A Flow-Based Architecture
Author:
Ma Yuxiang, Wu YuleiORCID, Ge Jingguo
Publisher
Springer Singapore
Reference17 articles.
1. Ma Y, Wu Y, Ge J, Li J (2018) A flow-level architecture for balancing accountability and privacy. In: IEEE international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 984–989 2. Fred SB, Bonald T, Proutiere A, Régnié G, Roberts JW (2001) Statistical bandwidth sharing: a study of congestion at flow level. In: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM). ACM, pp 111–122 3. Huang C, Min G, Wu Y, Ying Y, Pei K, Xiang Z (2017) Time series anomaly detection for trustworthy services in cloud computing systems. IEEE Trans Big Data 4. Qi Y, Xu B, He F, Yang B, Yu J, Li J (2007) Towards high-performance flow-level packet processing on multi-core network processors. In: Proceedings of the ACM/IEEE symposium on architecture for networking and communications systems. ACM, pp 17–26 5. Amante S, Carpenter B, Jiang S, Rajahalme J (2011) IPv6 Flow Label Specification. RFC 6437
|
|