参考文献
[1]FISCHER A,BOTERO J F,BECK M T,et al.Virtual Network Embedding:A Survey[J].IEEE Comunications Surveys & Tutorials,2013,15(4):1888-1906.
[2]刘光远.可靠的虚拟网络映射算法研究[D].北京:北京邮电大学,2014.
[3]SEDDIKI M S,FRIKHA M,SONG Y Q.A Non-cooperative Game-theoretic Framework for Resource Allocation in Network Virtualization[J].Telecommunication Systems,2016,61(2):209-219.
[4]LI Hang,ZHOU Tianyang,WANG Qingxian.The Study of Dynamic Topology Remapping in Virtual Network Embedding[C]//Proceedings of International Conference on Information & Communication Technology Convergence.Washington D.C.,USA:IEEE Press,2015:95-98.
[5]孙罡.虚拟网络的映射技术研究[D].成都:电子科技大学,2012.
[6]徐鹏,李勇,金德鹏,等.改进的两阶段虚拟网映射算法[J].计算机工程,2012,38(5):79-82.
[7]ZHANG Zhongbao,SU Sen,ZHANG Junchi,et al.Energy Aware Virtual Network Embedding with Dynamic Demands[C]//Proceedings of IEEE International Conference on Communications.Washington D.C.,USA:IEEE Press,2015:5386-5391.
[8]彭利民.一种拓扑感知的虚拟网络重构算法[J].四川大学学报(工程科学版),2015,47(5):110-116.
[9]ZHOU Fanfu,MA Ruhui,LI Jian,et al.Optimizations for High Performance Network Virtualization[J].Journal of Computer Science and Technology,2016,31(1):107-116.
[10]RAHMAN M R,BOUTABA R.SVNE:Survivable Virtual Network Embedding Algorithms for Network Virtualization[J].IEEE Transactions on Network & Service Management,2013,10(2):105-118.
[11]陈青云.虚拟化环境下网络生存件方案设计与实现[D].北京:北京邮电大学,2014.
[12]龚水清,陈靖,黄聪会,等.信任感知的安全虚拟网络映射算法[J].通信学报,2015,36(11):180-189.
[13]KIM S,MA S,MOON J.A Novel Secure Architecture of the Virtualized Server System[J].The Journal of Supercomputing,2016,72(1):24-37.
[14]于会,刘尊,李勇军.基于多属性决策的复杂网络节点重要性综合评价方法[J].物理学报,2013,62(2).
[15]曲桦,赵季红,郭爽乐,等.基于最小代价的虚拟网络重配置方法[J].北京邮电大学学报,2014,37(5):114-118.
[16]余建军,吴春明.基于负载均衡的虚拟网映射随机算法[J].计算机科学,2014,41(6):69-74.
[17]彭利民.高效节能的虚拟网络重构算法[J].中山大学学报(自然科学版),2015,54(5):5-10.
[18]余建军,吴春明.基于二分图K优完美匹配的虚拟网映射算法设计[J].电信科学,2014,14(2):70-75.
[19]陈铎龙,孟相如,梁霄,等.复杂环境下网络抗毁性综合评估方法[J].计算机科学,2012,39(9):101-105.
编辑陆燕菲 |