Design and Execution of Adaptive Multimedia Applications in the Internet.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

Characterization and Measurements of Enterprise Network Traffic with RMON 2.
Proceedings of the Active Technologies for Network and Service Management, 1999

Applying Object-Orientation Concepts in Networked Multimedia Applications Design.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

Adaptive Multimedia Applications and QoS in the MUSE Specification Environment.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

1998
Specification of Distributed Multimedia Applications in the MUSE Environment: QoS and Adaptation Issues.
Proceedings of WebNet 98, 1998

Modeling and Validation Support for Interactive Networked Multimedia Applications.
Proceedings of the Parallel and Distributed Processing, 10 IPPS/SPDP'98 Workshops Held in Conjunction with the 12th International Parallel Processing Symposium and 9th Symposium on Parallel and Distributed Processing, Orlando, Florida, USA, March 30, 1998

Authoring and E-LOTOS conception of interactive networked multimedia applications in MUSE environment.
Proceedings of the Performance of Information and Communication Systems, 1998


MUSE - An Interactive Networked Multimedia Applications Specification Environment with E-LOTOS Translator.
Proceedings of the Advanced Information Systems Engineering, 1998

1997
OST - An Object-Oriented Computer Networks System Specification Tool.
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997


  Loading...