• Non ci sono risultati.

BIBLIOGRAFIA________________________________________ [1] S .Shakkottai, M .Fomenkov, R .Koga, D .Krioukov, and K .Claffy, “Evolution of the Internet AS-

N/A
N/A
Protected

Academic year: 2021

Condividi "BIBLIOGRAFIA________________________________________ [1] S .Shakkottai, M .Fomenkov, R .Koga, D .Krioukov, and K .Claffy, “Evolution of the Internet AS-"

Copied!
3
0
0

Testo completo

(1)

46

BIBLIOGRAFIA________________________________________

[1] S .Shakkottai, M .Fomenkov, R .Koga,  D  .Krioukov,  and  K  .Claffy,  “Evolution  of   the Internet AS-Level   Ecosystem”,   in   International   Conference   on   Complex   Sciences, Complex, 2009.

[2] Internet   Engineering   Task   Force,   “RFC   1930   - Guidelines for creation, selection, and registration of an Autonomous  System  (AS)”,  1996.

[3] Cooperative Association for Internet Data Analysis, http://www.caida.org/

[4] G.  Combs,  “Wireshark,  a  Network  Protocol  Analyzer”,  http://www.wireshark.  org. [5] Internet   Engineering   Task   Force,   “RFC   5101   - Specification of the IP Flow

Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information”,  2008.  

[5] Internet   Engineering   Task   Force,   “RFC   5102   - Information Model for IP Flow Information  Export”,  2008.

[6] Pedro Casas Hernández ,Statistical Analysis of Network Traffic for Anomaly Detection and Quality of Service Provisioning

[7] G.Mangano, Introduzione alle reti Neurali.

[8] Y.  Vardi,  “Network  Tomography:  Estimating  Source-Destination Traffic Intensities from  Link  Data”,  in  J.  Amer.  Statist.  Assoc,  91,  pp.  365-377, 1996.

[9] J.  Cao  et  al,  “Time-Varying  Network  Tomography”,  in  J.  Amer.  Statist.  Assoc,  95,   pp. 1063-1075, 2000. BIBLIOGRAPHY 183

[10] C.  Tebaldi  et  al,  “Bayesian  Inference  on  Network  Traffic  Using  Link  Count  Data”,   in J. Amer. Statist. Assoc, 93, pp. 557-576, 1998.

[11] S.  Vaton  and  A.  Gravey,  “Network  Tomography  :  an  Iterative  Bayesian  Analysis”,   in Proc. ITC 18, 2003.

[12] J.   Kowalski   and   B.   Warfield,   “Modeling   Traffic   Demand   Between Nodes in a Telecommunications  Network”,  in  ATNAC,  1995.  

[13] M. Roughan, A. Greenberg, C. Kalmanek, M. Rumsewicz, J. Yates, and Y. Zhang, “Experience   in   Measuring   Backbone   Traffic   Variability:   Models,   Metrics,   Measurements   and   Meaning”,   in   ACM   SIGCOMM Internet Measurement Workshop, 2002.

(2)

47

[14] Y.   Zhang,   M.   Roughan,   N.   Duffield   and   A.   Greenberg,   “Fast   Accurate   Computation of Large-Scale   IP  Traffic  Matrices  from   Link   Load  Measurements”,   in Proc. ACM SIGMETRICS, 2003.

[15] K. Papagiannaki,   N.   Taft,   and   A.   Lakhina,   “A   Distributed   Approach   to   Measure   Traffic  Matrices”,  in  Proc.  ACM  IMC,  2004

[16] A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. Kolaczyk, and N. Taft, “Structural  Analysis  of  Network  Traffic  Flows”,  in  Proc.  ACM  SIGMETICS, 2004. [17] A.   Soule,   K.   Salamatian,   A.   Nucci,   and   N.   Taft,“Traffic   Matrix   Tracking   using  

Kalman  Filters”,  in  LSNI,  2005.

[18] A.  Soule,  K.  Salamatian  and  N.  Taft,  “Combining  Filtering  and  Statistical  Methods   for  Anomaly  Detection”,  in  Proc.  USENIX/ACM  IMC, 2005.

[19] A. Soule, A. Lakhina, N. Taft, K. Papagiannaki, K. Salamatian, A. Nucci, M. Crovella,   and   C.   Diot,“Traffic   Matrices:   Balancing   Measurements,   Inference,   and   Modeling”,  in  Proc.  ACM  SIGMETRICS,  2005.

[20] E.   Gelenbe,   “Random   neural   networks   with negative and positive signals and product  form  solution”,  in  Neural  Computation,  vol.  1,  pp.  502-511, 1989.

[21] R.   Duda,   P.   Hart,   and   D.   Stork,   “Pattern   Classification   (2nd   Edition)”,   WileyInterscience, 2000.

[22] A. Lakhina, K. Papgiannaki, C. Crovella, M. Diot, E. Kolaczyk,and N. Taft, "Structural analysis of network traffic flows",in Proceedings of the ACM Sigmetrics Conference, 2004.

[23] Hossam   Eldin   Abdelbaki,”Random   Neural   Network   simulator   v.2”,Technical   Report School of Computer Science of Central Florida,1999.

[24] M. Roughan, A. Greenberg, C. Kalmanek, M. Rumsewicz, J. Yates, and Y. Zhang, “Experience   in   Measuring   Backbone   Traffic   Variability:   Models,   Metrics,   Measurements   and   Meaning”,   in   ACM   SIGCOMM   Internet   Measurement   Workshop, 2002.

[25] Y.   Zhang,   M.   Roughan,   N.   Duffield   and   A.   Greenberg,   “Fast   Accurate   Computation of Large-Scale   IP  Traffic  Matrices  from   Link   Load  Measurements”,   in Proc. ACM SIGMETRICS, 2003.

[26] A.   Soule,   K.   Salamatian,   A.   Nucci,   and   N.   Taft,“Traffic   Matrix   Tracking   using Kalman  Filters”,  in  LSNI,  2005.

(3)

48

[27] A.  Soule,  K.  Salamatian  and  N.  Taft,  “Combining  Filtering  and  Statistical  Methods   for  Anomaly  Detection”,  in  Proc.  USENIX/ACM IMC, 2005.

[28] L.  Grippo,  M.  Sciandrone  “Metodi  di  ottimizzazione  per  le  reti  neurali”. [29] Elisa  Turricchia,”Artificial  Neural  Network”,pdf.

[30] P.Casas,   S.Vaton,   “On   the   Use   of   Random   Neural   Networks   for   Traffic   Matrix   Estimation in Large-Scale  IP  Networks”

Riferimenti

Documenti correlati

Our results showed that secure attachment relationships and high self-esteem represent protective factors for quality of life of women with fibromyalgia, while the contrary emerged

ENSAT registry-based randomized clinical trials for adrenocortical carcinoma..

In the massless regime and for some configurations where the subsystem is a single interval, the numerical results for the contour function are compared to the inverse of the

La caratteristica che contraddistingue questo testo è la totale assenza delle descrizioni dei singoli attrezzi, di cui viene indicata soltanto la fun- zione («una mazza grossa

il santo nudo, al contrario di tieck (che parte da un momento di compiutezza estetica, ma finisce per approdare a vuote fantasie), sperimenta, dal vuoto del moto circolare del

Nonostante la denominazione di principio, al mutuo riconoscimento non può at- tribuirsi natura giuridica di principio generale dell’ordinamento giuridico dell’Unione, bensì

Although the oral exposure can be considered as the most dangerous for the human health, in the Mediterranean Sea adverse effects ascribed to PLTXs were associated to

This section reports the results of the study, divided into the two different sources of data, urban water demand (SCADA) and individual customer consumption (AMR) data, and