IEEE International Conference on Communications, 2003. ICC '03.
DOI: 10.1109/icc.2003.1204190
|View full text |Cite
|
Sign up to set email alerts
|

On incorporating dependent link failures in a traffic engineering model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Let be the NVC for the entire network, the NVC for the backbone with completely functional subnetworks (computed with flow ), and the NVCs within the th subnetwork. Then, for all (8) where is the probability that the Bernoulli attack eliminates none of the links in the direct path in the backbone from to . Under further modelling assumptions, this formula can be used to generate simpler identities and approximations.…”
Section: A Decomposition Of Vulnerabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…Let be the NVC for the entire network, the NVC for the backbone with completely functional subnetworks (computed with flow ), and the NVCs within the th subnetwork. Then, for all (8) where is the probability that the Bernoulli attack eliminates none of the links in the direct path in the backbone from to . Under further modelling assumptions, this formula can be used to generate simpler identities and approximations.…”
Section: A Decomposition Of Vulnerabilitymentioning
confidence: 99%
“…Suppose in (8) , , , and as a common "within-subnetworks" NVC in proportion. If the backbone is distributed in the sum according to common proportions , , and , then (8) becomes (9) where is the total expected within-subnetworks flow.…”
Section: B Similar Subnetwork and Self-similar Networkmentioning
confidence: 99%
See 1 more Smart Citation