Search Results - "Ilie, Dragos"
-
1
On the performance and scalability of consensus mechanisms in privacy-enabled decentralized renewable energy marketplace
Published in Annales des télécommunications (01-04-2024)“…Renewable energy sources were introduced as an alternative to fossil fuel sources to make electricity generation cleaner. However, today’s renewable energy…”
Get full text
Journal Article -
2
Acceptance, Hesitancy, and Refusal in Anti-COVID-19 Vaccination: A Cluster Analysis Aiming at the Typology behind These Three Concepts
Published in Vaccines (Basel) (01-09-2022)“…This paper presents the findings of a study aiming at an innovative typology of attitudes towards COVID-19 vaccination. The proposed typology tries to go…”
Get full text
Journal Article -
3
Avoiding Detection by Hostile Nodes in Airborne Tactical Networks
Published in Future internet (01-06-2023)“…Contemporary airborne radio networks are usually implemented using omnidirectional antennas. Unfortunately, such networks suffer from disadvantages such as…”
Get full text
Journal Article -
4
FINANCING RURAL AND AGRI-FOOD ECONOMY IN THE CONDITIONS OF WORLD CRISIS
Published in Ekonomika poljoprivrede (1979) (01-04-2012)“…The world economic crisis deprived of liquidities almost all economic sectors, among them also rural and agri-food economy. In these conditions, on the banking…”
Get full text
Journal Article -
5
Vaccinating against COVID-19: The Correlation between Pro-Vaccination Attitudes and the Belief That Our Peers Want to Get Vaccinated
Published in Vaccines (Basel) (20-11-2021)“…This study verifies whether there is a strong correlation between the pro-vaccination, against COVID-19 attitude of the respondents and their belief that most…”
Get full text
Journal Article -
6
Algorithms for automated live migration of virtual machines
Published in The Journal of systems and software (01-03-2015)“…•Two live migration strategies for load balancing, “pull” and “push”, are investigated•The two strategies complement each other•The push strategy will not…”
Get full text
Journal Article -
7
A Survey on Blockchain-Based Telecommunication Services Marketplaces
Published in IEEE eTransactions on network and service management (01-03-2022)“…Digital marketplaces were created recently to accelerate the delivery of applications and services to customers. Their appealing feature is to activate and…”
Get full text
Journal Article -
8
Towards efficient privacy and trust in decentralized blockchain-based peer-to-peer renewable energy marketplace
Published in Sustainable Energy, Grids and Networks (01-09-2023)“…Renewable energy sources are becoming increasingly important as a substitute for fossil energy production. However, distributed renewable energy production…”
Get full text
Journal Article -
9
Statistical models for Gnutella signaling traffic
Published in Computer networks (Amsterdam, Netherlands : 1999) (05-12-2007)“…The paper is focused on signaling traffic between Gnutella peers that implement the latest Gnutella protocol specifications (v0.6). In particular, we provide…”
Get full text
Journal Article -
10
On designing a cost-aware virtual CDN for the federated cloud
Published in 2016 International Conference on Communications (COMM) (01-06-2016)“…We have developed a prototype for a cost-aware, cloud-based content delivery network (CDN) suitable for a federated cloud scenario. The virtual CDN controller…”
Get full text
Conference Proceeding -
11
Measuring and modeling the BitTorrent content distribution system
Published in Computer communications (15-11-2010)“…The paper reports on a detailed study of the BitTorrent content distribution system. We first present a measurement infrastructure designed to allow detailed,…”
Get full text
Journal Article -
12
-
13
PUBLICUL SUVERANIST DIN ROMÂNIA ȘI PERCEPȚIA MEDIULUI INTERNAȚIONAL
Published in Revista de Știinţe Politice şi Relaţii Internaţionale (01-09-2024)“…This paper explores how belonging to the sovereigntist public in Romania is associated with a range of perceptions regarding the international environment. It…”
Get full text
Journal Article -
14
On the Design and Performance of Chinese OSCCA-approved Cryptographic Algorithms
Published in 2020 13th International Conference on Communications (COMM) (01-06-2020)“…SM2, SM3, and SM4 are cryptographic standards authorized to be used in China. To comply with Chinese cryptography laws, standard cryptographic algorithms in…”
Get full text
Conference Proceeding -
15
Dynamic Forward Error Correction Coding to Avoid Detection in Airborne Tactical Networks
Published in 2024 International Conference on Military Communication and Information Systems (ICMCIS) (23-04-2024)“…Here we present a novel routing protocol HDARP+ for airborne tactical networks that use directional antennas. HDARP+ extends the existing protocol HDARP…”
Get full text
Conference Proceeding -
16
Towards a Secure Proxy-based Architecture for Collaborative AI Engineering
Published in 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW) (01-11-2020)“…In this paper, we investigate how to design a security architecture of a Platform-as-a-Service (PaaS) solution, denoted as Secure Virtual Premise (SVP), for…”
Get full text
Conference Proceeding -
17
On the Performance of Consensus Mechanisms in Privacy-Enabled Decentralized Peer-to-Peer Renewable Energy Marketplace
Published in 2023 26th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) (06-03-2023)“…This work defines a decentralized blockchain-based peer-to-peer (P2P) energy marketplace which addresses actors' privacy and the performance of consensus…”
Get full text
Conference Proceeding -
18
Finding a needle in a haystack - A comparative study of IPv6 scanning methods
Published in 2019 International Symposium on Networks, Computers and Communications (ISNCC) (01-06-2019)“…It has previously been assumed that the size of an IPv6 network would make it impossible to scan the network for vulnerable hosts. Recent work has shown this…”
Get full text
Conference Proceeding -
19
Unstable Throughput: When the Difficulty Algorithm Breaks
Published 04-06-2020“…In Proof-of-Work blockchains, difficulty algorithms serve the crucial purpose of maintaining a stable transaction throughput by dynamically adjusting the block…”
Get full text
Journal Article -
20
A PMIPv6 approach to maintain network connectivity during VM live migration over the internet
Published in 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet) (01-10-2014)“…We present a live migration solution based on Proxy Mobile IPv6 (PMIPv6), a light-weight mobility protocol standardized by IETF. PMIPv6 handles node mobility…”
Get full text
Conference Proceeding