Notice détaillée
Titre
NAL
Formal Name (French)
Laboratoire d'architecture des réseaux
Formal Name (English)
Network Architecture Laboratory
Lab Manager
Argyraki, Katerina
Group ID
U12550
Auteurs affilié
Abdullah, Muhammad
Alvarez Inostroza, Catalina Paz
Argyraki, Katerina
Dobrescu, Mihai
Dupuy, Céline
Fietz, Jonas
Fragkouli, Georgia
Ghita, Denisa Gabriela
Harchol, Yotam
Hosseini, Seyed Mahdi
Hug, Andreas
Ioannidis, George
Iyer, Rishabh
Kostopoulos, Panagiotis
Mara, Ovidiu Sebastian
Melissovas, Dimitri
Nikolopoulos, Pavlos
Pedrosa, Luis David
Primorac, Mia
Safaka, Iris
Shmeis, Zeinab
Zaostrovnykh, Arseniy
Zhang, Zhiyong
Zhao, Jingyue
Alvarez Inostroza, Catalina Paz
Argyraki, Katerina
Dobrescu, Mihai
Dupuy, Céline
Fietz, Jonas
Fragkouli, Georgia
Ghita, Denisa Gabriela
Harchol, Yotam
Hosseini, Seyed Mahdi
Hug, Andreas
Ioannidis, George
Iyer, Rishabh
Kostopoulos, Panagiotis
Mara, Ovidiu Sebastian
Melissovas, Dimitri
Nikolopoulos, Pavlos
Pedrosa, Luis David
Primorac, Mia
Safaka, Iris
Shmeis, Zeinab
Zaostrovnykh, Arseniy
Zhang, Zhiyong
Zhao, Jingyue
Institut
IINFCOM
Faculté
IC
Note
Members of NAL-unit
Lien extérieur
http://nal.epfl.ch/
Publications
An Accountability Interface for the Internet
Identity Aware Sensor Networks
MorphIT: Morphing Packet Reports for Internet Transparency
Network Neutrality Inference
Optinal Source-Based Filtering of Malicious Traffic
Performance Contracts for Software Network Functions
Performance Interfaces for Network Functions
ResQ: Enabling SLOs in Network Function Virtualization
Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks
Software Dataplane Verification
Voir toutes les publications (69)
Identity Aware Sensor Networks
MorphIT: Morphing Packet Reports for Internet Transparency
Network Neutrality Inference
Optinal Source-Based Filtering of Malicious Traffic
Performance Contracts for Software Network Functions
Performance Interfaces for Network Functions
ResQ: Enabling SLOs in Network Function Virtualization
Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks
Software Dataplane Verification
Voir toutes les publications (69)
Le document apparaît dans
Authorities > Lab