[1] |
ANDERSON T , PETERSON L , SHENKER S . Overcoming the Internet impasse through virtualization[J]. Computer, 2005,38(4): 34-41.
|
[2] |
FEAMSTER N , GAO L , REXFORD J . How to lease the Internet in your spare time[J]. ACM SIGCOMM Computer Communication Review, 2007,37(1): 61-64.
|
[3] |
YU M , YI Y , REXFORD J . Rethinking virtual network embedding:substrate support for path splitting and migration[J]. ACM SIGCOMM Computer Communication Review, 2008,38(2): 17-29.
|
[4] |
CHOWDHURY N , RAHMAN M , BOUTABA R . Vineyard:virtual network embedding algorithms with coordinated node and link mapping[J].IEEE/ACM Transactions on Networking,2012,20(1):206–219. IEEE/ACM Transactions on Networking, 2012,20(1): 206-219.
|
[5] |
LISCHKA J , KARL H . A virtual network mapping algorithm based on subgraph isomorphism detection[A]. Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures[C]. 2009. 81-88.
|
[6] |
CHENG X , SU S , ZHANG Z . Virtual network embedding through topology-aware node ranking[J]. SIGCOMM Computer Communication Review, 2011,41(2): 38-47.
|
[7] |
MARKOPOULOU A , IANNACCONE G , BHATTACHARYYA S . Characterization of failures in an IP backbone[A]. Proceedings of INFOCOM 2004,the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies[C]. 2004. 2307-2317.
|
[8] |
GILL P , JAIN N , NAGAPPAN N . Understanding network failures in data centers:measurement,analysis,and implications[J]. Proc ACM SIGCOMM CCR, 2011,41(4): 350-361.
|
[9] |
LIU Y , TIPPER D , SIRIPONGWUTIKORN P . Approximating optimal spare capacity allocation by successive survivable routing[J]. IEEE/ACM Transactions on Networking, 2005,13(1): 198-211.
|
[10] |
RAMAMURTHY S , SAHASRABUDDHE L,MUKHERJEE.B . Survivable WDM mesh networks[J]. Journal of Lightwave Technology, 2003,21(4): 870-883.
|
[11] |
GUO T,WANG.N , MOESSNER K . Shared backup network provision for virtual network embedding[A]. Proceedings of IEEE ICC 2011[C]. 2011. 1-5.
|
[12] |
RAHMAN M , AIB I , BOUTABA R . Survivable virtual network embedding[A]. Proceedings of 9th IFIP TC 6 International Conference on Networking 2010[C]. 2010. 40-52.
|
[13] |
YU H , ANAND V , QIAO C . Cost efficient design of survivable virtual infrastructure to recover from facility node failures[A]. Proc IEEE ICC 2011[C]. 2011. 1-6.
|
[14] |
QIAO C , GUO B , HUANG S . A novel two-step approach to surviving facility failures[A]. Proceedings of in 2011 OFC/NFOEC[C]. 2011. 1-3.
|
[15] |
HU Q , WANG Y , CAO X . Location-constrained survivable network virtualization[A]. Proceedings of 35th IEEE SARNOFF[C]. 2012. 1-5.
|
[16] |
YEOW W , WESTPHAL C , KOZAT U . Designing and embedding reliable virtual infrastructures[A]. Proceedings of 2nd ACM SIGCOMM Workshop on VISA[C]. 2010. 33-40.
|
[17] |
Functional Safety of Electrical/Electronic/Programmable ElectronicSafety-Related Systems[S]. IEC 61508[C]. 2005.
|
[18] |
CROSS V , SUDKAMP T . Similarity and Compatibility in Fuzzy Set Theory:Assessment and Application[M]. New York: Physica-VerlagPress, 2002.
|
[19] |
Medeling topology of large Internetworks[EB/OL]. .
|
[20] |
GNU linear programming kit[EB/OL]. .
|
[21] |
BARABASIAND A L , ALBERT R . Emergence of scaling in random networks[J]. Science, 1999,286(5439): 509-520.
|