|
[1] C. Banse, S. Rangarajan, “A secure northbound interface for SDN applications.” in IEEE Conference on Trustcom/BigDataSE/ISPA, 2015. [2] XinGuard, “Software-Defined Networking,” December 30, 2015. [3] Open Networking Foundation, “OpenFlow Switch Specification version 1.5.0,” December 19, 2014. [4] B. Nunes, M. Mendonça, X. Nguyen, K. Obraczk, and T. Turletti, “A survey of software-defined networking: Past, present, and future of programmable networks,” in IEEE Communications Surveys & Tutorials, 2014. [5] S Jain, A Kumar, S Mandal, et. al., “B4:Experience with a Globally-Deployed Software Defined WAN,” in ACM SIGCOMM conference, 2013. [6] S. Ghemawat, H. Gobioff, and S.T. Leung, “The Google File System,” in ACM SOSP’03, October 19–22, 2003. [7] K. Shvachko, H. Kuang, S. Radia, R. Chansler, “The Hadoop Distributed File System,” in IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), 2010. [8] V. Gramoli , G. Jourjon and O. Mehani, “Disaster-Tolerant Storage with SDN”, in Networked Systems Volume 9466 of the series Lecture Notes in Computer Science pp 293-307, 2015. [9] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “OpenFlow: Enabling Innovation in Campus Networks,” in ACM SIGCOMM Computer Communication, 2008. [10] J. R. Jiang, H. W. Huang, J. H. Liao, and S. Chen, “Extending Dijkstra’s Shortest Path Algorithm for Software Defined Networking,” in APNOMS, Asia-Pacific. IEEE, 2014 [11] S. RAMANATHAN, “Multicast tree generation in networks with asymmetric links,” IEEE/ACM Transactions on Networking (TON), 1996. [12] S. Y. Chen, J. R. Jiang, “Building Steiner Tree with Extended Dijkstra's Algorithm for Software-Defined Networking Multicast,” in NCU Institutional Repository, 2015. [13] Y. Q. Lin, “Hadoop 3.0 Erasure Coding,” February 26, 2016 ,from http://blog.csdn.net/androidlushangderen/article/details/50724917. [14] B. Sklar, “Reed Solomon Codes.” in Englewood Cliffs, NJ: Prentice-Hall, 2001. [15] Wikiwand , “ Reed-solomon codes,” June 30 ,2015 [16] J. S. Plank., “A tutorial on Reed-Solomon coding for fault tolerance in RAID-like systems.” in Software—Practice and Experience (SPE), 27(9):995–1012, Sept. 1997 [17] J. S. Plank,“Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Storage Applications,” in Fifth IEEE International Symposium on Network Computing and Applications (NCA'06) 24-26 July, 2006. [18] NTNU, “Residual Network, ” from http://www.csie.ntnu.edu.tw/~u91029/Flow.html [19] Wikipedia, “Residual Network, ” from https://zh.wikipedia.org/wiki/網路流 [20] M. Sathiamoorthy et al., “XORing elephants: Novel erasure codes for big data,” in Proc. Very Large Data Bases Endowment, vol. 6, no. 5,pp. 325–336, Mar. 2013. [21] C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder, P. Gopalan, J. Li, and S. Yekhanin, “Erasure coding in Windows Azure Storage,” presented at the USENIX Annu. Tech. Conf., Boston, MA, 2012. [22] University of Adelaide, “The Internet Topology Zoo,” from http://www.topology-zoo.org/.
|