Artur Hecker

ORCID: 0000-0003-3604-2686
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Software-Defined Networks and 5G
  • Peer-to-Peer Network Technologies
  • IPv6, Mobility, Handover, Networks, Security
  • Network Traffic and Congestion Control
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Wireless Networks and Protocols
  • Software System Performance and Reliability
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • Advanced Authentication Protocols Security
  • Cloud Computing and Resource Management
  • Advanced MIMO Systems Optimization
  • Service-Oriented Architecture and Web Services
  • Complex Network Analysis Techniques
  • Software Testing and Debugging Techniques
  • Advanced Malware Detection Techniques
  • Telecommunications and Broadcasting Technologies
  • Advanced Data Storage Technologies
  • Smart Grid Security and Resilience
  • Advanced Optical Network Technologies

Huawei Technologies (Germany)
2013-2024

Huawei German Research Center
2013-2023

Hasso Plattner Institute
2023

University of Potsdam
2023

Swisscom (Switzerland)
2023

Paderborn University
2021

Huawei Technologies (United Kingdom)
2019

University of Göttingen
2018

Huawei Technologies (France)
2016

Nokia (Germany)
2016

The roles of trust, security and privacy are somewhat interconnected, but different facets next generation networks. challenges in creating a trustworthy 6G multidisciplinary spanning technology, regulation, techno-economics, politics ethics. This white paper addresses their fundamental research three key areas. Trust: Under the current "open internet" telco cloud can be used for trust services only equally all users. network must support embedded increased level information 6G. Trust...

10.48550/arxiv.2004.11665 preprint EN cc-by arXiv (Cornell University) 2020-01-01

The development of methodologies to manage and orchestrate virtualised resources network functions is a fundamental enabler for optimally utilising physical ICT infrastructures. Algorithms optimal location (embedding) functions, IT CT resources, services corresponding states, especially at the edge, will enable new business models provide key competitive advantage administrators. This paper introduces novel Mixed Integer Programming (MIP) formulation coordinated node link mapping onto...

10.1109/noms.2014.6838244 article EN 2014-05-01

Abstract The heterogeneity in use cases and the need to support diverse requirements from vertical markets are main drivers for new design principles of 5G communication systems. In this paper, we review notion plastic architecture propose an end network slicing concept serve capabilities features a flexible efficient manner. Besides definition, address particular key issue how devices may be enabled discover, select access most appropriate E2E slices. To solve issue, developed novel Device...

10.1002/ett.3058 article EN Transactions on Emerging Telecommunications Technologies 2016-06-23

Visual instruction tuning refines pre-trained Multimodal Large Language Models (MLLMs) to enhance their real-world task performance. However, the rapid expansion of visual datasets introduces significant data redundancy, leading excessive computational costs. Existing selection methods predominantly rely on proxy models or loss-based metrics, both which impose substantial overheads due necessity model inference and backpropagation. To address this challenge, we propose PRISM, a novel...

10.48550/arxiv.2502.12119 preprint EN arXiv (Cornell University) 2025-02-17

Modern services consist of interconnected components, e.g., microservices in a service mesh or machine learning functions pipeline. These can scale and run across multiple network nodes on demand. To process incoming traffic, components have to be instantiated traffic assigned these instances, taking capacities, changing demands, Quality Service (QoS) requirements into account. This challenge is usually solved with custom approaches designed by experts. While this typically works well for...

10.1109/tnsm.2021.3076503 article EN IEEE Transactions on Network and Service Management 2021-04-29

We formulate computation offloading as a decentralized decision-making problem with autonomous agents. design an interaction mechanism that incentivizes agents to align private and system goals by balancing between competition cooperation. The provably has Nash equilibria optimal resource allocation in the static case. For dynamic environment, we propose novel multi-agent online learning algorithm learns partial, delayed noisy state information, reward signal reduces information need great...

10.1109/infocom48880.2022.9796717 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

This paper presents a comparative analysis of replication algorithms for DHT (Distributed Hash Table) architectures. These are applicable to all existing structured peer-to-peer systems, and can be implemented on top any DHT. The performance these is examined using emulation through virtualization. Significant differences identified in terms delays, control overhead, success rate, overlay route length.

10.1145/1329469.1329481 article EN 2007-12-12

The prevailing wisdom is that a software-defined network (SDN) operates under the premise logically centralized control plane has an accurate representation of actual data state. Unfortunately, bugs, misconfigurations, faults or attacks can introduce inconsistencies between and undermine correct operation at runtime. Through our experiments, we realize P4 SDNs are no exception, prone to similar problems. With aim verify control-data inconsistency, present design implementation P4Consist,...

10.1109/jsac.2020.2999653 article EN IEEE Journal on Selected Areas in Communications 2020-06-05

IOTA organizes transactions in the ledger as a Directed Acyclic Graph (DAG) called Tangle, instead of hash chain transaction blocks used by most traditional blockchains. is considered promising platform to support Internet-of-Things (IoT) applications with its key features such micropayment and absence fees. While prior art shows extensive analysis based on synthetic data generated through simulations, an empirical from deployed network still missing. In this paper, we provide first...

10.1109/globecom42002.2020.9322220 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2020-12-01

Recent reinforcement learning approaches for continuous control in wireless mobile networks have shown impressive results. But due to the lack of open and compatible simulators, authors typically create their own simulation environments training evaluation. This is cumbersome time-consuming limits reproducibility comparability, ultimately impeding progress field.To this end, we propose mobile-env, a simple platform training, evaluating, comparing conventional networks. mobile-env lightweight...

10.1109/noms54207.2022.9789886 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2022-04-25

Multiaccess edge computing (MEC) service migration is a technology whose key objective to support ultralow-latency access services. However, the complex ultralarge-scale problem requires extensive research efforts, regarding foreseen ultradensified nodes in 5G and beyond. In this article, we propose novel dynamic optimization architecture for MEC networks. We develop new multicriteria decision-making algorithm: Technique order of preference by similarity ideal solution with attribute-based...

10.1109/tii.2023.3244321 article EN IEEE Transactions on Industrial Informatics 2023-02-16

We present the design and early implementation of p4rl, a system that uses reinforcement learning-guided fuzz testing to execute verification P4 switches automatically at runtime. p4rl our novel user-friendly query language, p4q conveniently specify intended properties in simple conditional statements (if-else) check actual runtime behavior switch against such properties. In user-specified queries with control plane configuration, Agent, Reward System guide fuzzing process trigger bugs...

10.1145/3341216.3342206 article EN 2019-01-01

Software defined networking (SDN) has emerged as an efficient network technology for lowering operating costs through simplified hardware, software and management. Specific research focus been placed to achieve a successful carrier grade with SDN, in terms of scalability, reliability, QoS service In the literature, very little material is currently available on traffic engineering (TE) using this technology. This paper presents novel mixed integer linear programming (MILP) formulation...

10.1109/sdn4fns.2013.6702562 article EN 2013-11-01

In software-defined networking, the typical switch-controller cycle, from generating a network event notification at controller until flow rules are installed switches, is not an instantaneous activity. Our measurement results show that this has serious implications on performance of setup procedure, specifically for larger networks: we observe that, even with software latency networks around 500 switches in order 50 ms, 99th percentile exhibiting 10× higher latencies. To reduce both and...

10.1109/jsac.2018.2871291 article EN IEEE Journal on Selected Areas in Communications 2018-09-20

IOTA blockchain system is lightweight without heavy proof-of-work mining phases, which considered a promising service platform of Internet Things applications. organizes ledger data in directed acyclic graph (DAG), called Tangle, rather chain structure as traditional blockchains. With arriving messages, tangle grows special way, multiple messages can be attached to the at different locations parallel. Hence, network dynamics an operational would justify thorough study, currently unexplored...

10.1109/jiot.2022.3207513 article EN IEEE Internet of Things Journal 2022-09-19

Software Defined Networking (SDN) is considered one of the major driving factors to bring radical changes on Mobile Core Networks (MCN) design. There are many proposals how advocate SDN methodology, however, most them stop at "vision" level without providing details about key performance contributors. In this paper, we tackle gap and present a study latency in based MCN. We identify elements an MCN that contribute overall latency. Two types considered: processing delay inside control plane...

10.1109/iscc.2016.7543785 article EN 2016-06-01

Modern manufacturing is now deeply integrating new technologies such as 5G, Internet-of-things (IoT), and cloud/edge computing to shape a level – Smart Factory. Autonomic anomaly detection (e.g., malfunctioning machines hazard situations) in factory hall on the list expects be realized with massive IoT sensor deployments. In this paper, we consider acoustic data-based detection, which widely used factories because sound information reflects richer internal states while videos cannot;...

10.1109/globecom46510.2021.9685791 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2021-12-01

In this survey paper, we assess existing approaches to security metric definition. We classify proposed definitions and discuss their advantages problems. argue that without a more restrictive definition, the apparently common term degenerates mere buzzword, which can be dangerous in terms of suggested comparability. conclude with some guidelines on IS definition sketch an alternative concept for operational evaluation.

10.1109/securware.2008.37 article EN 2008-08-01

Measuring and evaluating cyber security is of primary importance in IT systems. The fundamental need to assess choices validity effectiveness growing. One the main accepted approaches this problem a standardized offline assurance evaluation. But, method static, time consuming does not scale well complex dynamic Telco As such, it apply continuous assessment for today's operational In paper, we present methodology together with required tools services. Our enables (i) definition instantiation...

10.1109/crisis.2011.6061831 article EN 2011-09-01

Virtual network embedding is considered an important problem to solve in order make infrastructure virtual-ization economically reasonable. The most efficient algorithms proposed so far define link and node mappings as optimal solutions of Integer Programming (IP) problems. They exhibit reasonably good performance only for small instance sizes, including few tens nodes links per physical substrate, virtual request a dozen requests handle parallel. However, we find these instances too be any...

10.1109/icccn.2014.6911859 article EN 2014-08-01

To address scalability concerns, hierarchical control plane organization has been proposed for SDN. However, an open question is how such a hierarchy should look like. In this paper, we model the impact of hierarchies on performance and derive expression optimal given network scale. We then show that using 4-layer SDN sufficient practical scales, suggesting feasibility relevance approach. Finally, illustrate elasticity SDN, which enables more flexible cost evolution plane.

10.1109/icc.2015.7249178 article EN 2015-06-01

Modern services comprise interconnected components, e.g., microservices in a service mesh, that can scale and run on multiple nodes across the network demand. To process incoming traffic, components have to be instantiated traffic assigned these instances, taking capacities changing demands into account. This challenge is usually solved with custom approaches designed by experts. While this typically works well for considered scenario, models often rely unrealistic assumptions or knowledge...

10.23919/cnsm50824.2020.9269087 article EN 2020-11-02

Acoustic data from the Industrial Internet of Things (IIoT) are widely used in anomaly detection because audio information reflects richer internal statuses monitored working machines than video does. Since multiple acoustic sources interfere with each other by nature, source estimation is a prerequisite subsequent detection. Existing schemes often use centralized manner to separate full on remote node clouds. However, such may delay reactions anomalies due transmission and complexity...

10.1109/jiot.2022.3176974 article EN IEEE Internet of Things Journal 2022-05-23
Coming Soon ...