參考文獻 |
[1] (2013). The World in 2013: ICT Facts and Figures. Available: http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf
[2] (2014). The World in 2014: ICT Facts and Figures. Available: http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e.pdf
[3] M. T. M. Khan and A. Baig, "An Efficient Mapping Scheme for Locator / ID Separation Protocol," Telecommunication Networks and Applications Conference (ATNAC), pp. 1-6, 2012.
[4] Cisco Locator/ID Separation Protocol (LISP) Introduction. Available: http://www.ringline.com.tw/index.php/support/techpapers/cloud-storage-virtualization/634-cisco-locatorid-separation-protocol-lisp-.html
[5] Bayesian Network. Available: http://en.wikipedia.org/wiki/Bayesian_network
[6] D. Saucez, L. Iannone, and B. Donnet, "A First Measurement Look at The Deployment and Evolution of The Locator/ID Separation Protocol," SIGCOMM Computer Communication Review, vol. 43, pp. 37-43, 2013.
[7] F. Coras, A. Cabellos-Aparicio, and J. Domingo-Pascual, "An Analytical Model for The LISP Cache Size," NETWORKING 2012. vol. 7289, Springer Berlin Heidelberg, pp. 409-420, 2012.
[8] Smarter Than You Think - I.B.M.′s Supercomputer to Challenge ′Jeopardy!′ Champions. Available: http://www.nytimes.com/2010/06/20/magazine/20Computer-t.html?pagewanted=all&_r=2&
[9] (2014). BGP Routing Table Analysis Reports. Available: http://bgp.potaroo.net/
[10] D. Saucez, L. Iannone, O. Bonaventure, and D. Farinacci, "Designing A Deployable Internet: The Locator/Identifier Separation Protocol," IEEE Internet Computing, vol. 16, pp. 14-21, 2012.
[11] (2013). The Locator/ID Separation Protocol (LISP). Available: http://tools.ietf.org/html/rfc6830
[12] (2013). Locator/ID Separation Protocol Alternative Logical Topology (LISP+ALT). Available: http://tools.ietf.org/html/rfc6836
[13] W. Ramirez, X. Masip-Bruin, M. Yannuzzi, R. Serral-Gracia, A. Martinez, and M. S. Siddiqui, "A Survey and Taxonomy of ID/Locator Split Architectures," Computer Networks, vol. 60, pp. 13-33, 2014.
[14] (2014). LISP Mobile Node draft-meyer-lisp-mn-11. Available: http://tools.ietf.org/html/draft-meyer-lisp-mn-11
[15] L. Iannone and O. Bonaventure, "On The Cost of Caching Locator/ID Mappings," Proceedings of the 2007 ACM CoNEXT conference, New York, 2007.
[16] J. Kim, L. Iannone, and A. Feldmann, "Caching Locator/ID Mappings: An Experimental Scalability Analysis and Its Implications," Computer Networks, vol. 57, pp. 897-909, 2013.
[17] J. Kim, L. Iannone, and A. Feldmann, "A Deep Dive into The LISP Cache and What ISPs Should Know about It," NETWORKING 2011. vol. 6640, Springer Berlin Heidelberg, pp. 367-378, 2011.
[18] M. Watari, A. Tagami, and S. Ano, "Evaluating The Performance of Locator/ID Separation Based on LISP Map Cache Emulation," 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT), pp. 296-301, 2012.
[19] X.-Q. Li, M. Zukerman, H.-C. Zhou, H.-B. Luo, F. Qiu, and H.-K. Zhang, "Time to Live of Identifier-to-Locator Mappings: with-reset or no-reset," International Journal of Communication Systems, 2012.
[20] H. Zhang, M.-K. Chen, and Y.-C. Zhu, "Evaluating The Performance on ID/Loc Mapping," IEEE Global Telecommunications Conference (GLOBECOM) 2008, pp. 1-5, 2008.
[21] S.-C. Chen, C.-J. Chang, and Y.-H. Chu, "A Fuzzy Cache Lifetime Determination Scheme for LISP Mapping Systems," 2013 International Conference on Information Networking (ICOIN), pp. 297-302, 2013.
[22] Y. Song, "Learning from Heterogeneous Data by Bayesian Networks," Faculty of Engineering and Information Technology, University of Technology, Sydney, 2014.
[23] I. Ben-Gal, "Bayesian Networks," Encyclopedia of Statistics in Quality and Reliability, John Wiley & Sons, Ltd, 2008.
[24] Welcome: Probability Theory and Bayesian Belief Bayesian Networks. Available: http://www.eecs.qmul.ac.uk/~norman/BBNs/BBNs.htm
[25] M. Chavira and A. Darwiche, "Compiling Bayesian Networks Using Variable Elimination," Proceedings of the 20th international joint conference on Artifical intelligence, Hyderabad, India, 2007.
[26] (2010). Bayisian Network. Available: http://ccckmit.wikidot.com/st:bayesnet
[27] E. Wong, M. Burny, R. B. Hansen, and S. F. Poole, "Optimizing The Diagnosis of Bone Tumors The Bone Tumor Bayesian Network," BMI260: Computational Methods for Biomedical Image Analysis and Interpretation, 2014.
[28] C. Vlek, H. Prakken, S. Renooij, and B. Verheij, "Modeling Crime Scenarios in A Bayesian Network," Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law, Rome, Italy, 2013.
[29] D. Nash, D. Waters, A. Buldu, Y.-M. Wu, Y.-P. Lin, W.-Q. Yang, Y.-Z. Song, J.-H. Shu, W. Qin, and M. Hannah, "Using A Conceptual Bayesian Network to Investigate Environmental Management of Vegetable Production in The Lake Taihu Region of China," Environmental Modelling & Software, vol. 46, pp. 170-181, 2013.
[30] M. Bartlett, I. Bate, J. Cussens, and D. Kazakov, "Probabilistic Instruction Cache Analysis Using Bayesian Networks," 2011 IEEE 17th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), pp. 233-242, 2011.
[31] W. Ali, S. Sulaiman, and N. Ahmad, "Performance Improvement of Least-Recently-Used Policy in Web Proxy Cache Replacement Using Supervised Machine Learning," International Journal of Advances in Soft Computing & Its Applications, vol. 6, p. 38, 2014.
[32] (2011). Fuzzy Logic vs Probability. Available: http://scientopia.org/blogs/goodmath/2011/02/02/fuzzy-logic-vs-probability/
[33] F. Coras, L. Jakab, A. Cabellos-Aparicio, J. Domingo-Pascual, and V. Dobrota, "CoreSim: A Simulator For Evaluating Locator/ID Separation Protocol Mapping Systems," Trilogy Future Internet Summer School, 2009.
[34] H. V. Madhyastha, "An Information Plane for Internet Applications," University of Washington, 2008.
[35] (2009). Analyzing UDP usage in Internet traffic. Available: http://www.caida.org/research/traffic-analysis/tcpudpratio/ |