2016 12th International Conference on Computational Intelligence and Security (CIS) 2016
DOI: 10.1109/cis.2016.0073
|View full text |Cite
|
Sign up to set email alerts
|

Security-Aware Routing and Core Allocation in Elastic Optical Network with Multi-core

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…Different from all the mentioned references that use heuristic algorithms for solving the RSCA problem, Refs. [9][10][11][12] proposed a corresponding intelligent algorithm that is based on some optimization and guidance mechanisms, and the obtained solutions are better than those resulting from heuristic algorithms. Concisely, these articles first established the mathematical model of the RSCA problem, then designed a reasonable chromosome coding scheme, and finally used a genetic algorithm to evolve the population to obtain the optimal solution.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Different from all the mentioned references that use heuristic algorithms for solving the RSCA problem, Refs. [9][10][11][12] proposed a corresponding intelligent algorithm that is based on some optimization and guidance mechanisms, and the obtained solutions are better than those resulting from heuristic algorithms. Concisely, these articles first established the mathematical model of the RSCA problem, then designed a reasonable chromosome coding scheme, and finally used a genetic algorithm to evolve the population to obtain the optimal solution.…”
Section: Related Workmentioning
confidence: 99%
“…Equation (9) ensures that the source and destination nodes of the generated request r k cannot be the same. Equation (10) means that each request r k can only select one path from its candidate path set P r k for use.…”
Section: Constraintsmentioning
confidence: 99%
See 2 more Smart Citations
“…Results indicate that sequential heuristic combined with an appropriate ordering can give near-optimal solutions in low running times. In addition, according to [1], although meta-heuristics are widely used to solve resource allocation problems in SDM (such as [18], [36]- [38]), heuris-tics are extensively used too ( [16]- [18], [32], [36], [37], [39]- [42]). Heuristic solutions for the RMLSSA problem are usually solved in sequential stages [5], [31].…”
Section: Introductionmentioning
confidence: 99%