T
Thomas Magedanz
Researcher at Fokus
Publications - 354
Citations - 4502
Thomas Magedanz is an academic researcher from Fokus. The author has contributed to research in topics: Next-generation network & The Internet. The author has an hindex of 28, co-authored 340 publications receiving 4248 citations. Previous affiliations of Thomas Magedanz include Center for Information Technology & Technical University of Berlin.
Papers
More filters
Proceedings ArticleDOI
Intelligent agents: an emerging technology for next generation telecommunications?
TL;DR: An overview of the emerging field of intelligent agents (IAs) by identifying their basic properties and looking at their potential impacts on open service architectures, intelligent communications and network management.
Journal ArticleDOI
Service Function Chaining in Next Generation Networks: State of the Art and Research Challenges
TL;DR: A service function chaining taxonomy is introduced that considers architecture and performance dimensions as the basis for the subsequent state of the art analysis and concludes with a gap analysis of existing solutions and the identification of future research challenges.
Journal ArticleDOI
EASE: EPC as a service to ease mobile core network deployment over cloud
Tarik Taleb,Marius Corici,Carlos Parada,Almerima Jamakovic,Simone Ruffino,Georgios Karagiannis,Thomas Magedanz +6 more
TL;DR: The objective of this article is to demonstrate the feasibility of on-demand creation of cloud-based elastic mobile core networks, along with their lifecycle management, with a number of different options, each with different characteristics, advantages, and disadvantages.
Journal ArticleDOI
Mobile agents - enabling technology for active intelligent network implementation
M. Breugst,Thomas Magedanz +1 more
TL;DR: The authors illustrate how the integration of mobile agent platforms into IN elements, notably into the IN switches, will realize an active IN environment, which results in better performance and fault tolerance compared to traditional IN service implementations.
Journal ArticleDOI
Survey of network security systems to counter SIP-based denial-of-service attacks
TL;DR: It is shown that there are possible solutions for both payload and flow tampering attacks, and partial solutions for message flooding attacks, as well as giving hints how open flooding attacks issues could be addressed.