Luciano Paschoal Gaspary

According to our database1, Luciano Paschoal Gaspary authored at least 130 papers between 1997 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Dissecting the Performance of VR Video Streaming through the VR-EXP Experimentation Platform.
TOMM, 2020

2019
Message from the New Editor-in-Chief.
J. Network Syst. Manage., 2019

Adaptive placement & chaining of virtual network functions with NFV-PEAR.
J. Internet Services and Applications, 2019

An optimization-based approach for efficient network monitoring using in-band network telemetry.
J. Internet Services and Applications, 2019

Offloading Real-time DDoS Attack Detection to Programmable Data Planes.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Boosting HPC Applications in the Cloud Through JIT Traffic-Aware Path Provisioning.
Proceedings of the Computational Science and Its Applications - ICCSA 2019, 2019

Exploring Instance Heterogeneity in Public Cloud Providers for HPC Applications.
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019

2018
Enhancing Mobile Military Surveillance Based on Video Streaming by Employing Software Defined Networks.
Wireless Communications and Mobile Computing, 2018

A branch-and-price algorithm for the single-path virtual network embedding problem.
Networks, 2018

MEICAN: Simplifying DCN Life-Cycle Management from End-User and Operator Perspectives in Inter-Domain Environments.
IEEE Communications Magazine, 2018

Predicting the performance of virtual reality video streaming in mobile networks.
Proceedings of the 9th ACM Multimedia Systems Conference, 2018

Scalable QoE-aware Path Selection in SDN-based Mobile Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Exploiting Load Imbalance Patterns for Heterogeneous Cloud Computing Platforms.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

2017
Data Plane Programmability Beyond OpenFlow: Opportunities and Challenges for Network and Service Operations and Management.
J. Network Syst. Manage., 2017

NDNrel: A mechanism based on relations among objects to improve the performance of NDN.
J. Netw. Comput. Appl., 2017

A fix-and-optimize approach for efficient and large scale virtual network function placement and chaining.
Comput. Commun., 2017

Combining Software-Defined and Delay-Tolerant Approaches in Last-Mile Tactical Edge Networking.
IEEE Communications Magazine, 2017

Advances in Networking Software.
IEEE Communications Magazine, 2017

Exploiting Price and Performance Tradeoffs in Heterogeneous Clouds.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

HPC Application Performance and Cost Efficiency in the Cloud.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Employing SDN to control video streaming applications in military mobile networks.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

A scalable approach for managing access control in Information Centric Networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Leveraging Cloud Heterogeneity for Cost-Efficient Execution of Parallel Applications.
Proceedings of the Euro-Par 2017: Parallel Processing - 23rd International Conference on Parallel and Distributed Computing, Santiago de Compostela, Spain, August 28, 2017

Optimal Service Function Chain Composition in Network Functions Virtualization.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
How physical network topologies affect virtual network embedding quality: A characterization study based on ISP and datacenter networks.
J. Netw. Comput. Appl., 2016

PredCloud: Providing predictable network performance in large-scale OpenFlow-enabled cloud platforms through trust-based allocation of resources.
Comput. Commun., 2016

A toolset for efficient privacy-oriented virtual network embedding and its instantiation on SDN/OpenFlow-based substrates.
Comput. Commun., 2016

Making puzzles green and useful for adaptive identity management in large-scale distributed systems.
Comput. Networks, 2016

ASTORIA: A framework for attack simulation and evaluation in smart grids.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Virtual network embedding in software-defined networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Network Fortune Cookie: Using Network Measurements to Predict Video Streaming Performance and QoE.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Performance Evaluation of Multiple Cloud Data Centers Allocations for HPC.
Proceedings of the High Performance Computing - Third Latin American Conference, 2016

2015
Virtual network security: threats, countermeasures, and challenges.
J. Internet Services and Applications, 2015

Opportunistic resilience embedding (ORE): Toward cost-efficient resilient virtual networks.
Comput. Networks, 2015

Capitalizing on SDN-based SCADA systems: An anti-eavesdropping case-study.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Limiting fake accounts in large-scale distributed systems through adaptive identity management.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

CCNrel: Leveraging relations among objects to improve the performance of CCN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

IoNCloud: Exploring application affinity to improve utilization and predictability in datacenters.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Efficient Model Checking of IT Change Operations.
IEEE Trans. Network and Service Management, 2014

Reconnecting Partitions on Physical Infrastructures: Towards an Expansion Strategy for Efficient Virtual Network Embedding.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Were You There? Bridging the Gap to Unveil Users' Online Sessions in Networked, Distributed Systems.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Slowing down to speed up: Protecting users against massive attacks in content distribution systems.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A heuristic-based algorithm for privacy-oriented virtual network embedding.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Survivor: An enhanced controller placement strategy for improving SDN survivability.
Proceedings of the IEEE Global Communications Conference, 2014

HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Message from the CNSM general co-chairs.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
Managing the Next Wave of Information and Communications Technologies: A Report on NOMS 2012.
J. Network Syst. Manage., 2013

Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems.
Comput. Commun., 2013

DoS-resilient virtual networks through multipath embedding and opportunistic recovery.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Trust-based grouping for cloud datacenters: Improving security in shared infrastructures.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Workflow specification and scheduling with security constraints in hybrid clouds.
Proceedings of the 2nd IEEE Latin American Conference on Cloud Computing and Communications, 2013

Identifying the root cause of failures in IT changes: Novel strategies and trade-offs.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Make it green and useful: Reshaping puzzles for identity management in large-scale distributed systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

No more backups: Toward efficient embedding of survivable virtual networks.
Proceedings of IEEE International Conference on Communications, 2013

Characterizing the impact of network substrate topologies on virtual network embedding.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Denial-of-service attacks and countermeasures on BitTorrent.
Comput. Networks, 2012

Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks.
Comput. Networks, 2012

Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Planning in the large: Efficient generation of IT change plans on large infrastructures.
Proceedings of the 8th International Conference on Network and Service Management, 2012

Security-aware optimal resource allocation for virtual network embedding.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
Funnel: Choking Polluters in BitTorrent File Sharing Communities.
IEEE Trans. Network and Service Management, 2011

A conservative strategy to protect P2P file sharing systems from pollution attacks.
Concurrency and Computation: Practice and Experience, 2011

A framework for risk assessment based on analysis of historical information of workflow execution in IT systems.
Comput. Networks, 2011

IT Project Variables in the Balance: A Bayesian Approach to Prediction of Support Costs.
Proceedings of the 25th Brazilian Symposium on Software Engineering, 2011

AltoStratus: A Collaboration Network Focused on the New Research Challenges and Opportunities in Cloud Computing.
Proceedings of the 25th Brazilian Symposium on Software Engineering, 2011

Challenging the feasibility of authentication mechanisms for P2P live streaming.
Proceedings of the 6th Latin America Networking Conference, 2011

A solution for identifying the root cause of problems in IT change management.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Observing the BitTorrent universe through Telescopes.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Leveraging IT project lifecycle data to predict support costs.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Securing P2P systems from Sybil attacks through adaptive identity management.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Integrated Management of Systems, Services, Processes and People in IT: A Report on DSOM 2009.
J. Network Syst. Manage., 2010


Choking polluters in BitTorrent file sharing communities.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

On strategies for planning the assignment of human resources to IT change activities.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Similarity metric for risk assessment in IT change plans.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
ChangeLedge: Change design and planning in networked systems based on reuse of knowledge and automation.
Comput. Networks, 2009

AGRADC: An architecture for autonomous deployment and configuration of grid computing applications.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Breaking the barriers between security mechanisms through the composition of Web Services: Towards a solution for the detection of multistage distributed attacks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009




How much management is management enough? Providing monitoring processes with online adaptation and learning capability.
Proceedings of the Integrated Network Management, 2009


ChangeAdvisor: A Solution to Support Alignment of IT Change Design with Business Objectives/Constraints.
Proceedings of the Integrated Management of Systems, 2009

2008
Distinguished experts panel.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Applying a model of configuration complexity to measure security impact on IT procedures.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Enabling rollback support in IT change management systems.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

A template-based solution to support knowledge reuse in IT change design.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

A Runtime Constraint-Aware Solution for Automated Refinement of IT Change Plans.
Proceedings of the Managing Large-Scale Service Deployment, 2008

2007
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing.
Comput. Networks, 2007

On the Performance of Web Services Management Standards - An Evaluation of MUWS and WS-Management for Network Management.
Proceedings of the Integrated Network Management, 2007

2006
Spotlights on Network Operations and Management Research in Latin America - A Report on LANOMS 2005.
J. Network Syst. Manage., 2006

Anahy: A Programming Environment for Cluster Computing.
Proceedings of the High Performance Computing for Computational Science, 2006

Flexible Security Configuration & Deployment in Peer-to-Peer Applications.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

A WSDM-Based Architecture for Global Usage Characterization of Grid Computing Infrastructures.
Proceedings of the Large Scale Management of Distributed Systems, 2006

Network-based intrusion detection systems evaluation through a short term experimental script.
Proceedings of the e-Business and Telecommunication Networks, 2006

2005
A SNMP-based platform for distributed stateful intrusion detection in enterprise networks.
IEEE Journal on Selected Areas in Communications, 2005

MUAT: An Environment for Accounting and Characterization of the Use of Computational Grids.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005

Evaluating the Impact on Data Reception and Energy Consumption of Mobile Devices using IPSec to securely access WiFi Networks.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005

On the Evaluation of a Secure Solution to Access 802.11 Networks.
Proceedings of the E-business and Telecommunication Networks, 2005

Policy-based access control in peer-to-peer grid systems.
Proceedings of the 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), 2005

2004
Towards a flexible security framework for peer-to-peer based grid computing.
Proceedings of the 2nd Workshop on Middleware for Grid Computing, 2004

Identification of Intrustion Scenarios through Classification, Characterization and Analysis of Firewall Events.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Performance Measurement of Transaction-Based Internet Applications through SNMP.
Proceedings of the ICETE 2004, 2004

Network-Based Intrusion Detection Systems Evaluation Through a Short Term Experimental Script.
Proceedings of the ICETE 2004, 2004

Assessing transaction-based Internet applications performance through a passive network traffic monitoring approach.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach.
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004

2003
On the Development of IETF-based Network Monitoring Probes for High Speed Networks.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

An SNMP Agent to Monitor Response Time of Transaction-based Internet Applications and Protocols.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

An SNMP Agent for Stateful Intrusion Inspection.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

2002
Gerenciamento distribuído e flexível de protocolos de alto nível, serviços e aplicações em redes de computadores.
PhD thesis, 2002

Trace: an open platform for high-layer protocols, services and networked applications management.
Proceedings of the Management Solutions for the New Communications World, 2002

DÓRIS - Pedagogical Agent in Intelligent Tutoring Systems.
Proceedings of the Intelligent Tutoring Systems, 6th International Conference, 2002

High-layer protocol and service management based on passive network traffic monitoring: the trace management platform.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

2001
An architecture for distributed and flexible management of high-layer protocols and network services.
J. Braz. Comp. Soc., 2001

Monitoring High-Layer Protocol Behavior Using the Trace Architecture.
Proceedings of the 2nd Latin American Network Operations and Management Symposium, 2001

Distributed Management of High-Layer Protocols and Network Services through a Programmable Agent-Based Architecture.
Proceedings of the Networking, 2001

1999
MUSE: An Environment for the Conception of Java Multimedia Applications.
Multimedia Tools Appl., 1999

Design and Execution of Adaptive Multimedia Applications in the Internet.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

Characterization and Measurements of Enterprise Network Traffic with RMON 2.
Proceedings of the Active Technologies for Network and Service Management, 1999

Applying Object-Orientation Concepts in Networked Multimedia Applications Design.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

Adaptive Multimedia Applications and QoS in the MUSE Specification Environment.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

1998
Specification of Distributed Multimedia Applications in the MUSE Environment: QoS and Adaptation Issues.
Proceedings of WebNet 98, 1998

Modeling and Validation Support for Interactive Networked Multimedia Applications.
Proceedings of the Parallel and Distributed Processing, 10 IPPS/SPDP'98 Workshops Held in Conjunction with the 12th International Parallel Processing Symposium and 9th Symposium on Parallel and Distributed Processing, Orlando, Florida, USA, March 30, 1998

Authoring and E-LOTOS conception of interactive networked multimedia applications in MUSE environment.
Proceedings of the Performance of Information and Communication Systems, 1998


MUSE - An Interactive Networked Multimedia Applications Specification Environment with E-LOTOS Translator.
Proceedings of the Advanced Information Systems Engineering, 1998

1997
OST - An Object-Oriented Computer Networks System Specification Tool.
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997


  Loading...