-
1
-
-
1342329442
-
Shareability in optical networks: Beyond bandwidth optimization
-
10.1109/MCOM.2003.1267096
-
Ali, M. (2004). Shareability in optical networks: beyond bandwidth optimization. IEEE Optical Communications, 42(2), s11-s15.
-
(2004)
IEEE Optical Communications
, vol.42
, Issue.2
-
-
Ali, M.1
-
3
-
-
0036157093
-
Engineering end-to-end resilience using resilience differentiated QoS
-
10.1109/35.978049
-
Autenrieth, A., & Kirstaedler, A. (2002). Engineering end-to-end resilience using resilience differentiated QoS. IEEE Communications Magazine, 40(1), 50-57.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.1
, pp. 50-57
-
-
Autenrieth, A.1
Kirstaedler, A.2
-
4
-
-
25144514330
-
Anycasting adversarial systems: Routing and admission control
-
2719 Springer Berlin
-
Awerbuch, B., Brinkmann, A., & Scheideler, C. (2003). Anycasting adversarial systems: routing and admission control. In LNCS: Vol. 2719 (pp. 1153-1168). Berlin: Springer.
-
(2003)
LNCS
, pp. 1153-1168
-
-
Awerbuch, B.1
Brinkmann, A.2
Scheideler, C.3
-
5
-
-
0038483826
-
Emergence of scaling in random networks
-
10.1126/science.286.5439.509
-
Barabási, A.-L., & Albert, R. (1999). Emergence of scaling in random networks. Science, 286, 509-511.
-
(1999)
Science
, vol.286
, pp. 509-511
-
-
Barabási, A.-L.1
Albert, R.2
-
6
-
-
51749105345
-
-
(Technical report-EMIS-03). Southern Methodist University, Dallas, USA
-
Barr, R. S., & Kingsley, M. S. (2003). Grooming telecommunications networks: optimization models and methods (Technical report-EMIS-03). Southern Methodist University, Dallas, USA, 1-27.
-
(2003)
Grooming Telecommunications Networks: Optimization Models and Methods
, pp. 1-27
-
-
Barr, R.S.1
Kingsley, M.S.2
-
8
-
-
4344639608
-
Fast optical layer mesh protection using pre-cross connected trails
-
10.1109/TNET.2004.828951
-
Chow, T. Y., Chudak, F., & Ffrench, A. M. (2004). Fast optical layer mesh protection using pre-cross connected trails. IEEE/ACM Transactions on Networking, 12(3), 539-548.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.3
, pp. 539-548
-
-
Chow, T.Y.1
Chudak, F.2
Ffrench, A.M.3
-
9
-
-
34147120474
-
A note on two problems in connection with graphs
-
10.1007/BF01386390
-
Dijkstra, E. (1959). A note on two problems in connection with graphs. Numerische Mathematik, 1, 269-271.
-
(1959)
Numerische Mathematik
, vol.1
, pp. 269-271
-
-
Dijkstra, E.1
-
10
-
-
77957282101
-
-
arXiv:cond-mat/0205232, v2 10 Oct. 2002
-
Goh, K.-I., Oh, E. S., Jeong, H., Kahng, B., & Kim, D. (2002). Classification of scale free networks. arXiv:cond-mat/0205232, v2 10 Oct. 2002.
-
(2002)
Classification of Scale Free Networks
-
-
Goh, K.-I.1
Oh, E.S.2
Jeong, H.3
Kahng, B.4
Kim, D.5
-
11
-
-
0031628329
-
Cycle-oriented distributed preconfiguration: Ring-like speed with mesh-like capacity for self-planning network restoration
-
1
-
Grover, W. D., & Stamatelakis, D. (1998). Cycle-oriented distributed preconfiguration: ring-like speed with mesh-like capacity for self-planning network restoration. In Proc. IEEE ICC'98 (Vol. 1, pp. 537-543).
-
(1998)
Proc. IEEE ICC'98
, pp. 537-543
-
-
Grover, W.D.1
Stamatelakis, D.2
-
12
-
-
1642537613
-
Shared protection in mesh WDM
-
Ho, P.-H., & Mouftah, H. T. (2004). Shared protection in mesh WDM. Networks, 42(1), 70-76.
-
(2004)
Networks
, vol.42
, Issue.1
, pp. 70-76
-
-
Ho, P.-H.1
Mouftah, H.T.2
-
14
-
-
54249117282
-
Heuristic algorithms for the generalized routing and wavelength assignment problem
-
Hyytia, E. (2004). Heuristic algorithms for the generalized routing and wavelength assignment problem. In Proceedings of 17th Nordic teletraffic seminar NTS-17 (pp. 373-386).
-
(2004)
Proceedings of 17th Nordic Teletraffic Seminar NTS-17
, pp. 373-386
-
-
Hyytia, E.1
-
16
-
-
84879605331
-
PWCE design in survivable WDM networks using unrestricted shape p-structure patterns
-
Jaumard, B., & Sebbah, S. (2009). PWCE design in survivable WDM networks using unrestricted shape p-structure patterns. In Proc. IEEE Sarnoff'09 (pp. 1-5).
-
(2009)
Proc. IEEE Sarnoff'09
, pp. 1-5
-
-
Jaumard, B.1
Sebbah, S.2
-
17
-
-
51249083911
-
Availability-constrained multipath protection in backbone networks with double-link failure
-
Ma, H., Fayek, D., & Ho, P.-H. (2008). Availability-constrained multipath protection in backbone networks with double-link failure. In Proc. IEEE ICC'08 (pp. 158-164).
-
(2008)
Proc. IEEE ICC'08
, pp. 158-164
-
-
Ma, H.1
Fayek, D.2
Ho, P.-H.3
-
19
-
-
77950639748
-
K-Penalty: A novel approach to find k-disjoint paths with differentiated path costs
-
10.1109/LCOMM.2010.04.091597
-
Rak, J. (2010). k-Penalty: a novel approach to find k-disjoint paths with differentiated path costs. IEEE Communications Letters, 14(4), 354-356.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.4
, pp. 354-356
-
-
Rak, J.1
-
20
-
-
40749105297
-
Dual-link failure resiliency through backup link mutual exclusion
-
10.1109/TNET.2007.900368
-
Ramasubramanian, S., & Chandak, A. (2008). Dual-link failure resiliency through backup link mutual exclusion. IEEE/ACM Transactions on Networking, 16(1), 157-169.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.1
, pp. 157-169
-
-
Ramasubramanian, S.1
Chandak, A.2
-
23
-
-
1942488295
-
The rich-club phenomenon in the Internet topology
-
10.1109/LCOMM.2004.823426
-
Zhou, S., & Mondragón, R. J. (2004). The rich-club phenomenon in the Internet topology. IEEE Communications Letters, 8(3), 180-182.
-
(2004)
IEEE Communications Letters
, vol.8
, Issue.3
, pp. 180-182
-
-
Zhou, S.1
Mondragón, R.J.2
|