|
[1] M. Chiosi, D. Clarke, P. Willis, A. Reid, J. Feger, M. Bugenhagen, W. Khan, M. Fargano, C. Cui, H. Deng, et al., “Network functions virtualisation introductory white paper,” in SDN and OpenFlow World Congress, 2012. [2] A. Leivadeas, M. Falkner, I. Lambadaris, and G. Kesidis, “Optimal virtualized network function allocation for an sdn enabled cloud,” Computer Standards & Interfaces, vol. 54, pp. 266–278, 2017. [3] D. Dietrich, C. Papagianni, P. Papadimitriou, and J. S. Baras, “Network function placement on virtualized cellular cores,” in 2017 9th International Conference on Communication Systems and Networks (COMSNETS), IEEE, 2017, pp. 259–266. [4] Q. Sun, P. Lu, W. Lu, and Z. Zhu, “Forecast-assisted nfv service chain deployment based on affiliation-aware vnf placement,” in 2016 IEEE Global Communications Conference (GLOBECOM), IEEE, 2016, pp. 1–6. [5] T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta, and D. Sabella, “On multi-access edge computing: A survey of the emerging 5g network edge cloud architecture and orchestration,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1657–1681, 2017. [6] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Mobile edge computing—a key technology towards 5g,” ETSI white paper, vol. 11, no. 11, pp. 1–16, 2015. [7] F. Z. Yousaf, M. Bredel, S. Schaller, and F. Schneider, “Nfv and sdn—key technology enablers for 5g networks,” IEEE journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2468–2478, 2017. [8] V. Sciancalepore, F. Giust, K. Samdanis, and Z. Yousaf, “A double-tier mec-nfv architecture: Design and optimisation,” in 2016 IEEE Conference on standards for communications and networking (CSCN), IEEE, 2016, pp. 1–6. [9] A. Corradi, M. Fanelli, and L. Foschini, “Vm consolidation: A real case based on openstack cloud,” Future Generation Computer Systems, vol. 32, pp. 118–127, 2014. [10] Amazon ec2 spot instances, https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/spot-requests.html, Accessed: 2019-06-01. [11] Amazon ec2 grows 62 in 2 years, https://huanliu.wordpress.com/2014/02/26/amazon-ec2-grows-62-in-2-years/, Accessed: 2014-02-26. [12] D. Gale and L. S. Shapley, “College admissions and the stability of marriage,” The American Mathematical Monthly, vol. 69, no. 1, pp. 9–15, 1962. [13] S. Bayat, R. H. Louie, B. Vucetic, and Y. Li, “Dynamic decentralised algorithms for cognitive radio relay networks with multiple primary and secondary users utilising matching theory,” Transactions on Emerging Telecommunications Technologies, vol. 24, no. 5, pp. 486–502, 2013. [14] H. Xu and B. Li, “Anchor: A versatile and efficient framework for resource management in the cloud,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1066–1076, 2012. [15] L. S. Shapley and M. Shubik, “The assignment game i: The core,” International Journal of game theory, vol. 1, no. 1, pp. 111–130, 1971. [16] D. Fershtman and A. Pavan, “Matching auctions,” The Economist, 2015. [17] L. Mashayekhy, M. M. Nejad, and D. Grosu, “A ptas mechanism for provisioning and allocation of heterogeneous cloud resources,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 9, pp. 2386–2399, 2015, issn: 1045-9219. doi: 10.1109/TPDS.2014.2355228. [18] L. A. Adamic and B. A. Huberman, “Zipf’s law and the internet.,” Glottometrics, vol. 3, no. 1, pp. 143–150, 2002. [19] D. F. Manlove and C. T. Sng, “Popular matchings in the capacitated house allocation problem,” in European Symposium on Algorithms, Springer, 2006, pp. 492–503. [20] A. Abdulkadiroğlu and T. Sönmez, “School choice: A mechanism design approach,” American economic review, vol. 93, no. 3, pp. 729–747, 2003.
|