Author:
Simian Dana,Georgiev Vladislav,Simian Corina
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Ahmed, N.U., Wang, Q., Barbosa, L.O.: System Approach to Modeling the Token Bucket Algorithm in Computer Networks. Mathematical Problems in Engineering 8(3), 265–279 (2002)
2. Ahmed, N.U., Dabbous, T.E., Lee, Y.E.: Dynamic routing for computer queuing networks. Int. J. Systems SCI 19(6) (1988)
3. Faloutsos, M., Faloutsos, P., Faloutsos, C.: On powerlow relationships of the Internet topology. In: Proceeding SIGCOMM Cannes (1999)
4. Nikoloski, Z., Deo, N., Pucera, L.: Correlation Model of Worm Propagation on Scale - Free Networks. Complexus Network Modelling 3, 169–182 (2006)
5. Perumalla, K.S., Sundaragopalan, S.: High-Fidelity Modeling of Computer Network Worms. Technical Report GIT-CERCS-04-23, Center of Experimental Research in Computer Science, Georgia Institut of Technology (2004)