-
1
-
-
0034721164
-
Error and attack tolerance of complex networks
-
R. Albert, H. Jeong, and A.-L. Barabási, "Error and attack tolerance of complex networks," Nature, no. 406, pp. 378-382, 2000.
-
(2000)
Nature
, Issue.406
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabási, A.-L.3
-
2
-
-
0035681653
-
A simple conceptual model for the Internet topology
-
Nov.
-
S. Tauro, C. Palmer, G. Siganos, and M. Faloutsos, "A simple conceptual model for the Internet topology," in Proc. IEEE GLOBECOM, Nov. 2001, pp. 1667-1671.
-
(2001)
Proc. IEEE GLOBECOM
, pp. 1667-1671
-
-
Tauro, S.1
Palmer, C.2
Siganos, G.3
Faloutsos, M.4
-
3
-
-
0035171853
-
Internet topology: Connectivity of IP graphs
-
Denver, CO, Aug.
-
A. Broido and K. Claffy, "Internet topology: Connectivity of IP graphs," in Proc. SPIE ITCom, Denver, CO, Aug. 2001.
-
(2001)
Proc. SPIE ITCom
-
-
Broido, A.1
Claffy, K.2
-
4
-
-
3042574010
-
The connectivity and fault-tolerance of the Internet topology
-
Santa Barbara, CA, May
-
C. Palmer, G. Siganos, M. Faloutsos, C. Faloutsos, and P. Gibbons, "The connectivity and fault-tolerance of the Internet topology," in Proc. ACM SIGMOD/PODS Workshop on Network-Related Data Management (NRDM), Santa Barbara, CA, May 2001.
-
(2001)
Proc. ACM SIGMOD/PODS Workshop on Network-Related Data Management (NRDM)
-
-
Palmer, C.1
Siganos, G.2
Faloutsos, M.3
Faloutsos, C.4
Gibbons, P.5
-
6
-
-
84992267980
-
Mapping the Internet
-
Apr.
-
H. Burch and B. Cheswick, "Mapping the Internet," IEEE Comput., vol. 32, pp. 97-98, Apr. 1999.
-
(1999)
IEEE Comput.
, vol.32
, pp. 97-98
-
-
Burch, H.1
Cheswick, B.2
-
7
-
-
0033204106
-
On power-law relationships of the Internet topology
-
Cambridge, MA, Aug.
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the Internet topology," in Proc. Conf. Applications, Technologies, Architectures, Protocols for Computer Communication, Computer Communication Review (ACM SIGCOMM), vol. 29, Cambridge, MA, Aug. 1999, pp. 251-262.
-
(1999)
Proc. Conf. Applications, Technologies, Architectures, Protocols for Computer Communication, Computer Communication Review (ACM SIGCOMM)
, vol.29
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
8
-
-
33744908559
-
Network topology generators: Degree-based vs. structural
-
Pittsburgh, PA, Aug.
-
H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, "Network topology generators: Degree-based vs. structural," in Proc. Conf. Applications, Technologies, Architectures, Protocols for Computer Communications (ACM SIGCOMM), Pittsburgh, PA, Aug. 2002, pp. 147-159.
-
(2002)
Proc. Conf. Applications, Technologies, Architectures, Protocols for Computer Communications (ACM SIGCOMM)
, pp. 147-159
-
-
Tangmunarunkit, H.1
Govindan, R.2
Jamin, S.3
Shenker, S.4
Willinger, W.5
-
9
-
-
4243939794
-
Network robustness and fragility: Percolation on random graphs
-
D. S. C. nad, M. E. J. Newman, S. H. Strogatz, and D. J. Watts, "Network robustness and fragility: Percolation on random graphs," Phys. Rev. Lett., no. 85, pp. 5468-5471, 2000.
-
(2000)
Phys. Rev. Lett.
, Issue.85
, pp. 5468-5471
-
-
Nad, D.S.C.1
Newman, M.E.J.2
Strogatz, S.H.3
Watts, D.J.4
-
10
-
-
0035896667
-
Breakdown of the Internet under intentional attack
-
R. Cohen, K. Erez, D. ben Avraham, and S. Havlin, "Breakdown of the Internet under intentional attack," Phys. Rev. Lett., no. 86, pp. 3682-3685, 2001.
-
(2001)
Phys. Rev. Lett.
, Issue.86
, pp. 3682-3685
-
-
Cohen, R.1
Erez, K.2
Ben Avraham, D.3
Havlin, S.4
-
11
-
-
41349120887
-
Attack vulnerability of complex networks
-
P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han, "Attack vulnerability of complex networks," Phys. Rev., no. E 65, 2002.
-
(2002)
Phys. Rev.
, Issue.E 65
-
-
Holme, P.1
Kim, B.J.2
Yoon, C.N.3
Han, S.K.4
-
12
-
-
0035420732
-
Random graphs with arbitrary degree distributions and their applications
-
M. E. J. Newman, S. H. Strogatz, and D. J. Watts, "Random graphs with arbitrary degree distributions and their applications," Phys. Rev., no. E 64, 2001.
-
(2001)
Phys. Rev.
, Issue.E 64
-
-
Newman, M.E.J.1
Strogatz, S.H.2
Watts, D.J.3
-
13
-
-
41349120185
-
Percolation critical exponents in scale-free networks
-
R. Cohen, D. ben Avraham, and S. Havlin, "Percolation critical exponents in scale-free networks," Phys. Rev., no. E 66, 2002.
-
(2002)
Phys. Rev.
, Issue.E 66
-
-
Cohen, R.1
Ben Avraham, D.2
Havlin, S.3
-
14
-
-
0039770638
-
-
Univ. Oregon, Advanced Network Technology Center, Eugene, OR. [Online]
-
BGP data from route-views. Univ. Oregon, Advanced Network Technology Center, Eugene, OR. [Online]. Available: http://www.route-views.org/
-
BGP Data From Route-views
-
-
-
15
-
-
0035012691
-
The impact of routing policy on Internet paths
-
Apr.
-
H. Tangmunarunkit, R. Govindan, S. Shenker, and D. Estrin, "The impact of routing policy on Internet paths," Proc. IEEE INFOCOM, pp. 736-742, Apr. 2001.
-
(2001)
Proc. IEEE INFOCOM
, pp. 736-742
-
-
Tangmunarunkit, H.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
16
-
-
0035167799
-
Inferring as-level Internet topology from router-level path traces
-
Denver, CO, Aug.
-
H. Chang, S. Jamin, and W. Willinger, "Inferring as-level Internet topology from router-level path traces," in Proc. SPIE ITCom, Denver, CO, Aug. 2001.
-
(2001)
Proc. SPIE ITCom
-
-
Chang, H.1
Jamin, S.2
Willinger, W.3
-
17
-
-
0003247246
-
A border gateway protocol 4 (BGP-4)
-
Internet Engineering Task Force
-
Y. Rekhter and T. Li, "A border gateway protocol 4 (BGP-4)," Internet Engineering Task Force, Request For Comments 1771, 1995.
-
(1995)
Request for Comments
, vol.1771
-
-
Rekhter, Y.1
Li, T.2
-
18
-
-
0036967399
-
On characterizing BGP routing table growth
-
Nov.
-
T. Bu, L. Gao, and D. Towsley, "On characterizing BGP routing table growth," Proc. IEEE Global Telecommunications Conf. (GLOBECOMM), pp. 2197-2201, Nov. 2002.
-
(2002)
Proc. IEEE Global Telecommunications Conf. (GLOBECOMM)
, pp. 2197-2201
-
-
Bu, T.1
Gao, L.2
Towsley, D.3
-
19
-
-
1542330215
-
Topology and routing: On the marginal utility of network topology measurements
-
Nov.
-
P. Barford, A. Bestavros, J. Byers, and M. Crovella, "Topology and routing: On the marginal utility of network topology measurements," in Proc. 1st ACM SIGCOMM Workshop on Internet Measurement, Nov. 2001, pp. 5-17.
-
(2001)
Proc. 1st ACM SIGCOMM Workshop on Internet Measurement
, pp. 5-17
-
-
Barford, P.1
Bestavros, A.2
Byers, J.3
Crovella, M.4
-
20
-
-
0036346132
-
The origin of power laws in Internet topologies revisited
-
June
-
Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, "The origin of power laws in Internet topologies revisited," Proc. IEEE INFOCOM, pp. 608-617, June 2002.
-
(2002)
Proc. IEEE INFOCOM
, pp. 608-617
-
-
Chen, Q.1
Chang, H.2
Govindan, R.3
Jamin, S.4
Shenker, S.5
Willinger, W.6
-
21
-
-
0043186292
-
Does as size determine degree in as topology?
-
H. Tangmunarunkit, J. Doyle, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, "Does as size determine degree in as topology?," ACM Comput. Commun. Rev., vol. 31, 2001.
-
(2001)
ACM Comput. Commun. Rev.
, vol.31
-
-
Tangmunarunkit, H.1
Doyle, J.2
Govindan, R.3
Jamin, S.4
Shenker, S.5
Willinger, W.6
-
22
-
-
0036349136
-
On distinguishing between Internet power law topology generators
-
June
-
T., Bu and D. Towsley, "On distinguishing between Internet power law topology generators," Proc. IEEE INFOCOM, pp. 638-647, June 2002.
-
(2002)
Proc. IEEE INFOCOM
, pp. 638-647
-
-
Bu, T.1
Towsley, D.2
-
23
-
-
0005257954
-
-
Univ. Michigan, Ann Arbor
-
MIH, Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, "Toward capturing representative as-level internet topologies," Univ. Michigan, Ann Arbor, 2002.
-
(2002)
Toward Capturing Representative As-level Internet Topologies
-
-
Chang, M.I.H.1
Govindan, R.2
Jamin, S.3
Shenker, S.4
Willinger, W.5
-
24
-
-
0042685225
-
Rip-2 md5 authentication
-
Internet Engineering Task Force
-
F. Baker and R. Atkinson, "Rip-2 md5 Authentication," Internet Engineering Task Force, Request For Comments 2082, 1997.
-
(1997)
Request for Comments
, vol.2082
-
-
Baker, F.1
Atkinson, R.2
-
25
-
-
0038059502
-
OSPF with digital signatures
-
Internet Engineering Task Force
-
S. Murphy, M. Badger, and B. Wellington, "OSPF with digital signatures," Internet Engineering Task Force, Request For Comments 2154, 1997.
-
(1997)
Request for Comments
, vol.2154
-
-
Murphy, S.1
Badger, M.2
Wellington, B.3
-
26
-
-
0342446307
-
Protection of BGP sessions via the TCP MD5 signature option
-
Internet Engineering Task Force
-
A. Heffernan, "Protection of BGP sessions via the TCP MD5 signature option," Internet Engineering Task Force, Request For Comments 2385, 1998.
-
(1998)
Request for Comments
, vol.2385
-
-
Heffernan, A.1
-
27
-
-
0003780715
-
-
Reading, MA: Addison-Wesley
-
F. Harary, Graph Theory, Reading, MA: Addison-Wesley, 1969.
-
(1969)
Graph Theory
-
-
Harary, F.1
-
28
-
-
0035481566
-
IDMaps: A global Internet host distance estimation service
-
Oct.
-
P. Francis, S. Jamin, C. Jin, Y. Jin, D. Raz, Y. Shavitt, and L. Zhang, "IDMaps: A global Internet host distance estimation service," IEEE/ ACM Trans. Networking, vol. 9, pp. 525-540, Oct. 2001.
-
(2001)
IEEE/ACM Trans. Networking
, vol.9
, pp. 525-540
-
-
Francis, P.1
Jamin, S.2
Jin, C.3
Jin, Y.4
Raz, D.5
Shavitt, Y.6
Zhang, L.7
-
31
-
-
0043186283
-
-
Telcordia Technologies, Holmdel, NJ. [Online]
-
NetSizer: Internet growth forecasting tool. Telcordia Technologies, Holmdel, NJ. [Online]. Available: http://www.netsizer.com/
-
NetSizer: Internet Growth Forecasting Tool
-
-
-
32
-
-
0036736290
-
Constrained mirror placement on the Internet
-
Sept.
-
E. Cronin, S. Jamin, C. Jin, A. Kurc, D. Raz, and Y. Shavitt, "Constrained mirror placement on the Internet," IEEE J. Select. Areas Commun., vol. 7, pp. 1369-1382, Sept. 2002.
-
(2002)
IEEE J. Select. Areas Commun.
, vol.7
, pp. 1369-1382
-
-
Cronin, E.1
Jamin, S.2
Jin, C.3
Kurc, A.4
Raz, D.5
Shavitt, Y.6
|