101
Views
0
CrossRef citations to date
0
Altmetric
Section A

Circular and radial design comparison of survivability in asymmetrical hierarchical networks

&
Pages 2926-2935 | Received 24 Nov 2009, Accepted 13 Apr 2011, Published online: 14 Jul 2011

References

  • Ahmadi , M. B. Guarantee of survivability of symmetrical hierarchical networks . Third Moscow International Conference on Operations Research . Moscow.
  • Ahmadi , M. B. 2007 . Hierarchical communication network and its survivability . Int. J. Pure Appl. Math , 41 : 177 – 182 .
  • Ahmadi , M. B. , Malashenko , Y. E. and Novikava , N. M. 2001 . Research on the survivability of a hierarchical network . J. Vest. Moscow State Univ., 15, and Comput. Math. Cybernet , 3 : 18 – 23 .
  • Chaturvedi , S. K. and Mishra , R. 2009 . An efficient approach to enumerate cutsets arising in capacity related reliability evaluation . Qual. Technol. Quant. Manage , 6 : 43 – 54 .
  • Codenotti , B. , Marco , G. D. , Leoncini , M. , Montangero , M. and Santini , M. 2004 . Approximation algorithms for a hierarchically structured bin packing problem . Inform. Process. Lett , 89 : 215 – 221 .
  • Dasgupta , S. Performance guarantees for hierarchical clustering . Proceedings of the 15th Annual Conference on Computational Learning Theory . pp. 351 – 363 . Berlin : Springer .
  • Ellinas , G. , Hailemariam , A. G. and Stern , T. E. 2000 . Protection cycles in mesh WDM networks . IEEE J. Selected Areas Commun , 18 : 1924 – 1937 .
  • Goldschmidt , O. , Laugier , A. and Olinick , E. V. 2003 . SONET/SDH ring assignment with capacity constraints . Discrete Appl. Math , 129 : 99 – 128 .
  • Hartline , J. and Sharp , A. 2004 . Hierarchical flow , Ithaca, NY : Technical Report, Computer Science Department, Cornell University .
  • Klincewicz , J. G. 1998 . Hub location in backbone/tributary network design: A review . Location Sci , 6 : 307 – 335 .
  • Malashenko , Yu. E. and Novikava , N. M. 1999 . The analysis of multiuser network systems under uncertainty . J. Comput. Syst. Sci. Int , 38 : 589 – 601 .
  • Murray , A. T. , Matisziw , T. C. and Grubesic , T. H. 2007 . Critical network infrastructure analysis: Interdiction and system flow . J. Geogr. Syst , 9 : 103 – 117 .
  • Myung , Y.-S. and Kim , H.-J. 2004 . A cutting plane algorithm for computing k-edge survivability of a network . Eur. J. Oper. Res , 156 : 579 – 589 .
  • Park , K. , Lee , K. , Park , S. and Lee , H. 2000 . Telecommunication node clustering with node compatibility and network survivability requirements . Manage. Sci , 46 : 363 – 374 .
  • Paul , G. , Tanizawa , T. , Havlin , S. and Stanley , H. E. 2004 . Optimization of robustness of complex networks . Eur. Phys. J. B , 38 : 187 – 191 .
  • Phillips , D. and Dias , G. 1981 . A Fundamentals of Network Analysis , Englewood Cliffs, NJ : Prentice-Hall .
  • Plaxton , C. G. Approximation algorithms for hierarchical location problems . Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing . pp. 40 – 49 . New York : ACM Press .
  • Roberts , L. G. and Wessler , B. D. Computer network development to achieve resource sharing . Proceedings of the Spring Joint Computer Conference . pp. 543 – 549 . Silver Spring, MD : ACM .
  • Shi , J. J. and Fonseka , J. P. 1997 . Analysis and design of survivable telecommunications networks . IEEE Proc. Commun , 5 : 322 – 330 .
  • Soriano , P. , Wynants , C. , Séguin , R. , Labbé , M. , Gendreau , M. and Fortz , B. 1998 . Design and dimensioning of survivable SDH/SONET networks , 147 – 168 . Dordrecht : Telecommunications Network Planning, Kluwer Academic Publisher .
  • Tipper , D. , Charnsripinyo , C. , Shin , H. and Dahlberg , T. Communication Networks and Distributed Systems Modeling and Simulation Conference . San Antonio. Survivability analysis for mobile cellular networks , sTX .
  • Wood , K. R. 1993 . Deterministic network interdiction . Math. Comput. Model , 17 : 1 – 18 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.