-
1
-
-
70349682522
-
Virtual network embedding with coordinated node and link mapping
-
Apr.
-
N. M. M. K. Chowdhury, M. R. Rahman, and R. Boutaba, "Virtual network embedding with coordinated node and link mapping," in Proc. IEEE INFOCOM, Apr. 2009, pp. 783-791.
-
(2009)
Proc. IEEE INFOCOM
, pp. 783-791
-
-
Chowdhury, N.M.M.K.1
Rahman, M.R.2
Boutaba, R.3
-
2
-
-
18144370444
-
Overcoming the internet impasse through virtualization
-
DOI 10.1109/MC.2005.136
-
T. Anderson, L. Peterson, S. Shenker, and J. Turner, "Overcoming the internet impasse through virtualization," Computer, vol. 38, no. 4, pp. 34-41, 2005. (Pubitemid 40608424)
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 34-41
-
-
Anderson, T.1
Peterson, L.2
Shenker, S.3
Turner, J.4
-
3
-
-
33846560709
-
Diversifying the Internet
-
DOI 10.1109/GLOCOM.2005.1577741, 1577741, GLOBECOM'05: IEEE Global Telecommunications Conference, 2005
-
J. Turner and D. Taylor, "Diversifying the internet," in Proc. IEEE GLOBECOM, 2005, vol. 2, pp. 755-760. (Pubitemid 46171236)
-
(2005)
GLOBECOM - IEEE Global Telecommunications Conference
, vol.2
, pp. 755-760
-
-
Turner, J.S.1
Taylor, D.E.2
-
4
-
-
84876357755
-
Howto lease the internet in your spare time
-
N. Feamster, L.Gao, and J. Rexford, "Howto lease the internet in your spare time," Comput. Commun. Rev., vol. 37, no. 1, pp. 61-64, 2007.
-
(2007)
Comput. Commun. Rev.
, vol.37
, Issue.1
, pp. 61-64
-
-
Feamster, N.1
Gao, L.2
Rexford, J.3
-
5
-
-
77249132188
-
A survey of network virtualization
-
N. M. M. K. Chowdhury and R. Boutaba, "A survey of network virtualization," Comput. Netw., vol. 54, no. 5, pp. 862-876, 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.5
, pp. 862-876
-
-
Chowdhury, N.M.M.K.1
Boutaba, R.2
-
7
-
-
33750303852
-
In VINI veritas: Realistic and controlled network experimentation
-
DOI 10.1145/1151659.1159916
-
A. Bavier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, "In VINI veritas: Realistic and controlled network experimentation," in Proc. ACM SIGCOMM, 2006, pp. 3-14. (Pubitemid 44623711)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 3-14
-
-
Bavier, A.1
Feamster, N.2
Huang, M.3
Peterson, L.4
Rexford, J.5
-
9
-
-
0003421296
-
-
Ph.D. dissertation, MIT, Cambridge, MA
-
J. Kleinberg, "Approximation algorithms for disjoint paths problems," Ph.D. dissertation, MIT, Cambridge, MA, 1996.
-
(1996)
Approximation Algorithms for Disjoint Paths Problems
-
-
Kleinberg, J.1
-
10
-
-
0031372623
-
Improved approximation algorithms for unsplittable flow problems
-
S. Kolliopoulos and C. Stein, "Improved approximation algorithms for unsplittable flow problems," in Proc. IEEE FOCS, 1997, pp. 426-435.
-
(1997)
Proc. IEEE FOCS
, pp. 426-435
-
-
Kolliopoulos, S.1
Stein, C.2
-
11
-
-
37249048645
-
Dynamic topology configuration in service overlay networks-A study of reconfiguration policies
-
J. Fan and M. Ammar, "Dynamic topology configuration in service overlay networks-A study of reconfiguration policies," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Fan, J.1
Ammar, M.2
-
12
-
-
50149085414
-
-
Washington University, Seattle, WA, Tech. Rep. WUCSE
-
J. Lu and J. Turner, "Efficient mapping of virtual networks onto a shared substrate," Washington University, Seattle, WA, Tech. Rep. WUCSE-2006-35, 2006.
-
(2006)
Efficient Mapping of Virtual Networks onto A Shared Substrate
, pp. 2006-35
-
-
Lu, J.1
Turner, J.2
-
13
-
-
39049102574
-
Algorithms for assigning substrate network resources to virtual network components
-
Y. Zhu and M. Ammar, "Algorithms for assigning substrate network resources to virtual network components," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Zhu, Y.1
Ammar, M.2
-
14
-
-
58049142487
-
Rethinking virtual network embedding: Substrate support for path splitting and migration
-
Apr.
-
M. Yu, Y. Yi, J. Rexford, and M. Chiang, "Rethinking virtual network embedding: Substrate support for path splitting and migration," Comput. Commun. Rev., vol. 38, no. 2, pp. 17-29, Apr. 2008.
-
(2008)
Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 17-29
-
-
Yu, M.1
Yi, Y.2
Rexford, J.3
Chiang, M.4
-
16
-
-
0842332339
-
A multi-commodity flow based approach to virtual network resource allocation
-
W. Szeto, Y. Iraqi, and R. Boutaba, "A multi-commodity flow based approach to virtual network resource allocation," in Proc. IEEE GLOBECOM, 2003, pp. 3004-3008.
-
(2003)
Proc. IEEE GLOBECOM
, pp. 3004-3008
-
-
Szeto, W.1
Iraqi, Y.2
Boutaba, R.3
-
17
-
-
0032108018
-
Finding the shortest paths
-
D. Eppstein, "Finding the shortest paths," SIAM J. Comput., vol. 28, no. 2, pp. 652-673, 1998.
-
(1998)
SIAM J. Comput.
, vol.28
, Issue.2
, pp. 652-673
-
-
Eppstein, D.1
-
18
-
-
85046380112
-
A new polynomial-time algorithm for linear programming
-
N. Karmarkar, "A new polynomial-time algorithm for linear programming," in Proc. ACM STOC, 1984, pp. 302-311.
-
(1984)
Proc. ACM STOC
, pp. 302-311
-
-
Karmarkar, N.1
-
19
-
-
84857367254
-
-
GNU linear programming kit, Free Software Foundation, Boston, MA
-
"GNU linear programming kit," Free Software Foundation, Boston, MA, 2008 Online. Available: http://www.gnu.org/software/glpk/
-
(2008)
-
-
-
20
-
-
0029780013
-
How to model an internetwork
-
E. Zegura, K. Calvert, and S. Bhattacharjee, "How to model an internetwork," in Proc. IEEE INFOCOM, 1996, pp. 594-602.
-
(1996)
Proc. IEEE INFOCOM
, pp. 594-602
-
-
Zegura, E.1
Calvert, K.2
Bhattacharjee, S.3
-
22
-
-
0006628906
-
The power of two random choices: A survey of techniques and results
-
Norwell, MA: Kluwer
-
M. Mitzenmacher, A. W. Richa, and R. Sitaraman, "The power of two random choices: A survey of techniques and results," in Handbook of Randomized Computing. Norwell, MA: Kluwer, 2001, pp. 255-312.
-
(2001)
Handbook of Randomized Computing
, pp. 255-312
-
-
Mitzenmacher, M.1
Richa, A.W.2
Sitaraman, R.3
-
23
-
-
0001342825
-
On the influence of lookahead in competitive paging algorithms
-
S. Albers, "On the influence of lookahead in competitive paging algorithms," Algorithmica, vol. 18, no. 3, pp. 283-305, 1997.
-
(1997)
Algorithmica
, vol.18
, Issue.3
, pp. 283-305
-
-
Albers, S.1
-
24
-
-
84887443061
-
Online bin packing with lookahead
-
E. F.Grove, "Online bin packing with lookahead," in Proc. ACM-SIAM SODA, 1995, pp. 430-436.
-
(1995)
Proc. ACM-SIAM SODA
, pp. 430-436
-
-
Grove, E.F.1
-
26
-
-
0034832757
-
Provisioning a virtual private network: A network design problem for multicommodity flow
-
A. Gupta, J. M. Kleinberg, A. Kumar, R. Rastogi, and B. Yener, "Provisioning a virtual private network: A network design problem formulticommodity flow," in Proc. ACM STOC, 2001, pp. 389-398. (Pubitemid 32865755)
-
(2001)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 389-398
-
-
Gupta, A.1
Kleinberg, J.2
Kumar, A.3
Rastogi, R.4
Yener, B.5
-
27
-
-
0036805721
-
Resource management with hoses: Point-to-cloud services for virtual private networks
-
DOI 10.1109/TNET.2002.803918
-
N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. van der Merwe, "Resource management with hoses: Point-to-cloud services for virtual private networks," IEEE/ACM Trans. Netw., vol. 10, no. 5, pp. 679-692, Oct. 2002. (Pubitemid 35312145)
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.5
, pp. 679-692
-
-
Duffield, N.G.1
Goyal, P.2
Greenberg, A.3
Mishra, P.4
Ramakrishnan, K.K.5
Van Der Merwe, J.E.6
-
28
-
-
14944342953
-
Measurement based characterization and provisioning of IP VPNs
-
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
-
S. Raghunath, K. K. Ramakrishnan, S. Kalyanaraman, and C. Chase, "Measurement based characterization and provisioning of IP VPNs," in Proc. ACM IMC, 2004, pp. 342-355. (Pubitemid 40372062)
-
(2004)
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
, pp. 342-355
-
-
Raghunath, S.1
Ramakrishnan, K.K.2
Kalyanaraman, S.3
Chase, C.4
-
29
-
-
33645783000
-
A solver for the network testbed mapping problem
-
Apr.
-
R. Ricci, C. Alfeld, and J. Lepreau, "A solver for the network testbed mapping problem," Comput. Commun. Rev., vol. 33, no. 2, pp. 65-81, Apr. 2003.
-
(2003)
Comput. Commun. Rev.
, vol.33
, Issue.2
, pp. 65-81
-
-
Ricci, R.1
Alfeld, C.2
Lepreau, J.3
-
30
-
-
79251585299
-
Large-scale virtualization in the Emulab network testbed
-
M. Hibler, R. Ricci, L. Stoller, J. Duerig, S. Guruprasad, T. Stack, K. Webb, and J. Lepreau, "Large-scale virtualization in the Emulab network testbed," in Proc. USENIX ATC, 2008, pp. 113-128.
-
(2008)
Proc. USENIX ATC
, pp. 113-128
-
-
Hibler, M.1
Ricci, R.2
Stoller, L.3
Duerig, J.4
Guruprasad, S.5
Stack, T.6
Webb, K.7
Lepreau, J.8
-
31
-
-
84987799496
-
A virtual network mapping algorithm based on subgraph isomorphism detection
-
J. Lischka and H. Karl, "A virtual network mapping algorithm based on subgraph isomorphism detection," in Proc. ACM VISA, 2009, pp. 81-88.
-
(2009)
Proc. ACM VISA
, pp. 81-88
-
-
Lischka, J.1
Karl, H.2
-
32
-
-
51249093108
-
A distributed virtual network mapping algorithm
-
I. Houidi,W. Louati, and D. Zeghlache, "A distributed virtual network mapping algorithm," in Proc. IEEE ICC, 2008, pp. 5634-5640.
-
(2008)
Proc. IEEE ICC
, pp. 5634-5640
-
-
Houidiw. Louati, I.1
Zeghlache, D.2
-
33
-
-
77953244221
-
Survivable virtual network embedding
-
M. R. Rahman, I. Aib, and R. Boutaba, "Survivable virtual network embedding," in Proc. IFIP Netw., 2010, pp. 40-52.
-
(2010)
Proc. IFIP Netw.
, pp. 40-52
-
-
Rahman, M.R.1
Aib, I.2
Boutaba, R.3
-
34
-
-
78649283787
-
Designing and embedding reliable virtual infrastructures
-
W.-L. Yeow, C. Westphal, and U. Kozat, "Designing and embedding reliable virtual infrastructures," in Proc. ACM VISA, 2010, pp. 33-40.
-
(2010)
Proc. ACM VISA
, pp. 33-40
-
-
Yeow, W.-L.1
Westphal, C.2
Kozat, U.3
-
35
-
-
77953283209
-
Topology-awareness and reoptimization mechanism for virtual network embedding
-
N. F. Butt, M. Chowdhury, and R. Boutaba, "Topology-awareness and reoptimization mechanism for virtual network embedding," in Proc. IFIP Netw., 2010, pp. 27-39.
-
(2010)
Proc. IFIP Netw.
, pp. 27-39
-
-
Butt, N.F.1
Chowdhury, M.2
Boutaba, R.3
-
36
-
-
0036671117
-
Algorithms for provisioning virtual private networks in the hose model
-
DOI 10.1109/TNET.2002.802141, PII 1011092002802141
-
A. Kumar, R. Rastogi, A. Silberschatz, and B. Yener, "Algorithms for provisioning virtual private networks in the hose model," IEEE/ACM Trans. Netw., vol. 10, no. 4, pp. 565-578, Aug. 2002. (Pubitemid 35000398)
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.4
, pp. 565-578
-
-
Kumar, A.1
Rastogi, R.2
Silberschatz, A.3
Yener, B.4
-
37
-
-
51249173817
-
Randomized rounding: A technique for provably good algorithms and algorithmic proofs
-
P. Raghavan and C. D. Tompson, "Randomized rounding: A technique for provably good algorithms and algorithmic proofs," Combinatorica, vol. 7, no. 4, pp. 365-374, 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 365-374
-
-
Raghavan, P.1
Tompson, C.D.2
-
38
-
-
0345868940
-
A competitive analysis of the list update problem with lookahead
-
PII S0304397597000261
-
S. Albers, "A competitive analysis of the list update problem with lookahead," Theor. Comput. Sci., vol. 197, no. 1-2, pp. 95-109, 1998. (Pubitemid 128459966)
-
(1998)
Theoretical Computer Science
, vol.197
, Issue.1-2
, pp. 95-109
-
-
Albers, S.1
-
39
-
-
78649297372
-
PolyViNE: Policy-based virtual network embedding across multiple domains
-
M. Chowdhury, F. Samuel, and R. Boutaba, "PolyViNE: Policy-based virtual network embedding across multiple domains," in Proc. ACM VISA, 2010, pp. 49-56.
-
(2010)
Proc. ACM VISA
, pp. 49-56
-
-
Chowdhury, M.1
Samuel, F.2
Boutaba, R.3
|