Search Results - "Wauters, Tim"
-
1
Fog Computing: Enabling the Management and Orchestration of Smart City Applications in 5G Networks
Published in Entropy (Basel, Switzerland) (01-01-2018)“…Fog computing extends the cloud computing paradigm by placing resources close to the edges of the network to deal with the upcoming growth of connected…”
Get full text
Journal Article -
2
Resource Provisioning in Fog Computing: From Theory to Practice
Published in Sensors (Basel, Switzerland) (14-05-2019)“…The Internet-of-Things (IoT) and Smart Cities continue to expand at enormous rates. Centralized Cloud architectures cannot sustain the requirements imposed by…”
Get full text
Journal Article -
3
Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection
Published in Sensors (Basel, Switzerland) (07-02-2023)“…Recently proposed methods in intrusion detection are iterating on machine learning methods as a potential solution. These novel methods are validated on one or…”
Get full text
Journal Article -
4
Prioritized Deployment of Dynamic Service Function Chains
Published in IEEE/ACM transactions on networking (01-06-2021)“…Service Function Chaining and Network Function Virtualization are enabling technologies that provide dynamic network services with diverse QoS requirements…”
Get full text
Journal Article -
5
Classification Hardness for Supervised Learners on 20 Years of Intrusion Detection Data
Published in IEEE access (2019)“…This article consolidates analysis of established (NSL-KDD) and new intrusion detection datasets (ISCXIDS2012, CICIDS2017, CICIDS2018) through the use of…”
Get full text
Journal Article -
6
A scalable WebRTC-based framework for remote video collaboration applications
Published in Multimedia tools and applications (01-03-2019)“…Remote video collaboration is common nowadays in conferencing, telehealth and remote teaching applications. To support these low-latency and interactive use…”
Get full text
Journal Article -
7
Adaptive Partially Reliable Delivery of Immersive Media Over QUIC-HTTP/3
Published in IEEE access (01-01-2023)“…The increasing popularity of head-mounted displays (HMD) and depth cameras has encouraged content providers to offer interactive immersive media content over…”
Get full text
Journal Article -
8
Towards a predictive cache replacement strategy for multimedia content
Published in Journal of network and computer applications (01-01-2013)“…In recent years, telecom operators have been moving away from traditional broadcast-driven television, towards IP-based interactive and on-demand multimedia…”
Get full text
Journal Article -
9
Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection
Published in Journal of cybersecurity and privacy (01-06-2023)“…Generalization is a longstanding assumption in articles concerning network intrusion detection through machine learning. Novel techniques are frequently…”
Get full text
Journal Article -
10
Service Relationship Orchestration: Lessons Learned From Running Large Scale Smart City Platforms on Kubernetes
Published in IEEE access (2021)“…Smart cities aim to make urban life more enjoyable and sustainable but their highly heterogeneous and distributed context creates unique operational…”
Get full text
Journal Article -
11
Characterization of the Quality of Experience and Immersion of Point Cloud Videos in Augmented Reality Through a Subjective Study
Published in IEEE access (2023)“…Point cloud streaming has recently attracted research attention as it has the potential to provide six degrees of freedom movement, which is essential for…”
Get full text
Journal Article -
12
Performance Characterization of Low-Latency Adaptive Streaming From Video Portals
Published in IEEE access (01-01-2018)“…News-based websites and portals provide significant amounts of multimedia content to accompany news stories and articles. In this context, the HTTP adaptive…”
Get full text
Journal Article -
13
Dynamic video bitrate adaptation for WebRTC-based remote teaching applications
Published in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (01-04-2018)“…Remote teaching applications are common nowa-days. Very often, these applications resemble video-on-demand streaming platforms rather than real virtual…”
Get full text
Conference Proceeding -
14
Towards Low-Latency Service Delivery in a Continuum of Virtual Resources: State-of-the-Art and Research Directions
Published in IEEE Communications surveys and tutorials (01-01-2021)“…The advent of softwarized networks has enabled the deployment of chains of virtual network and service components on computational resources from the cloud up…”
Get full text
Journal Article -
15
HTTP/2-Based Adaptive Streaming of HEVC Video Over 4G/LTE Networks
Published in IEEE communications letters (01-11-2016)“…In HTTP Adaptive Streaming, video content is temporally divided into multiple segments, each encoded at several quality levels. The client can adapt the…”
Get full text
Journal Article -
16
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks
Published in Journal of network and computer applications (01-02-2021)“…Recently, with the advent of the Internet of Things (IoT), Smart Cities have emerged as a potential business opportunity for most cloud service providers…”
Get full text
Journal Article -
17
Inter-dataset generalization strength of supervised machine learning methods for intrusion detection
Published in Journal of information security and applications (01-10-2020)“…This article describes an experimental investigation into the inter-dataset generalization of supervised machine learning methods, trained to distinguish…”
Get full text
Journal Article -
18
Towards delay-aware container-based Service Function Chaining in Fog Computing
Published in NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium (01-04-2020)“…Recently, the fifth-generation mobile network (5G) is getting significant attention. Empowered by Network Function Virtualization (NFV), 5G networks aim to…”
Get full text
Conference Proceeding -
19
Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques
Published in Journal of network and systems management (01-01-2022)“…Through the ongoing digitization of the world, the number of connected devices is continuously growing without any foreseen decline in the near future. In…”
Get full text
Journal Article -
20
Hierarchical feature block ranking for data-efficient intrusion detection modeling
Published in Computer networks (Amsterdam, Netherlands : 1999) (24-12-2021)“…The intrusion detection field has been increasing the adoption of newer datasets after relying mainly on KDD99 and NSL-KDD. Both the height and the width of…”
Get full text
Journal Article