2002
DOI: 10.1109/tnet.2002.802141
|View full text |Cite
|
Sign up to set email alerts
|

Algorithms for provisioning virtual private networks in the hose model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
98
0

Year Published

2002
2002
2015
2015

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 139 publications
(99 citation statements)
references
References 5 publications
1
98
0
Order By: Relevance
“…In [15], the authors have proposed an integer programming model to solve the VPN tree computation problem for bandwidth provisioning in VPNs. Techniques of randomized rounding for linear programming relaxations to obtain approximation algorithms was first introduced in [16].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [15], the authors have proposed an integer programming model to solve the VPN tree computation problem for bandwidth provisioning in VPNs. Techniques of randomized rounding for linear programming relaxations to obtain approximation algorithms was first introduced in [16].…”
Section: Related Workmentioning
confidence: 99%
“…• Finally, constraint sets (15) and (16) denote the real and binary domain constraints on the variables f i uv and x uv , respectively.…”
Section: Constraintsmentioning
confidence: 99%
“…Previously these were the best known guarantees. Kumar et al [17] implemented a heuristic for the rent-or-buy problem and used it to construct VPN trees. They report that the algorithm outperforms standard heuristics over a wide range of parameter values.…”
Section: Introductionmentioning
confidence: 99%
“…More information on virtual network provisioning with respect to theoretical, as well as computational aspects, can be found, e.g., in [10,18]. Examples of efficient resource assignment algorithms can be in turn found in [8,17,23,24].…”
Section: Introductionmentioning
confidence: 99%