-
1
-
-
84888365739
-
Virtual network embedding: A survey
-
Fourth Quarter
-
A. Fischer, J. F. Botero, M. T. Beck, H. de Meer, and X. Hesselbach, "Virtual network embedding: A survey," IEEE Communications Surveys and Tutorials, vol. 15, no. 4, pp. 1888-1903, Fourth Quarter 2013.
-
(2013)
IEEE Communications Surveys and Tutorials
, vol.15
, Issue.4
, pp. 1888-1903
-
-
Fischer, A.1
Botero, J.F.2
Beck, M.T.3
De Meer, H.4
Hesselbach, X.5
-
2
-
-
18144370444
-
Overcoming the internet impasse through virtualization
-
April
-
T. Anderson, L. Peterson, S. Shenker, and J. Turner, "Overcoming the internet impasse through virtualization," Computer, vol. 38, no. 4, pp. 34-41, April 2005.
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 34-41
-
-
Anderson, T.1
Peterson, L.2
Shenker, S.3
Turner, J.4
-
3
-
-
84899520065
-
Connectivity as a service: Towards optical-based network virtualization
-
Y. Wang, Q. Hu, and X. Cao, "Connectivity as a service: Towards optical-based network virtualization," in International Conference on Computing, Networking and Communciations'14, pp. 264-268.
-
International Conference on Computing, Networking and Communciations'14
, pp. 264-268
-
-
Wang, Y.1
Hu, Q.2
Cao, X.3
-
4
-
-
84876357755
-
How to lease the internet in your spare time
-
January
-
N. Feamster, L. Gao, and J. Rexford, "How to lease the internet in your spare time," ACM SIGCOMM Computer Communication Review, vol. 37, no. 1, pp. 61-64, January 2007.
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, Issue.1
, pp. 61-64
-
-
Feamster, N.1
Gao, L.2
Rexford, J.3
-
5
-
-
84883086265
-
Resolve the virtual network embedding problem: A column generation approach
-
Q. Hu, Y. Wang, and X. Cao, "Resolve the virtual network embedding problem: A column generation approach," in INFOCOM, 2013 Proceedings IEEE, pp. 410-414.
-
INFOCOM, 2013 Proceedings IEEE
, pp. 410-414
-
-
Hu, Q.1
Wang, Y.2
Cao, X.3
-
6
-
-
84872059581
-
Security-aware optimal resource allocation for virtual network embedding
-
L. R. Bays, R. R. Oliveira, L. S. Buriol, M. P. Barcellos, and L. P. Gaspary, "Security-aware optimal resource allocation for virtual network embedding," in 2012 Proceedings of the 8th International Conference on Network and Service Management, pp. 378-384.
-
2012 Proceedings of the 8th International Conference on Network and Service Management
, pp. 378-384
-
-
Bays, L.R.1
Oliveira, R.R.2
Buriol, L.S.3
Barcellos, M.P.4
Gaspary, L.P.5
-
7
-
-
84887282657
-
Virtual network with security guarantee embedding algorithms
-
November
-
C. Xing, J. Lan, and Y. Hu, "Virtual network with security guarantee embedding algorithms," Journal of Computers, vol. 8, no. 11, pp. 2782-2787, November 2013.
-
(2013)
Journal of Computers
, vol.8
, Issue.11
, pp. 2782-2787
-
-
Xing, C.1
Lan, J.2
Hu, Y.3
-
9
-
-
70349682522
-
Virtual network embedding with coordinated node and link mapping
-
April
-
N. K. Chowdhury, M. R. Rahman, and R. Boutaba, "Virtual network embedding with coordinated node and link mapping," in Proceedings of IEEE INFOCOM'09, April 2009, pp. 783-791.
-
(2009)
Proceedings of IEEE INFOCOM'09
, pp. 783-791
-
-
Chowdhury, N.K.1
Rahman, M.R.2
Boutaba, R.3
-
11
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in ACM workshop on Cloud computing security'09, pp. 85-90.
-
ACM Workshop on Cloud Computing security'09
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
12
-
-
84883080815
-
Adversarial vnet embeddings: A threat for isps?
-
Y.-A. Pignolet, S. Schmid, and G. Tredan, "Adversarial vnet embeddings: A threat for isps?" in INFOCOM, 2013 Proceedings IEEE, pp. 415-419.
-
INFOCOM, 2013 Proceedings IEEE
, pp. 415-419
-
-
Pignolet, Y.-A.1
Schmid, S.2
Tredan, G.3
-
13
-
-
74049152260
-
Hey, you, get off of my cloud! exploring information leakage in thirdparty compute clouds
-
S. Jha and A. Keromytis, Eds. ACM Press, Nov.
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud! Exploring information leakage in thirdparty compute clouds," in Proceedings of CCS 2009, S. Jha and A. Keromytis, Eds. ACM Press, Nov. 2009, pp. 199-212.
-
(2009)
Proceedings of CCS 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
14
-
-
84881317727
-
Position paper: Secure virtual network embedding
-
A. Fischer and H. D. Meer, "Position paper: Secure virtual network embedding," Praxis der Informationsverarbeitung und Kommunikation, vol. 34, no. 4, pp. 190-193, 2011.
-
(2011)
Praxis der Informationsverarbeitung und Kommunikation
, vol.34
, Issue.4
, pp. 190-193
-
-
Fischer, A.1
Meer, H.D.2
-
15
-
-
77953683060
-
A new approach to optical networks security: Attack-aware routing and wavelength assignment
-
June
-
N. Skorin-Kapov, J. Chen, and L. Wosinska, "A new approach to optical networks security: Attack-aware routing and wavelength assignment," IEEE/ACM Transactions on Networking, vol. 18, no. 3, pp. 750-760, June 2010.
-
(2010)
IEEE/ACM Transactions on Networking
, vol.18
, Issue.3
, pp. 750-760
-
-
Skorin-Kapov, N.1
Chen, J.2
Wosinska, L.3
-
19
-
-
84936944100
-
Integrity verification of k-means clustering outsourced to infrastructure as a service (iaas) providers
-
R. Liu, P. Mordohai, W. H. Wang, and H. Xiong, "Integrity verification of k-means clustering outsourced to infrastructure as a service (iaas) providers," in SIAM International Conference on Data Mining'13, pp. 632-640.
-
SIAM International Conference on Data Mining'13
, pp. 632-640
-
-
Liu, R.1
Mordohai, P.2
Wang, W.H.3
Xiong, H.4
|