Secure overlay network design
Saved in:
Published in | Lecture notes in computer science pp. 354 - 366 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
New York
Springer
2006
Berlin |
Subjects | |
Online Access | Get full text |
ISBN | 3540351574 9783540351573 |
ISSN | 0302-9743 |
Cover
Loading…
Author | LI LI MIRROKNI, Vahab S MAHDIAN, Mohammad |
---|---|
Author_xml | – sequence: 1 surname: LI LI fullname: LI LI organization: Bell Laboratories, United States – sequence: 2 givenname: Mohammad surname: MAHDIAN fullname: MAHDIAN, Mohammad organization: Microsoft Research, United States – sequence: 3 givenname: Vahab S surname: MIRROKNI fullname: MIRROKNI, Vahab S organization: MIT Computer Science and Artificial Intelligence Lab, United States |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19911498$$DView record in Pascal Francis |
BookMark | eNotzMtKAzEUgOGAFWxrH0GYjcuBZHJOLksp3qDQhbouJ8mJjI4zQ1KVvr2C_ptv96_EYpxGPhMrjSA1KrSwEEupZdd6C_pCbGp9k79pZRSYpbh64vhZuJm-uAx0akY-fk_lvUlc-9fxUpxnGipv_l2Ll7vb5-1Du9vfP25vdu2sFB5bF531IIkRoAuag-kCEEr0RntEYGORSGe0MlDK6EJyKQfAqHwiw3otrv--M9VIQy40xr4e5tJ_UDkdlPdKgXf6BwhKPSk |
ContentType | Conference Proceeding |
Copyright | 2008 INIST-CNRS |
Copyright_xml | – notice: 2008 INIST-CNRS |
DBID | IQODW |
DatabaseName | Pascal-Francis |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences Computer Science |
EndPage | 366 |
ExternalDocumentID | 19911498 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF IQODW LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-p115t-8c87940ae5442b3eb62b4a5059639554e675aa3f570badf58bd8dfb45c19da6e3 |
ISBN | 3540351574 9783540351573 |
ISSN | 0302-9743 |
IngestDate | Wed Apr 02 07:25:32 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Backbone Perimeter Relay Probabilistic approach Combinatorial problem Worst case method Rupture Algorithmics Network architecture Polynomial method Distributed system Combinatorial optimization Failures Modeling Optimal design Polynomial time Network topology Set theory Bipartite graph Internet Safety Reliability Virtual network Failure |
Language | English |
License | CC BY 4.0 |
LinkModel | OpenURL |
MeetingName | Algorithmic aspects in information and management (Second international conference, AAIM 2006, Hong Kong, China, June 20-22, 2006) |
MergedId | FETCHMERGED-LOGICAL-p115t-8c87940ae5442b3eb62b4a5059639554e675aa3f570badf58bd8dfb45c19da6e3 |
PageCount | 13 |
ParticipantIDs | pascalfrancis_primary_19911498 |
PublicationCentury | 2000 |
PublicationDate | 2006 |
PublicationDateYYYYMMDD | 2006-01-01 |
PublicationDate_xml | – year: 2006 text: 2006 |
PublicationDecade | 2000 |
PublicationPlace | New York Berlin |
PublicationPlace_xml | – name: Berlin – name: New York |
PublicationTitle | Lecture notes in computer science |
PublicationYear | 2006 |
Publisher | Springer |
Publisher_xml | – name: Springer |
SSID | ssj0000316146 ssj0002792 |
Score | 1.797662 |
SourceID | pascalfrancis |
SourceType | Index Database |
StartPage | 354 |
SubjectTerms | Algorithmics. Computability. Computer arithmetics Applied sciences Computer science; control theory; systems Computer systems and distributed systems. User interface Exact sciences and technology Flows in networks. Combinatorial problems Logistics Operational research and scientific management Operational research. Management science Software Theoretical computing |
Title | Secure overlay network design |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT8JAEN0oXjz5hfEL0oO3pmbptqUciWIAAQ0Bw43MtttwkEKkHvTXO9vdlkIwRi9Ns5Bm07eZeTN9M0PILQ1sziEAiwIFy2FOaIFPI6uGEYvwkZHbgUzo9wdee-x0J-5kPfwyrS5J-F3wtbOu5D-o4hriKqtk_4Bs_lBcwHvEF6-IMF63yO9OP9PT-f94kaSyqlQfLkc0mNqvFc9DmlgXplRsvsGnGSv5txluKDh6HbRmOQbN9kOnmcoA-osZzOcQ5j91hsPnp0EnVcnCDLjOoP6UPsjShxthpcwFMSQ6ashIVl6FphODD1awdkz1f9aOk3k7elpv-ZpcASgVVxic-ftkHzlKiRw0W93ea54dQ1PjpV1ttE-VbQ7V9yC1CV2lk25StXcsbFrqW2GFRzxSs0kKhGF0TMrrUkrjJQfvhOyJ-JQcae5vaMu6wqVsvEa2dkYqCjJDQ2ZoyAwFWZmMH1uj-7alp1lYS2TdieUHPto-CsJ1HJszwT2bO-DK8UesgaROYOgGwCK3TjmEkevz0A8j7rhBrRGCJ9g5KcWLWFwQQ8jv677rBaGQ4bVouFGdekBltOlwIS5JdeMFTJeqc8k0e-tXv_3hmhyuD8sNKSXvH6KC7CvhVQ3VN_EdLUU |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Lecture+notes+in+computer+science&rft.atitle=Secure+overlay+network+design&rft.au=LI+LI&rft.au=MAHDIAN%2C+Mohammad&rft.au=MIRROKNI%2C+Vahab+S&rft.date=2006-01-01&rft.pub=Springer&rft.isbn=9783540351573&rft.issn=0302-9743&rft.spage=354&rft.epage=366&rft.externalDBID=n%2Fa&rft.externalDocID=19911498 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |