M. Longo
YOU?
Author Swipe
View article: Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation Open
In modern telecommunication networks, services are provided through Service Function Chains (SFC), where network resources are implemented by leveraging virtualization and containerization technologies. In particular, the possibility of ea…
View article: Direction of arrival estimation for transient GW sources via time-frequency representations
Direction of arrival estimation for transient GW sources via time-frequency representations Open
View article: Search for stellar collapse with the MACRO detector at Gran Sasso
Search for stellar collapse with the MACRO detector at Gran Sasso Open
The first MACRO supermodule commenced data taking in February 1989. Two complementary trigger and readout systems have been used to monitor the horizontal scintillation counters, which contain 42 tonnes ({approximately}1 ktonne for the ful…
View article: HASFC: A MANO-Compliant Framework for Availability Management of Service Chains
HASFC: A MANO-Compliant Framework for Availability Management of Service Chains Open
Most softwarized telco services are conveniently framed as Service Function\nChains (SFCs). Indeed, being structured as a combination of interconnected\nnodes, service chains may suffer from the single point of failure problem,\nmeaning th…
View article: Table of Content
Table of Content Open
View article: Table of contents
Table of contents Open
View article: Availability Evaluation of Multi-Tenant Service Function Chaining Infrastructures by Multidimensional Universal Generating Function
Availability Evaluation of Multi-Tenant Service Function Chaining Infrastructures by Multidimensional Universal Generating Function Open
The Network Function Virtualization (NFV) paradigm has been devised as an\nenabler of next generation network infrastructures by speeding up the\nprovisioning and the composition of novel network services. The latter are\nimplemented via a…
View article: Spatio-temporal resolution enhancement for cloudy thermal sequences
Spatio-temporal resolution enhancement for cloudy thermal sequences Open
Many applications require remotely sensed brightness temperature (BT) data acquired with high temporal and spatial resolutions. In this regard, a viable strategy to overtake the physical limitations of space-borne sensors to achieve these …
View article: A SUD DI NESSUN NORD: IL SUD E L'ETNOCENTRISMO DELLA TEORIA SOCIALE
A SUD DI NESSUN NORD: IL SUD E L'ETNOCENTRISMO DELLA TEORIA SOCIALE Open
Il saggio tematizza la questione dell'etnocentrismo nelle scienze sociali, facendo riferimento a Parsons e a Banfield, i quali consideravano le società meridionali come caratterizzate da una forte resistenza alla modernizzazione. Analizzan…
View article: Botnet Identification In Multi-Clustered Ddos Attacks
Botnet Identification In Multi-Clustered Ddos Attacks Open
Publication in the conference proceedings of EUSIPCO, Kos island, Greece, 2017
View article: DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies
DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies Open
Distributed Denial-of-Service (DDoS) attacks are usually launched through the $botnet$, an "army" of compromised nodes hidden in the network. Inferential tools for DDoS mitigation should accordingly enable an early and reliable discriminat…
View article: Interpolation and combination rules for the temporal and spatial enhancement of SEVIRI and MODIS thermal image sequences
Interpolation and combination rules for the temporal and spatial enhancement of SEVIRI and MODIS thermal image sequences Open
Brightness temperature (BT) images acquired via satellite platforms are at the core of Earth Observation applications, aiding activities such as agriculture, forestry, and urbanization management. However, said applications may suffer from…
View article: DDoS Attacks with Randomized Traffic Innovation: Botnet Identification\n Challenges and Strategies
DDoS Attacks with Randomized Traffic Innovation: Botnet Identification\n Challenges and Strategies Open
Distributed Denial-of-Service (DDoS) attacks are usually launched through the\n$botnet$, an "army" of compromised nodes hidden in the network. Inferential\ntools for DDoS mitigation should accordingly enable an early and reliable\ndiscrimi…
View article: Compressed Sensing for Time-Frequency Gravitational Wave Data Analysis
Compressed Sensing for Time-Frequency Gravitational Wave Data Analysis Open
The potential of compressed sensing for obtaining sparse time-frequency representations for gravitational wave data analysis is illustrated by comparison with existing methods, as regards i) shedding light on the fine structure of noise tr…
View article: SEARCH FOR TeV GAMMA-RAY EMISSION FROM POINT-LIKE SOURCES IN THE INNER GALACTIC PLANE WITH A PARTIAL CONFIGURATION OF THE HAWC OBSERVATORY
SEARCH FOR TeV GAMMA-RAY EMISSION FROM POINT-LIKE SOURCES IN THE INNER GALACTIC PLANE WITH A PARTIAL CONFIGURATION OF THE HAWC OBSERVATORY Open
A survey of the inner Galaxy region of Galactic longitude and latitude is performed using one-third of the High Altitude Water Cherenkov Observatory, operated during its construction phase. To address the ambiguities arising from unresolve…
View article: SEARCH FOR GAMMA-RAYS FROM THE UNUSUALLY BRIGHT GRB 130427A WITH THE HAWC GAMMA-RAY OBSERVATORY
SEARCH FOR GAMMA-RAYS FROM THE UNUSUALLY BRIGHT GRB 130427A WITH THE HAWC GAMMA-RAY OBSERVATORY Open
© 2015. The American Astronomical Society. All rights reserved.. The first limits on the prompt emission from the long gamma-ray burst (GRB) 130427A in the > 100 GeV energy band are reported. GRB 130427A was the most powerful burst ever de…