Marinho P. Barcellos

According to our database1, Marinho P. Barcellos
  • authored at least 68 papers between 1994 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
NDNrel: A mechanism based on relations among objects to improve the performance of NDN.
J. Network and Computer Applications, 2017

Achieving minimum bandwidth guarantees and work-conservation in large-scale, SDN-based datacenter networks.
Computer Networks, 2017

Exploiting parallelism in hierarchical content stores for high-speed ICN routers.
Computer Networks, 2017

Sandboxing Data Plane Programs for Fun and Profit.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based Verification.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Optimal Service Function Chain Composition in Network Functions Virtualization.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
How physical network topologies affect virtual network embedding quality: A characterization study based on ISP and datacenter networks.
J. Network and Computer Applications, 2016

PredCloud: Providing predictable network performance in large-scale OpenFlow-enabled cloud platforms through trust-based allocation of resources.
Computer Communications, 2016

A toolset for efficient privacy-oriented virtual network embedding and its instantiation on SDN/OpenFlow-based substrates.
Computer Communications, 2016

Making puzzles green and useful for adaptive identity management in large-scale distributed systems.
Computer Networks, 2016

ASTORIA: A framework for attack simulation and evaluation in smart grids.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Providing producer mobility support in NDN through proactive data replication.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Virtual network security: threats, countermeasures, and challenges.
J. Internet Services and Applications, 2015

Opportunistic resilience embedding (ORE): Toward cost-efficient resilient virtual networks.
Computer Networks, 2015

Edge-centric Computing: Vision and Challenges.
Computer Communication Review, 2015

Predictor: Providing fine-grained management and predictability in multi-tenant datacenter networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

CCNrel: Leveraging relations among objects to improve the performance of CCN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Off the wire control: Improving the control plane resilience through cellular networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

IoNCloud: Exploring application affinity to improve utilization and predictability in datacenters.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Hierarchical Content Stores in High-Speed ICN Routers: Emulation and Prototype Implementation.
Proceedings of the 2nd International Conference on Information-Centric Networking, 2015

2014
Reconnecting Partitions on Physical Infrastructures: Towards an Expansion Strategy for Efficient Virtual Network Embedding.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Were You There? Bridging the Gap to Unveil Users' Online Sessions in Networked, Distributed Systems.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Slowing down to speed up: Protecting users against massive attacks in content distribution systems.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A heuristic-based algorithm for privacy-oriented virtual network embedding.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Survivor: An enhanced controller placement strategy for improving SDN survivability.
Proceedings of the IEEE Global Communications Conference, 2014

HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems.
Computer Communications, 2013

DoS-resilient virtual networks through multipath embedding and opportunistic recovery.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Exploring your neighborhood: Comparing connection strategies in swarming networks through evolving graphs.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

Trust-based grouping for cloud datacenters: Improving security in shared infrastructures.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Workflow specification and scheduling with security constraints in hybrid clouds.
Proceedings of the 2nd IEEE Latin American Conference on Cloud Computing and Communications, 2013

Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Make it green and useful: Reshaping puzzles for identity management in large-scale distributed systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

No more backups: Toward efficient embedding of survivable virtual networks.
Proceedings of IEEE International Conference on Communications, 2013

Characterizing the impact of network substrate topologies on virtual network embedding.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Beyond network simulators: Fostering novel distributed applications and protocols through extendible design.
J. Network and Computer Applications, 2012

Denial-of-service attacks and countermeasures on BitTorrent.
Computer Networks, 2012

Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks.
Computer Networks, 2012

Disconnecting to connect: Understanding optimistic disconnection in BitTorrent.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Security-aware optimal resource allocation for virtual network embedding.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
Funnel: Choking Polluters in BitTorrent File Sharing Communities.
IEEE Trans. Network and Service Management, 2011

A conservative strategy to protect P2P file sharing systems from pollution attacks.
Concurrency and Computation: Practice and Experience, 2011

AltoStratus: A Collaboration Network Focused on the New Research Challenges and Opportunities in Cloud Computing.
Proceedings of the 25th Brazilian Symposium on Software Engineering, 2011

Challenging the feasibility of authentication mechanisms for P2P live streaming.
Proceedings of the 6th Latin America Networking Conference, 2011

Observing the BitTorrent universe through Telescopes.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Securing P2P systems from Sybil attacks through adaptive identity management.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Flexible and secure service discovery in ubiquitous computing.
J. Network and Computer Applications, 2010

Choking polluters in BitTorrent file sharing communities.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

2009
AGRADC: An architecture for autonomous deployment and configuration of grid computing applications.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

TorrentLab: investigating BitTorrent through simulation and live experiments.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2007
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing.
Computer Networks, 2007

Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent.
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007

2006
Flexible Security Configuration & Deployment in Peer-to-Peer Applications.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Bridging the Gap between Simulation and Experimental Evaluation in Computer Networks.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006

2005
Congestion Control with ECN Support in Poll-Based Multicast Protocols.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Policy-based access control in peer-to-peer grid systems.
Proceedings of the 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), 2005

Hybrid reliable multicast with TCP-XM.
Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, 2005

Evaluating high-throughput reliable multicast for grid applications in production networks.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Towards a flexible security framework for peer-to-peer based grid computing.
Proceedings of the 2nd Workshop on Middleware for Grid Computing, 2004

High-Performance Reliable Multicasting for Grid Applications.
Proceedings of the 5th International Workshop on Grid Computing (GRID 2004), 2004

2002
Simulating Group Communication Protocols Through an Object-Oriented Framework.
Proceedings of the Proceedings 35th Annual Simulation Symposium (ANSS-35 2002), 2002

1999
A Multicast Transport Protocol for Reliable Group Applications.
Proceedings of the Networked Group Communication, 1999

1998
PRMP : a scaleable polling-based reliable multicast protocol.
PhD thesis, 1998

An End-to-End Reliable Multicast Protocol Using Polling for Scaleability.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

1994
The HetNOS Network Operating System: A Tool for Writing Distributed Applications.
Operating Systems Review, 1994


  Loading...