Para acceder a los documentos con el texto completo, por favor, siga el siguiente enlace: http://hdl.handle.net/2117/97550
dc.contributor | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
---|---|
dc.contributor | Universitat Politècnica de Catalunya. MAPS - Management, Pricing and Services in Next Generation Networks |
dc.contributor.author | Bouten, Niels |
dc.contributor.author | Claeys, Maxim |
dc.contributor.author | Mijumbi, Rashid |
dc.contributor.author | Famaey, Jeroen |
dc.contributor.author | Latré, Steven |
dc.contributor.author | Serrat Fernández, Juan |
dc.date | 2016 |
dc.identifier.citation | Bouten, N., Claeys, M., Mijumbi, R., Famaey, J., Latré, S., Serrat, J. Semantic validation of affinity constrained service function chain requests. A: IEEE Conference on Network Softwarization. "2016 IEEE NetSoft Conference and Workshops (NetSoft 2016): Seoul, South Korea: 6-10 June 2016". Seoul: Institute of Electrical and Electronics Engineers (IEEE), 2016, p. 202-210. |
dc.identifier.citation | 9781467394871 |
dc.identifier.citation | 10.1109/NETSOFT.2016.7502414 |
dc.identifier.uri | http://hdl.handle.net/2117/97550 |
dc.language.iso | eng |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) |
dc.relation | http://ieeexplore.ieee.org/document/7502414/ |
dc.rights | info:eu-repo/semantics/openAccess |
dc.rights | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors |
dc.subject | Computer security |
dc.subject | Computer networks |
dc.subject | Efficiency |
dc.subject | Semantics |
dc.subject | Transfer functions |
dc.subject | Virtual reality |
dc.subject | Automatically generated |
dc.subject | Business opportunities |
dc.subject | Embedding algorithms |
dc.subject | Infrastructure providers |
dc.subject | Network functionality |
dc.subject | Programmable network |
dc.subject | Semantic validations |
dc.subject | Virtualization Techniques |
dc.subject | Seguretat informàtica |
dc.subject | Ordinadors, Xarxes d' |
dc.title | Semantic validation of affinity constrained service function chain requests |
dc.type | info:eu-repo/semantics/publishedVersion |
dc.type | info:eu-repo/semantics/conferenceObject |
dc.description.abstract | |
dc.description.abstract |