Assignment of Virtual Networks to Substrate Network for Software Defined Networks

作者: Ali Akbar Nasiri , Farnaz Derakhshan

DOI: 10.4018/IJCAC.2018100103

关键词:

摘要:

参考文章(29)
Fangjin Zhu, Hua Wang, A modified ACO algorithm for virtual network embedding based on graph decomposition Computer Communications. ,vol. 80, pp. 1- 15 ,(2016) , 10.1016/J.COMCOM.2015.07.014
Mosharaf Chowdhury, Muntasir Raihan Rahman, Raouf Boutaba, ViNEYard: virtual network embedding algorithms with coordinated node and link mapping IEEE ACM Transactions on Networking. ,vol. 20, pp. 206- 219 ,(2012) , 10.1109/TNET.2011.2159308
Bing Wang, Yao Zheng, Wenjing Lou, Y. Thomas Hou, DDoS attack protection in the era of cloud computing and Software-Defined Networking Computer Networks. ,vol. 81, pp. 308- 319 ,(2015) , 10.1016/J.COMNET.2015.02.026
Gang Sun, Hongfang Yu, Vishal Anand, Lemin Li, A cost efficient framework and algorithm for embedding dynamic virtual network requests Future Generation Computer Systems. ,vol. 29, pp. 1265- 1277 ,(2013) , 10.1016/J.FUTURE.2012.08.002
Mehmet Demirci, Mostafa Ammar, Design and analysis of techniques for mapping virtual networks to software-defined network substrates Computer Communications. ,vol. 45, pp. 1- 10 ,(2014) , 10.1016/J.COMCOM.2014.03.008
Xiuming Mi, Xiaolin Chang, Jiqiang Liu, Longmei Sun, Bin Xing, Embedding Virtual Infrastructure Based on Genetic Algorithm parallel and distributed computing: applications and technologies. pp. 239- 244 ,(2012) , 10.1109/PDCAT.2012.71
Huang Tao, Liu Jiang, Chen Jianya, Liu Yunjie, A topology-cognitive algorithm framework for virtual network embedding problem China Communications. ,vol. 11, pp. 73- 84 ,(2014) , 10.1109/CC.2014.6827570
Pan Yang, Xiaolin Gui, Jian An, Jing Yao, Jiancai Lin, Feng Tian, A retrievable data perturbation method used in privacy-preserving in cloud computing China Communications. ,vol. 11, pp. 73- 84 ,(2014) , 10.1109/CC.2014.6911090
Anupam Gupta, Jon Kleinberg, Amit Kumar, Rajeev Rastogi, Bulent Yener, Provisioning a virtual private network Proceedings of the thirty-third annual ACM symposium on Theory of computing - STOC '01. pp. 389- 398 ,(2001) , 10.1145/380752.380830