Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring
暂无分享,去创建一个
[1] Hari Balakrishnan,et al. Resilient overlay networks , 2001, SOSP.
[2] Nick Feamster,et al. Measuring the effects of internet path faults on reactive routing , 2003, SIGMETRICS '03.
[3] James G. Oxley,et al. Matroid theory , 1992 .
[4] R. Kumar,et al. Practical Beacon Placement for Link Monitoring Using Network Tomography , 2006, IEEE Journal on Selected Areas in Communications.
[5] Thomas F. La Porta,et al. Service Placement for Detecting and Localizing Failures Using End-to-End Observations , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[6] Abishek Gopalan,et al. On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths , 2012, IEEE/ACM Transactions on Networking.
[7] Matthew Roughan,et al. The Internet Topology Zoo , 2011, IEEE Journal on Selected Areas in Communications.
[8] Don Towsley,et al. The use of end-to-end multicast measurements for characterizing internal network behavior , 2000, IEEE Commun. Mag..
[9] Thomas F. La Porta,et al. Network recovery from massive failures under uncertain knowledge of damages , 2017, 2017 IFIP Networking Conference (IFIP Networking) and Workshops.
[10] Kin K. Leung,et al. Efficient Identification of Additive Link Metrics via Network Tomography , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[11] Rajeev Rastogi,et al. Robust Monitoring of Link Delays and Faults in IP Networks , 2003, IEEE/ACM Transactions on Networking.
[12] Vern Paxson,et al. End-to-end routing behavior in the Internet , 1996, TNET.
[13] Samir Khuller,et al. The Budgeted Maximum Coverage Problem , 1999, Inf. Process. Lett..
[14] Kin K. Leung,et al. Inferring Link Metrics From End-To-End Path Measurements: Identifiability and Monitor Placement , 2014, IEEE/ACM Transactions on Networking.
[15] Fei Li,et al. End-to-End Service Quality Measurement Using Source-Routed Probes , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[16] Satoru Fujishige,et al. Submodular functions and optimization , 1991 .
[17] David D. Clark,et al. Challenges in Inferring Internet Interdomain Congestion , 2014, Internet Measurement Conference.
[18] Dorit S. Hochbaum,et al. Approximation Algorithms for the Set Covering and Vertex Cover Problems , 1982, SIAM J. Comput..
[19] William Stallings,et al. SNMP and SNMPv2: the infrastructure for network management , 1998, IEEE Commun. Mag..
[20] Kazuo Murota,et al. Matrices and Matroids for Systems Analysis , 2000 .
[21] George L. Nemhauser,et al. Constraint classification for mixed integer programming formulations , 1991 .
[22] G. Strang. Introduction to Linear Algebra , 1993 .
[23] J. Kruskal. On the shortest spanning subtree of a graph and the traveling salesman problem , 1956 .
[24] Randy H. Katz,et al. An algebraic approach to practical and scalable overlay network monitoring , 2004, SIGCOMM 2004.
[25] Mohammad Reza Aref,et al. Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[26] Qiang Zheng,et al. Minimizing Probing Cost and Achieving Identifiability in Probe-Based Network Link Monitoring , 2013, IEEE Transactions on Computers.
[27] Mohammad Reza Aref,et al. Risk of attack coefficient effect on availability of Ad-hoc networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[28] Thomas F. La Porta,et al. Controlling Cascading Failures in Interdependent Networks under Incomplete Knowledge , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[29] Y. Vardi,et al. Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data , 1996 .