
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Ming Li, Wei Zhao, "Representation of a Stochastic Traffic Bound," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 13681372, September, 2010.  
BibTex  x  
@article{ 10.1109/TPDS.2009.162, author = {Ming Li and Wei Zhao}, title = {Representation of a Stochastic Traffic Bound}, journal ={IEEE Transactions on Parallel and Distributed Systems}, volume = {21}, number = {9}, issn = {10459219}, year = {2010}, pages = {13681372}, doi = {http://doi.ieeecomputersociety.org/10.1109/TPDS.2009.162}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Parallel and Distributed Systems TI  Representation of a Stochastic Traffic Bound IS  9 SN  10459219 SP1368 EP1372 EPD  13681372 A1  Ming Li, A1  Wei Zhao, PY  2010 KW  Traffic modeling KW  traffic bound KW  burstiness KW  longterm average rate KW  local selfsimilarity KW  longrange dependence. VL  21 JA  IEEE Transactions on Parallel and Distributed Systems ER   
[1] H. Michiel and K. Laevens, "Teletraffic Engineering in a BroadBand Era," Proc. IEEE, vol. 85, no. 12, pp. 800819, Dec. 1997.
[2] P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho, "Seven Years and One Day: Sketching the Evolution of Internet Traffic," Proc. IEEE INFOCOM, pp. 711719, May 2009.
[3] M. Li and S.C. Lim, "Modeling Network Traffic Using Generalized Cauchy Process," Physica A, vol. 387, no. 11, pp. 25842594, 2008.
[4] J. Beran, R. Shernan, M.S. Taqqu, and W. Willinger, "LongRange Dependence in Variable BitRate Video Traffic," IEEE Trans. Comm., vol. 43, nos. 24, pp. 15661579, Feb.Apr. 1995.
[5] S. Uhlig, "On the Complexity of Internet Traffic Dynamics on the Topology," Telecomm. Systems, vol. 43, nos. 34, pp. 167180, 2010.
[6] S. Song, J.K. Ng, and B. Tang, "Some Results on the SelfSimilarity Property in Communication Networks," IEEE Trans. Comm., vol. 52, no. 10, pp. 16361642, Oct. 2004.
[7] C. Li and E. Knightly, "Schedulability Criterion and Performance Analysis of Coordinated Multihop Schedulers," IEEE/ACM Trans. Networking, vol. 13, no. 2, pp. 276287, Apr. 2005.
[8] C. Li, A. Burchard, and J. Liebeherr, "A Network Calculus with Effective Bandwidth," IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 14421452, Dec. 2007.
[9] S. Wang, D. Xuan, R. Bettati, and W. Zhao, "Providing Absolute Differentiated Services for RealTime Applications in StaticPriority Scheduling Networks," IEEE/ACM Trans. Networking, vol. 12, no. 2, pp. 326339, Apr. 2004.
[10] S. Wang, Z. Mai, D. Xuan, and W. Zhao, "Design and Implementation of QoSProvisioning System for Voice over IP," IEEE Trans. Parallel and Distributed Systems, vol. 17, no. 3, pp. 276288, Mar. 2006.
[11] Y.M. Jiang, "PerDomain Packet Scale Rate Guarantee for Expedited Forwarding," IEEE/ACM Trans. Networking, vol. 14, no. 3, pp. 630643, June 2006.
[12] Y.M. Jiang and Y. Liu, Stochastic Network Calculus. Springer, 2008.
[13] X. Jia, "A Distributed Algorithm of Delay Bounded Multicast Routing for Multimedia Applications in Wide Area Networks," IEEE/ACM Trans. Networking, vol. 6, no. 6, pp. 828837, Dec. 1998.
[14] M. Li, "Change Trend of Averaged Hurst Parameter of Traffic Under DDOS Flood Attacks," Computers and Security, vol. 25, no. 3, pp. 213220, 2006.
[15] R. Bettati, W. Zhao, and D. Teodor, "RealTime Intrusion Detection and Suppression in ATM Networks," Proc. First USENIX Workshop Intrusion Detection and Network Monitoring, vol. 1, pp. 112, Apr. 1999.
[16] A. Raha, S. Kamat, and W. Zhao, "Guaranteeing EndtoEnd Deadlines in ATM Networks," Proc. IEEE Int'l. Conf. Distributed Computing Systems (ICDCS '95), pp. 6068, May 1995.
[17] R.L. Cruz, "A Calculus for Network Delay, Part I: Network Elements in Isolation, Part II: Network Analysis," IEEE Trans. Information Theory, vol. 37, no. 1, pp. 114141, Jan. 1991.
[18] O. Yaron and M. Sidi, "Performance and Stability of Communication Networks via Robust Exponential Bounds," IEEE/ACM Trans. Networking, vol. 1, no. 3, pp. 372385, June 1993.
[19] A.K. Parekh and R.G. Gallager, "A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The SingleNode Case," IEEE/ACM Trans. Networking, vol. 1, no. 3, pp. 344357, June 1993.
[20] D. Starobinski and M. Sidi, "Stochastically Bounded Burstiness for Communication Networks," IEEE Trans. Information Theory, vol. 46, no. 1, pp. 206212, Jan. 2000.
[21] S.C. Lim and M. Li, "Generalized Cauchy Process and Its Application to Relaxation Phenomena," J. Physics A: Math. and General, vol. 39, no. 12, pp. 29352951, 2006.
[22] B.B. Mandelbrot, The Fractal Geometry of Nature. W.H. Freeman, 1982.
[23] J.T. Kent and A.T. Wood, "Estimating the Fractal Dimension of a Locally SelfSimilar Gaussian Process by Using Increments," J. Royal Statistical Soc. B, vol. 59, no. 3, pp. 679699, 1997.
[24] M.S. Taqqu, V. Teverovsky, and W. Willinger, "Estimators for LongRange Dependence: An Empirical Study," Fractals, vol. 3, no. 4, pp. 785798, 1995.
[25] J.W. Kantelhardt, E. KoscielnyBunde, and H.H.A. Rego, "Detecting LongRange Correlations with Detrended Fluctuation Analysis," Physica A, vol. 295, nos. 3/4, pp. 441454, 2001.
[26] J. Beran, Statistics for LongMemory Processes. Chapman & Hall, 1994.
[27] G. Chan, P. Hall, and D.S. Poskitt, "PeriodogramBased Estimators of Fractal Properties," The Annals of Statistics, vol. 23, no. 5, pp. 16841711, 1995.
[28] P. Hall and A. Wood, "On the Performance of BoxCounting Estimators of Fractal Dimension," Biometrika, vol. 80, no. 1, pp. 246252, 1993.
[29] Y.Q. Chen, R. Sun, and A. Zhou, "An Improved Hurst Parameter Estimator Based on Fractional Fourier Transform," Telecomm. Systems, vol. 43, nos. 34, pp. 197206, 2009.
[30] A.J. Adler, The Geometry of Random Fields. Wiley, 1981.
[31] V. Paxson and S. Floyd, "Wide Area Traffic: The Failure of Poison Modeling," IEEE/ACM Trans. Networking, vol. 3, no. 3, pp. 226244, June 1995.