Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fault-tolerant resource allocation model for service function chains with joint diversity and redundancy
This paper proposes an optimization model to derive a resilient virtual network function
allocation in service function chains aiming to reduce the end-to-end (E2E) latency during …
allocation in service function chains aiming to reduce the end-to-end (E2E) latency during …
Backup resource allocation of virtual machines with two-stage probabilistic protection
In a cloud, protection through backup of virtual machines contained in physical machines
(PMs) reduces damage to users due to failure of PMs, such as hardware malfunctions …
(PMs) reduces damage to users due to failure of PMs, such as hardware malfunctions …
Resource allocation model against multiple failures with workload-dependent failure probability
Fault tolerance and load balancing are two key roles in resource allocation against failures.
This paper proposes a primary and backup resource allocation model with preventive …
This paper proposes a primary and backup resource allocation model with preventive …
Service Recovery in NFV-Enabled Networks: Algorithm Design and Analysis
DHP Nguyen, CC Lin, TN Nguyen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Network function virtualization (NFV), a novel network architecture, promises to offer a lot of
convenience in network design, deployment, and management. This paradigm, although …
convenience in network design, deployment, and management. This paradigm, although …
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability
Modern network services and functions, such as firewalls, load balancers, and network
address translators, are virtualized to virtual network functions (VNFs) and run in virtual …
address translators, are virtualized to virtual network functions (VNFs) and run in virtual …
Survivability Model of LEO Satellite Constellation Based on GERT with Limited Backup Resources
Y Nie, Z Fang, S Liu, S Gao - Journal of Systems Engineering …, 2024 - ieeexplore.ieee.org
Survivability is used to evaluate the ability of the satellite to complete the mission after
failure, while the duration of maintaining performance is often ignored. An effective backup …
failure, while the duration of maintaining performance is often ignored. An effective backup …
Erasure code backup system for data security
RT Lee, SH Shen - Computers & Security, 2025 - Elsevier
With the development of distributed storage, it is critical to determine how to place the copies
of data in different locations with the consideration of network performance and data …
of data in different locations with the consideration of network performance and data …
Novel Bandwidth-Aware Network Coding for Fast Cloud-of-Clouds Disaster Backup
J Shen, B Wu, W **ang, S Zou, W Wang… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Cloud-of-clouds storage can enhance the data security and reliability of online applications
by encrypting, encoding, and distributing user data across multiple clouds. Fast transferring …
by encrypting, encoding, and distributing user data across multiple clouds. Fast transferring …
Unavailability-aware backup allocation model based on two-stage shared protection for middleboxes
Middleboxes work as software which runs on a general-purpose server by adopting network
function virtualization. The unavailability of middlebox is a key metric. The previous study …
function virtualization. The unavailability of middlebox is a key metric. The previous study …
Backup resource allocation model with two-stage probabilistic protection
This paper proposes a backup resource allocation model with two-stage probabilistic
protection to minimize the total required backup capacity for multiple simultaneous failures of …
protection to minimize the total required backup capacity for multiple simultaneous failures of …