2018
DOI: 10.1016/j.jnca.2018.02.022
|View full text |Cite
|
Sign up to set email alerts
|

Resilient virtual communication networks using multi-commodity flow based local optimal mapping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…I Bodrog et al [2] I Ali-Tolppa et al [25] I Karim et al [26] I Ahmad et al [27] I Tiwari et al [28] I Yang et al [29] I Al-juaifari et al [30] I Bothe et al [Bothe]…”
Section: Machine Learning and Artificial Intelligencementioning
confidence: 99%
See 2 more Smart Citations
“…I Bodrog et al [2] I Ali-Tolppa et al [25] I Karim et al [26] I Ahmad et al [27] I Tiwari et al [28] I Yang et al [29] I Al-juaifari et al [30] I Bothe et al [Bothe]…”
Section: Machine Learning and Artificial Intelligencementioning
confidence: 99%
“…The principal challenge of research into self-healing functionality on computer networks is the ability to achieve reliability, one of the three core characteristics of a self-healing system described [27,29]. A method was proposed based on utilising shared operation and spare nodes in each neural network layer to compensate for any faulty node and resolve the self-healing reliability challenge.…”
Section: Network Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…When using our strategy to accelerate convergence, the network can quickly reach a consensus. In [42,43], the authors explained the reasons for the fluctuations and the process of convergence through theoretical derivation, simple examples, and experimental proofs.…”
Section: Convergence Time Varies With Network Sizementioning
confidence: 99%
“…If there is a positive matching, the first matching result will provide the action to be conducted over the packet. Currently, three different actions are designed, useful in the context of the Edge-to-Core segment: DROP packet, L1 MIRROR packet and L2 REDI-RECT packet, allowing implementing several use cases such as selective monitoring [39], self-protection [40], intrusion response systems [41] and video optimization [21], among others. Returns the total of rules…”
Section: Match/action Stagementioning
confidence: 99%