Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Andrea DettiProfessor of Mobile Networks and Cloud Computing at University of Rome "Tor Vergata"Verified email at uniroma2.it
Nicola Blefari MelazziProfessor of Telecommunications, University of Rome, Tor VergataVerified email at uniroma2.it
giuseppe bianchiUniversitą di Roma Tor VergataVerified email at uniroma2.it
Stefano SalsanoDip. Ingegneria Elettronica - University of Rome Tor VergataVerified email at uniroma2.it
Pierpaolo LoretiUniversity of Rome Tor VergataVerified email at uniroma2.it
Francesco Saverio ProtoUniversita' degli Studi di Roma Tor VergataVerified email at ing.uniroma2.it
Joerg WidmerResearch Professor, IMDEA Networks, Madrid, SpainVerified email at imdea.org
Alberto CaponiSenior Researcher, CNIT @ University of Rome "Tor Vergata"Verified email at uniroma2.it
Pier Luigi VentreUniversity of Rome “Tor Vergata"Verified email at uniroma2.it
Florian SchmidtAcropolis Hypervisor Engineering at NutanixVerified email at flosch.eu
Tooska DargahiSenior Lecturer in Cybersecurity, Manchester Metropolitan University, UKVerified email at mmu.ac.uk
Francesco LombardoUniversity of Rome Tor VergataVerified email at uniroma2.it
Xavier Costa PerezICREA, i2cat, NEC Laboratories EuropeVerified email at ieee.org
Gabriele LospotoPostDoc@Roma Tre UniversityVerified email at dia.uniroma3.it
Massimo RimondiniUnidata S.p.A.Verified email at unidata.it
Roberto di LalloRoma Tre UniversityVerified email at dia.uniroma3.it
Paul PatrasNet AI / The University of EdinburghVerified email at ieee.org
Jose Pablo Salvador GarciaFon TechnologiesVerified email at fon.com
Stefano ParisNokia Bell LabsVerified email at nokia-bell-labs.com
Yan GrunenbergerWorking Group TwoVerified email at wgtwo.com