A heuristic-based algorithm for privacy-oriented virtual network embedding
暂无分享,去创建一个
Luciana S. Buriol | Luciano Paschoal Gaspary | Rodrigo Ruas Oliveira | Leonardo Richter Bays | Marinho P. Barcellos | L. Buriol | M. Barcellos | R. R. Oliveira | L. Gaspary | L. Bays
[1] Minlan Yu,et al. Rethinking virtual network embedding: substrate support for path splitting and migration , 2008, CCRV.
[2] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[3] Albert,et al. Topology of evolving networks: local events and universality , 2000, Physical review letters.
[4] David G. Andersen,et al. Theoretical Approaches to Node Assignment , 2002 .
[5] Brendan Jennings,et al. Policy-assisted planning and deployment of virtual networks , 2011, 2011 7th International Conference on Network and Service Management.
[6] Sheldon Howard Jacobson,et al. The Theory and Practice of Simulated Annealing , 2003, Handbook of Metaheuristics.
[7] Luciana S. Buriol,et al. Security-aware optimal resource allocation for virtual network embedding , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[8] Raouf Boutaba,et al. ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping , 2012, IEEE/ACM Transactions on Networking.
[9] Lazaros F. Merakos,et al. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms , 2006, Comput. Networks.
[10] Xiang Cheng,et al. Virtual network embedding through topology-aware node ranking , 2011, CCRV.
[11] Gustavo Prado Alkmim,et al. Mapping virtual networks onto substrate networks , 2013, Journal of Internet Services and Applications.