Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 265-269.
Previous Articles Next Articles
YANG Xu,QIU Han,ZHU Jun-hu and WANG Qing-xian
[1] Donnet B.et al.Internet Topology Discovery[M]//Data Traffic Monitoring and Analysis.Berlin Heidelberg:Springer,2013:44-81 [2] Donnet B,Friedman T.Internet Topology iscovery:a Survey[J].Communications Surveys & Tutorials,IEEE,2007,9(4):2-15 [3] 张宏莉,方滨兴,胡铭曾,等.Internet测量与分析综述[J].软件学报,2003,4(1):110-116 [4] 庄锁法.网络拓扑发现综述[J].计算机技术与发展,2007,0(17):80-83 [5] Chen M,Xu M,Xu K.A Delay-Guiding Source Selection Method in Network Topology Discovery[C]∥2011IEEE International Conference on Communications (ICC).2011:1-6 [6] King A J.Efficient Internet Topology Discovery Techniques[D].The University of Waikato,2010 [7] Dall’Asta L,Alvarez-Hamelin I,Barrat A,et al.Exploring networks with traceroute-like probes:theory and simulations[J]. Theoretical Computer Science,2006,355(6):6-24 [8] Han WXu K.A method for placing traceroute-like topology discovery instrumentation[C]∥11th Proceedings International Conference on Communication Systems(ICCS 2008).IEEE,2008 [9] Zou X,Qiao Z,Zhou G,et al.A logic distance-based method for deploying probing sources in the topology discovery[C]∥IEEE GLOBECOM.2009 [10] 行文训,谢金星.现代优化计算方法(第2版)[M].北京:清华大学出版社,2005 [11] 包海龙.基于混合遗传-模拟退火算法的多目标电网规划[D].上海:上海交通大学,2000 [12] CAIDA Skitter tool.http://www.caida.org/tools/measurement/skitter/ |
No related articles found! |
|