- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Telecommunications and Broadcasting Technologies
- Cloud Data Security Solutions
- Security and Verification in Computing
- Advanced Photonic Communication Systems
- Network Security and Intrusion Detection
- Business Process Modeling and Analysis
- Advanced Optical Network Technologies
- Internet Traffic Analysis and Secure E-voting
- Advanced Software Engineering Methodologies
- Wireless Signal Modulation Classification
- IoT Networks and Protocols
- Service-Oriented Architecture and Web Services
Intracom Telecom (Greece)
2021-2024
This perspective paper introduces a novel framework for container orchestration called CODECO. The CODECO relies on data-network-computing approach to define the best infrastructure that can support operation of next-generation Internet applications across mobile, heterogeneous Edge-Cloud continuum. selection such an is aligned with target performance profiles defined by user, as resilience or greenness. proposes rely decentralized Artificial Intelligence approaches in attempt provide most...
The evolution towards more human-centered 6G networks requires the extension of network functionalities with advanced, pervasive automation features. In this direction, cloud-native, softwarized functions and integration extreme/far edge devices shall be supported by even distributed decomposable systems, such as Edge Cloud environments, while building on AI/ML data-driven mechanisms to improve their performance resilience for stringent requirements next-generation applications. work, we...
In this paper we present QMP—an AI-driven platform for proactively assuring Network Slices' Quality of Service (QoS)— and a demo its MLOps automation features applied on vCDN Slices at the network edge.
Software Defined Networking (SDN) has come up as a promising technology for making the communication networks more flexible and dynamically (re)configurable. With advent of fifth generation (5G) mobile networks, aforementioned flexibility became urgent critical than ever. SDN offers decoupling network's control plane from data plane. As result, infrastructure layer can be abstracted application network services therefore done completely through centralized component/orchestrator. In this...
A recently proposed direction that is pursued by standardization organizations for 5G Network Function Virtualization (NFV) technologies at the core of next-generation networks (5G and beyond) adoption "Cloud-native" design principles. These principles are catalyzed Platform as a Service (PaaS) solutions allow re-usability common or dedicated Virtual Functions, in order to fulfill diverse vertical requirements network slices. PaaS can also be extended Multi-access Edge Computing environments...
The shift towards distributed computing architectures that push data storage and processing to the edge of network, is resulting into a convergence cloud-computing services next generation mobile network technologies. In order uniformly manage resources in formed cloud/core edge/devices continuum handle diversity multi-party underlying infrastructure technologies latency-aware, reliable trustworthy fashion, management automation has become more crucial than ever. this work, we present...
The potential of Edge Computing technologies is yet to be exploited for multi-domain, multi-party data-driven systems. One aspect that needs tackled the realization envisioned open edge Ecosystems, secure and trusted exchange data services among diverse stakeholders. In this work, we present a novel approach integrating mechanisms trustworthy sovereign exchange, into Multi-access (MEC) environments. To end, introduce an architecture extends ETSI MEC Architectural Framework with artifacts...
The potential of Edge Computing technologies is yet to be exploited for multi-domain, multi-party data-driven systems. One aspect that needs tackled the realization envisioned open-edge Ecosystems, secure and trusted exchange data services among diverse stakeholders. In this work, we present a novel approach integrating mechanisms trustworthy sovereign exchange, into Multi-access (MEC) environments. To end, introduce an architecture extends ETSI MEC Architectural Framework with artifacts...