1
0
0
News
Practical Active RevocationDIAL@UCLouvain
dial.uclouvain.be
von S Contiu · · Zitiert von: 3 — [39] Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi,. Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Her- mann De Meer, and Hans P ...
Netzwerk-Profile
LinkedIn: Dr. Waseem Mandarawi – Data Center Engineer – Universität Passaude.linkedin.com › dr-waseem-mandarawi-750b00208
Dr. Waseem Mandarawi. Data Center Engineer - University of Passau. Universität Passau. Passau, Bayern, Deutschland. 61 Follower:innen 61 Kontakte.
Waseem MandarawiSemantic Scholar
www.semanticscholar.org
Semantic Scholar profile for Waseem Mandarawi, with 4 highly influential citations and 12 scientific research papers.
ThesesTechnische Universität Ilmenau
www.tu-ilmenau.de
A Framework for Autoscaling private IAAS Clouds - Waseem Mandarawi Effiziente In-Memory-Verarbeitung von SPARQL-Anfragen auf großen Datenmengen - Steve ...
Business-Profile
Waseem MANDARAWI | Data center engineer | Doctor of ...ResearchGate
www.researchgate.net
Waseem MANDARAWI, Data center engineer | Cited by 127 | of Universität Passau, Passau | Read 11 publications | Contact Waseem MANDARAWI.
Ausbildung
A FRAMEWORK FOR EVALUATING SECURITY, TRUST ...CiTIUS-USC
apps.citius.usc.es
von S DE COMPOSTELA — [96] Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl,. Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann De ...
Abschlussarbeiten | Technische Universität Ilmenau
www.tu-ilmenau.de
WebA Framework for Autoscaling private IAAS Clouds - Waseem Mandarawi Effiziente In-Memory-Verarbeitung von SPARQL-Anfragen auf großen Datenmengen - Steve Göring
Bücher
Hans D. SchottenCSAuthors
www.csauthors.net
Waseem Mandarawi. ,. Henning Trsek. ,. Hermann de Meer. ,. Martin Wollschlaeger. ,. Hans Dieter Schotten. ,. Jürgen Jasperneite. Proceedings of the 16th IEEE ...
Classifying malware attacks in IaaS cloud environmentsDirectory of Open Access Journals
doaj.org
Noëlle Rakotondravony,; Benjamin Taubmann,; Waseem Mandarawi,; Eva Weishäupl,; Peng Xu,; Bojan Kolosnjaji,; Mykolai Protsenko,; Hermann de Meer, ...
Principles of Performance and Reliability Modeling and ...google.com
books.google.com
... Waseem Mandarawi, Andreas Fischer, Amine Mohamed Houyou, Hans-Peter Huth and Hermann de Meer Abstract In modern industrial solutions, Ethernet-based ...
BMBF-Projekt: Future Industrial Network Architecture (FIND ...books.google.com › books › about › BMBF_Projekt...
books.google.com
Title, BMBF-Projekt: Future Industrial Network Architecture (FIND): Abschlussbericht nach NKBF 98 : Projekt: FIND ; Authors, Hermann de Meer, Waseem Mandarawi.
Dokumente zum Namen
BayesImposter: Bayesian Estimation Based .bss Imposter ...arXiv
arxiv.org
von A Barua · · Zitiert von: 3 — [61] Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva. Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann De ...
Waseem Mandarawi - HomeACM Digital Library
dl.acm.org
Waseem Mandarawi ; Classifying malware attacks in IaaS cloud environments · Noëlle Rakotondravony ; Modeling Security Requirements for VNE algorithms · Andreas ...
2013 IEEE/ACM 6th International Conference on Utility and ...Proceedings.com
toc.proceedings.com
Omran Saleh, Francis Gropengießer, Heiko Betz, Waseem Mandarawi, and Kai-Uwe Sattler. Session IV. 2nd International Workshop on Clouds and (eScience).
A Complete Bibliography of Publications in AlgorithmsUniversity of Utah
ftp.math.utah.edu
von NHF Beebe · — ... Waseem Mandarawi, Jürgen Rottmeier, Milad Rezaeighale, and Her- mann de Meer. Policy-based composition and embedding of extended virtual ...
Wissenschaftliche Veröffentlichungen
Ansah FrimpongDBLP
dblp.uni-trier.de
, Marco Ehrlich, Waseem Mandarawi, Henning Trsek , Hermann de Meer, Martin Wollschlaeger, Hans Dieter Schotten, Jürgen Jasperneite : Controller of ...
A Cost-driven Approach for Virtualized Network Services ...HAL laas
laas.hal.science
von NEH Nouar · — [Fischer 2017] Andreas Fischer, Ramona Kühn, Waseem Mandarawi and Hermann de Meer. Modeling security requirements for VNE algorithms. In ...
Heiko Betz - dblpDBLP
dblp.dagstuhl.de
Omran Saleh, Francis Gropengießer, Heiko Betz, Waseem Mandarawi, Kai-Uwe Sattler: Monitoring and Autoscaling IaaS Clouds: A Case for Complex Event ...
Kai-Uwe Sattler - DBLP - Schloss DagstuhlDBLP
dblp.dagstuhl.de
... Waseem Mandarawi, Kai-Uwe Sattler: Monitoring and Autoscaling IaaS Clouds: A Case for Complex Event Processing on Data Streams. UCC 2013: text to ...
Veröffentlichungen allgemein
a framework for evaluating security, trust, and efficiency of ...CORE
core.ac.uk
von S DE COMPOSTELA — [96] Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl,. Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann De Meer, and Hans P ...
Principles of Performance and Reliability Modeling and ...RePEc
econpapers.repec.org
von L Fiondella · · Zitiert von: 10 — Constraint-Based Virtualization of Industrial Networks: Waseem Mandarawi, Andreas Fischer, Amine Mohamed Houyou, Hans-Peter Huth and Hermann Meer; Component ...
Multidomain Virtual Network Embedding under Security- ...Theses.fr
www.theses.fr
von F Boutigny · — Fischer, Andreas, Ramona Kühn, Waseem Mandarawi, and Hermann de Meer. (2016). “Modeling Security Requirements for VNE algorithms”. In: Proceed- ings of the ...
25th IEEE International Conference on Emerging Researchrresearchr.org
researchr.org
... Waseem Mandarawi, Hamza Chahed, Hermann de Meer [doi] · Configuration Solution for TSN-based Industrial Networks utilizing SDN and OPC UAThomas ...
Artikel & Meinungen
For Peer ReviewWordPress.com
rranjans.files.wordpress.com
... Waseem Mandarawi, and Kai-Uwe Sattler Monitoring and autoscaling IaaS clouds: a case for complex event processing on data streams. In Proceedings of ...
Sonstiges
Device and method for allocating communication ...Google Patents
patents.google.com
Waseem MANDARAWI: Hermann De Meer: Hans-Peter Huth. Worldwide applications WO. Application number: PCT/EP Filing date: Legal ...
(PDF) A Multi-view Learning Approach to the Discovery of ...Academia.edu
www.academia.edu
Lengyel, Waseem Mandarawi, Hermann de Meer, Tilo Müller, Mykola Protsenko, Hans P. Reiser, Benjamin Taubmann, and Eva Weishäupl S-Test: A Framework for ...
A Framework for Virtualizing Time-aware Shaper Using High ...Semantic Scholar
www.semanticscholar.org
Waseem Mandarawi, Hamza Chahed, H. Meer · Published 1 September · Computer Science · th IEEE International Conference on Emerging Technologies and ...
Accepted postersEuroSys 2015
eurosys2015.labri.fr
... Waseem Mandarawi and Hermann de Meer (University of Passau); Intelligent NIC Queue Management in the Dragonet Network Stack. Pravin Shinde, Kornilios Kourtis ...
Algorithms ({Basel})University of Utah
ftp.math.utah.edu
AP — ... Waseem Mandarawi and Jürgen Rottmeier and Milad Rezaeighale and Hermann de Meer Policy-Based Composition and Embedding of Extended Virtual ...
Cloud forensics and securitySpringerOpen
www.springeropen.com
Studies ... Authors: Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann de ...
Co-location Detection on the CloudOUCI
ouci.dntb.gov.ua
Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann de Meer, Hans P. Reiser.
Holdings: Policy-Based Composition and Embedding of Extended ...Open Access Discovery
openaccess.library.uitm.edu.my
Policy-Based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT ; Waseem Mandarawi, Jürgen Rottmeier, Milad Rezaeighale, Hermann de Meer.
Find and explore academic papersConnected Papers
www.connectedpapers.com
Fischer, Ramona Kühn, Waseem Mandarawi, H. Meer , ValueTools. Toward efficient dynamic virtual network embedding strategy for cloud networks. Duc-Lam ...
Related ArticlesMDPI
www.mdpi.com
Ivan Čilić et al. Sensors, Policy-Based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT. Waseem Mandarawi et al. Algorithms,
SearchInternet Archive Scholar
scholar.archive.org
Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann de Meer, Hans P. Reiser.
Modeling Security Requirements for VNE algorithms - Citegraphcitegraph.io
www.citegraph.io
Cited by (0 rows). References (11 rows). Name. Citations. PageRank. Hermann de Meer, 1576, Andreas Fischer, 32, Waseem Mandarawi, 12, Ramona ...
publications | Noëlle Rakotondravonyrakotondravony.com
rakotondravony.com
von N Rakotondravony — Classifying malware attacks in IaaS cloud environments. Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, and 6 more authors.
Multi-objective Network Virtualization and its Applicability ...KOBV
opus4.kobv.de
von W Mandarawi · — Multi-objective Network Virtualization and its Applicability to Industrial Networks. Waseem Mandarawi ... Waseem MandarawiORCiD. URN: urn:nbn:de: ...
CNSM th International Conference on Network and ...cnsm-conf.org
www.cnsm-conf.org
— Waseem Mandarawi, University of Passau, Germany Vijay Mann, IBM Research, New Delhi, India Clarissa Marquezan, Paluno - Duisburg-Essen ...
Policy-Based Composition and Embedding of Extended ...KOBV
opus4.kobv.de
von W Mandarawi · · Zitiert von: 2 — Waseem Mandarawi, Jürgen Rottmeier, Milad Rezaeighale, Hermann de Meer ... Additional Services. Share in Twitter Search Google Scholar. Metadaten ...
Policy-Based Composition and Embedding of Extended ...ebsco
search.ebscohost.com
von W Mandarawi · · Zitiert von: 2 — Waseem Mandarawi *,†, Jürgen Rottmeier, Milad Rezaeighale and Hermann de Meer †. Faculty of Computer Science and Mathematics, University of ...
Program schedule overview - ETFA 2020ETFA 2020
2020.ieee-etfa.org
Waseem Mandarawi, Hamza Chahed, Hermann de Meer. 09:20-09:40. VD Worst-Case Delay Slicing for Time-Sensitive Applications in Softwarized Industrial ...
Publications - Andreas Fischerfischer-family.online
andreas.fischer-family.online
165–179, Waseem Mandarawi, Andreas Fischer, Amine Mohamed Houyou, Hans-Peter Huth, and Hermann De Meer. Constraint-based Virtualization of Industrial ...
VALUETOOLS Final Program in FullEAI VALUETOOLS 2023
valuetools.eai-conferences.org
Modeling Security Requirements for VNE algorithms. Andreas Fischer (), Ramona Kühn (University of Passau), Waseem Mandarawi (University of Passau), Hermann ...
Verwandte Suchanfragen zu Waseem Mandarawi
Jürgen Rottmeier Andreas Fischer Tilo Müller | Andres Fischer Hans-Peter Huth Kai-Uwe Sattler | Henning Trsek Martin Wollschlaeger Bojan Kolosnjaji |
Personen Vorname "Waseem" (174) Name |
sortiert nach Relevanz / Datum