Filter by:

2016

  • Esposito, C., Castiglione, A., Palmieri, F. & Ficco, M (2016). Distributed strategic learning for effective gossiping in wireless networks. In, pages 509-514. [More] [Digital version]
  • Esposito, C., Ficco, M., Palmieri, F. & Castiglione, A. (2016). Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory. IEEE Transactions on Computers, 65(8), 2348-2362. [More] [Digital version]
  • Ficco, M., Pietrantuono, R. & Russo, S. (2016). Using multi-objective metaheuristics for the optimal selection of positioning systems. Soft Computing, 20(7), 2641-2664. [More] [Digital version]
  • Ficco, M. (2016). Editorial: security and reliability of critical systems. Journal of Ambient Intelligence and Humanized Computing, 7(2), 149-151. [More] [Digital version]
  • Ficco, M., Esposito, C., Chang, H. & Choo, K. -. (2016). Live Migration in Emerging Cloud Paradigms. IEEE Cloud Computing, 3(2), 12-19. [More] [Digital version]
  • Ficco, M., Avolio, G., Palmieri, F. & Castiglione, A. (2016). An HLA-based framework for simulation of large-scale critical systems. Concurrency Computation, 28(2), 400-419. [More] [Digital version]
  • Esposito, C. & Ficco, M. (2016). Recent developments on security and reliability in large-scale data processing with MapReduce. International Journal of Data Warehousing and Mining, 12(1), 49-68. [More] [Digital version]
  • Ficco, M. & D’Antonio, S. (2016). 2ndworkshop on cyber security and resilience of large-scale systems. Studies in Computational Intelligence, 616, 401. [More] [Digital version]
  • Esposito, C., Castiglione, A., Palmieri, F. & Ficco, M. (2016). A game-theoretic approach to network embedded FEC over large-scale networks. Communications in Computer and Information Science, 575, 353-364. [More] [Digital version]
  • Gigante, G., Gargiulo, F., Ficco, M. & Pascarella, D. (2016). A semantic driven approach for consistency verification between requirements and FMEA. Studies in Computational Intelligence, 616, 403-413. [More] [Digital version]
  • Rios, E., Mallouli, W., Rak, M., Casola, V. & Ortiz, A. M (2016). SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework. In, pages 55-60. [More] [Digital version]
  • Benedictis, A. D., Casola, V., Rak, M. & Villano, U (2016). Cloud security: From per-provider to per-service security SLAs. In, pages 469-474. [More] [Digital version]
  • Casola, V., Benedictis, A. D., Modic, J., Rak, M. & Villano, U (2016). Per-service security sla: A new model for security management in clouds. In, pages 83-88. [More] [Digital version]
  • Rios, E. & Rak, M (2016). Cloud Challenges towards Free Flow of Data. In, pages 135-139. [More] [Digital version]
  • Ficco, M. & Rak, M (2016). Economic denial of sustainability mitigation in cloud computing. In, pages 229-238. [More] [Digital version]
  • Stopar, M., Modic, J., Petcu, D. & Rak, M (2016). Towards a proof-based SLA management framework the SPECS approach. In, pages 240-248. [More] [Digital version]
  • Casola, V., Benedictis, A. D., Rak, M. & Villano, U. (2016). SLA-based secure cloud application development. Scalable Computing, 17(4), 271-283. [More] [Digital version]
  • Benedictis, A. D., Rak, M., Turtur, M. & Villano, U. (2016). A framework for cloud-aware development of bag-of-tasks scientific applications. International Journal of Grid and Utility Computing, 7(2), 130-140. [More] [Digital version]
  • Casola, V., Benedictis, A. D., Rak, M. & Rios, E (2016). Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications. In, pages 53-62. [More] [Digital version]
  • Casola, V., Rak, M., Porta, S. L. & Byrne, A (2016). Providing security SLA in next generation Data Centers with SPECS: The EMC case study. In, pages 138-145. [More] [Digital version]
  • Petcu, D., Fazio, M., Prodan, R., Zhao, Z. & Rak, M (2016). On the next generations of infrastructure-as-a-services. In, pages 320-326. [More] [Digital version]
  • Afolaranmi, S. O., Moctezuma, L. E., Rak, M., Casola, V., Rios, E. & Lastra, J. L (2016). Methodology to obtain the security controls in multi-cloud applications. In, pages 327-332. [More] [Digital version]
  • Casola, V., Benedictis, A. D., Erascu, M., Rak, M. & Villano, U (2016). A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services. In, pages 549-554. [More] [Digital version]
  • Aversa, R., Tasquier, L. & Fusco, D (2016). An agent-based platform for resource configuration and monitoring of cloud applications. In, pages 299-310. [More] [Digital version]
  • Aversa, R. & Tasquier, L (2016). Design of an agent based monitoring framework for federated clouds. In, pages 115-120. [More] [Digital version]
Results 76 - 100 of 499
You are here: Home Publications Publications