1. Allan D, Ashwood-Smith P, Bragg N, et al. Shortest path bridging: efficient control of larger Ethernet networks. IEEE Communications Magazine, 2010, 48(4): 128-135
2. Fedyk D, Ashwood-Smith P, Allan D, et al. IS-IS extensions supporting IEEE 802.1aq shortest path bridging. IETF RFC 6329. 2012: 29-40
3. Perlman R. Eastlake 3rd D, Dutt D, et al. Routing (RBridges): base protocol specification. IETF RFC 6325. 2011: 125-132
4. Tsao Y C, Hou T C. Bridge priority provisioning for maximizing equal cost shortest path availability. Proceedings of the IEEE 16th International Conference on High Performance Switching and Routing (HPSR’15), Jun 1-4, 2015, Budapest, Hungary. Piscataway, NJ, USA: IEEE, 2015: 6p
5. Amaral P, Bernardo L, Pinto P. Multipath policy routing using destination based hop-by-hop forwarding. Proceedings of the IEEE 21st International Conference on Network Protocols (ICNP’13), Oct 7-10, 2013, Goettingen, Germany. Piscataway, NJ, USA: IEEE, 2013: 6p
6. Amaral P, Bernardo L, Pinto P F, et al. An L2 policy based multipath fabric. Proceedings of the 2014 IEEE International Conference on Communications (ICC’14), Jun 10-14, 2014, Sydney, Australia. Piscataway, NJ, USA: IEEE, 2014: 3607-3613
7. Griffin T G, Gurney A J T. Increasing bisemigroups and algebraic routing. Proceedings of the 10th International Conference on Relations and Kleene Algebra in Computer Science and 5th International Conference on Applications of Kleene Algebra, (RelMiCS/AKA’08), Apr 7-11, 2008, Frauenwörth, Germany. LNCS 4988. Berlin, Germany: Springer-Verlag, 2008: 123-137
8. Yang S Q, Tian X D, Yu B T, et al. A matching model of mathematical expressions with FDS based index. International Journal of Machine Learning and Cybernetics, 2015, 6(6): 993-1004
9. Tso F P, Hamilton G, Weber R, et al. Longer is better: exploiting path diversity in data center networks. Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems (ICDCS’13), Jul 8-11, 2013, Philadelphia, PA, USA. Piscataway, NJ, USA: IEEE, 2013: 430-439
10. Aizawa A, Kohlhase M, Ounis I. NTCIR-10 math pilot task overview. Proceedings of the 10th NTCIR Conference, Jun 18-21, 2013, Tokyo, Japan. 2013: 654-661
11. Lu W C, Sahni S. Low power TCAMs for very large forwarding tables. IEEE Transactions on Networking, 2014, 18(3): 948-959
12. Border A, Mitzenmacher M. Using multiple hash functions to improve IP lookups. Proceedings of the 30th Annual Joint Conference of the IEEE Computer and Communications (INFOCOM’11), Apr 10-15, 2011, Shanghai, China. Piscataway, NJ, USA: IEEE, 2011: 1454-1463
13. Ning P, Cui Y, Reeves D S, et al. Techniques and tools for analyzing intrusion alerts. ACM Transactions on Information and System Security, 2014, 7(2): 274-318
14. Du K, Liu W L, Wang B J. Research on Chinese text clustering method based on semantic relevancy. Information Studies: Theory and Application, 2016, 39(2): 129-133 (in Chinese)
15. Leggieri V, Haouari M, Triki C. The steiner tree problem with delays: a compact formulation and reduction procedures. Discrete Applied Mathematics, 2014, 164(1): 178-190
16. Molnar M, Bellabas A, Lahoud S. The cost optimal solution of the multi-constrained multicast routing problem. Computer Networks, 2012, 56(13): 3136-3149
17. Lu T, Zhu J. Genetic algorithm for energy-efficient QoS multicast routing. IEEE Communications Letters, 2013, 17(1): 31-34
18. Liu Y, Han L G, Cai X S. A kernel density estimation based text classification algorithm. Advanced Science and Technology Letters, 2014, 78(9): 49-54
19. Mtonga K, Yoon E J, Kim H. A pairing based authentication and key establishment scheme for remote monitoring systems. Proceedings of the 5th International Conference on E-infrastructure and E-services for Developing Countries (AFRICOMM’13), Nov 25–27, 2013, Blantyre, Malawi. LNICST 135. Berlin, Germany: Springer-Verlag, 2014: 79-89
20. Singh U R, Singh K M, Roy S. Energy efficient key management analysis using AVL trees in wireless sensor network. International Journal of Engineering Science Invention, 2015, 21(4): 59-70 |