Fault-tolerant resource allocation model for service function chains with joint diversity and redundancy

R Kang, F He, E Oki - Computer Networks, 2022 - Elsevier
This paper proposes an optimization model to derive a resilient virtual network function
allocation in service function chains aiming to reduce the end-to-end (E2E) latency during …

Backup resource allocation of virtual machines with two-stage probabilistic protection

K Yokouchi, F He, E Oki - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
In a cloud, protection through backup of virtual machines contained in physical machines
(PMs) reduces damage to users due to failure of PMs, such as hardware malfunctions …

Resource allocation model against multiple failures with workload-dependent failure probability

M Zhu, F He, E Oki - IEEE Transactions on Network and Service …, 2021 - ieeexplore.ieee.org
Fault tolerance and load balancing are two key roles in resource allocation against failures.
This paper proposes a primary and backup resource allocation model with preventive …

Service Recovery in NFV-Enabled Networks: Algorithm Design and Analysis

DHP Nguyen, CC Lin, TN Nguyen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Network function virtualization (NFV), a novel network architecture, promises to offer a lot of
convenience in network design, deployment, and management. This paradigm, although …

Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability

M Zhu, E Oki - Computer Networks, 2023 - Elsevier
Modern network services and functions, such as firewalls, load balancers, and network
address translators, are virtualized to virtual network functions (VNFs) and run in virtual …

Survivability Model of LEO Satellite Constellation Based on GERT with Limited Backup Resources

Y Nie, Z Fang, S Liu, S Gao - Journal of Systems Engineering …, 2024 - ieeexplore.ieee.org
Survivability is used to evaluate the ability of the satellite to complete the mission after
failure, while the duration of maintaining performance is often ignored. An effective backup …

Erasure code backup system for data security

RT Lee, SH Shen - Computers & Security, 2025 - Elsevier
With the development of distributed storage, it is critical to determine how to place the copies
of data in different locations with the consideration of network performance and data …

Novel Bandwidth-Aware Network Coding for Fast Cloud-of-Clouds Disaster Backup

J Shen, B Wu, W **ang, S Zou, W Wang… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Cloud-of-clouds storage can enhance the data security and reliability of online applications
by encrypting, encoding, and distributing user data across multiple clouds. Fast transferring …

Unavailability-aware backup allocation model based on two-stage shared protection for middleboxes

N Kita, F He, E Oki - IEEE Transactions on Network and Service …, 2023 - ieeexplore.ieee.org
Middleboxes work as software which runs on a general-purpose server by adopting network
function virtualization. The unavailability of middlebox is a key metric. The previous study …

Backup resource allocation model with two-stage probabilistic protection

K Yokouchi, F He, E Oki - 2022 IEEE 8th International …, 2022 - ieeexplore.ieee.org
This paper proposes a backup resource allocation model with two-stage probabilistic
protection to minimize the total required backup capacity for multiple simultaneous failures of …