[1]兰巨龙,程东年,胡宇翔.可重构信息通信基础网络体系研究[J].通信学报,2014,35(1):128-129.
[2]ANDERSEN D G.Theoretical approaches to node assignment[EB/OL].[2017-11-19].https://cn.bing.com/academic/profile?id=a88c86a2eec2e707794f3c7a57443f2c&encoded=0&v=paper_preview&mkt=zh-cn.
[3]毛宇星,郭云飞.基于资源区域聚集度的虚拟网映射算法[J].电子与信息学报,2015,37(10):2405-2410.
[4]CHENG X,SU S,ZHANG Z,et al.Virtual network embedding through topology-aware node ranking[J].ACM SIGCOMM Computer Communication Review,2011,41(2):38-47.
[5]QING S,LIAO J,WANG J,et al.Hybrid virtual network embedding with K-core decomposition and time-oriented priority[C]//Proceedings of 2012 IEEE International Conference on Communications.Washington D.C.,USA:IEEE Press,2012:2695-2699.
[6]GILL P,JAIN N,NAGAPPAN N.Understanding network failures in data centers:measurement,analysis,and implications[J].ACM SIGCOMM Computer Communication Review,2011,41(4):350-361.
[7]MARKOPOULOU A,IANNACCONE G,BHATTACHARYYA S,et al.Characterization of failures in an IP backbone[C]//Proceedings of 2004 IEEE Conference on Computer and Communications Societies.Washington D.C.,USA:IEEE Press,2004:2307-2317.
[8]GUO B,QIAO C,WANG J,et al.Survivable virtual network design and embedding to survive a facility node failure[J].Journal of Lightwave Technology,2014,32(3):483-493.
[9]HU Q,WANG Y,CAO X.Survivable network virtualization for single facility node failure:a network flow perspective[J].Optical Switching and Networking,2013,10(4):406-415.
[10]YU H,ANAND V,QIAO C,et al.Cost efficient design of survivable virtual infrastructure to recover from facility node failures[C]//Proceedings of 2011 IEEE International Conference on Communications.Washington D.C.,USA:IEEE Press,2011:1-6.
[11]CHANG X,MUPPALA J K,WANG B,et al.Migration cost aware virtual network re-embedding in presence of resource failures[C]//Proceedings of 2012 IEEE International Conference on Networks.Washington D.C.,USA:IEEE Press,2012:24-29.
[12]CAI Z,LIU F,XIAO N,et al.Virtual network embedding for evolving networks[C]//Proceedings of 2010 IEEE Global Telecommunications Conference.Washington D.C.,USA:IEEE Press,2010:1-5.
[13]RAHMAN M R,AIB I,BOUTABA R.Survivable virtual network embedding[C]//Proceedings of the 9th International Conference on Networking.Berlin,Germany:Springer,2010:40-52.
[14]OLIVEIRA R R,MARCON D S,BAYS L R,et al.No more backups:toward efficient embedding of survivable virtual networks[C]//Proceedings of 2013 IEEE Inter-national Conference on Communications.Washington D.C.,USA:IEEE Press,2013:2128-2132.
[15]XIE D,DING N,HU Y C,et al.The only constant is change:incorporating time-varying network reservations in data centers[J].ACM SIGCOMM Computer Communication Review,2012,42(4):199-210.
[16]EPPSTEIN D.Finding the k shortest paths[J].SIAM Journal on Computing,1998,28(2):652-673.
[17]CALVERT K L,BHATTACHARJEE S.How to model an internetwork[C]//Proceedings of IEEE INFOCOM.Washington D.C.,USA:IEEE Press,1996:594-602.
[18]MARKOPOULOU A,IANNACCONE G,BHATTACHARYYA S,et al.Characterization of failures in an operational IP backbone network[J].IEEE/ACM Transactions on Networking,2008,16(4):749-762.
[19]JIANG H,GONG L,ZUQING Z W.Efficient joint approaches for location-constrained survivable virtual network embedding[C]//Proceedings of 2014 IEEE Global Communications Conference.Washington D.C.,USA:IEEE Press,2014:1810-1815. |