Validation of multi-layer network optimization
暂无分享,去创建一个
Moshe Zukerman | Jun Guo | Yu Peng | Fan Li | Chang Xing | Rongping Lin | Wenjie Hu | Ronald G. Addie | Vyacheslav Abramov
[1] Herbert Snyder. Double-Entry Bookkeeping. , 1999 .
[2] H. Zimmermann,et al. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.
[3] Walter Willinger,et al. On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.
[4] Matthias Gunkel,et al. Cost modeling and evaluation of capital expenditures in optical multilayer networks , 2008 .
[5] Moshe Zukerman,et al. Optimizing multi-layered networks towards a transparently optical internet , 2010, 2010 12th International Conference on Transparent Optical Networks.
[6] Moshe Zukerman,et al. Cost modelling and validation in network optimization , 2015, 2015 International Telecommunication Networks and Applications Conference (ITNAC).
[7] Michela Meo,et al. Research challenges on energy-efficient networking design , 2014, Comput. Commun..
[8] M. Zukerman,et al. A new teletraffic approach for network planning and evolution prediction , 2012, OFC/NFOEC.
[9] Moshe Zukerman,et al. Internet traffic modeling and future technology implications , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Moshe Zukerman,et al. Performance evaluation of a queue fed by a Poisson Pareto burst process , 2002, Comput. Networks.
[11] Adel F. Agamy,et al. A Survey on the Common Network Traffic Sources Models , 2011 .
[12] Michael Menth,et al. Greedy design of resilient multi-layer networks , 2010, 6th EURO-NGI Conference on Next Generation Internet.
[13] Sally Floyd,et al. Wide-area traffic: the failure of Poisson modeling , 1994 .
[14] Deep Medhi,et al. Routing, flow, and capacity design in communication and computer networks , 2004 .
[15] Moshe Zukerman,et al. NetML: Networking Networks , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.