Cloud Traffic Congestion Avoidance System Using Genetic Algorithm
Abstract
Keywords
Full Text:
PDFReferences
K. Kar, S. Sarkar, and L. Tassiulas, “Optimization based rate control for multirate multicast sessions,” in Proc. IEEE INFOCOM, 2001, pp.123–132.
S. Deb and R. Srikant, “Congestion control for fair resource allocation in networks with multicast flows,” in Proc. IEEE Conf. Decision and Control, Dec. 2001, pp. 1911–1916.
Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business By D.Kesavaraja , R. Balasubramanian And D. Sasireka, International Journal of Database Management Systems ( IJDMS ),(ISSN: 0975-5705)
E. Graves, R. Srikant, and D. Towsley, “Decentralized computation of weighted max- min fair bandwidth allocation in networks with multicast flows,” in Proc. Tyrrhenian Int. Workshop Digital Communications (IWDC‟01), Taormina, Italy, Sept. 2001, pp. 326–342.
William Stallings, “Cryptography and Network Security Principles and Practices”, Third Edition, Prentice Hall, 2003.
S. Selvakani† and r.s. rajesh††, †asst. prof, mca dept, scad college of engg & technology, tirunelveli, tamil nadu, india ††reader, dept of cse, ms university, tirunelveli, tamil nadu ,genetic algorithm for framing rules for intrusion detection in ijcsns international journal of computer science and network security, vol.7 no.11, november 2007
Java 2: The Complete Reference, Patrick Naughton and Herbert Schildt, Tata McGraw Hill, 1999.
The Java Language Specification, 2nd ed, James Gosling, Bill Joy, Guy Steele & Gilad Bracha, Sun Microsystems, 2000.
Kleber vieira, alexandre schulter, carlos becker westphall, and carla merkle westphall,federal university of santa catarina, brazil , intrusion detection for grid and cloud computing in it pro july/august 2010
Ann cavoukian , privacy in the clouds in springer dec 2008
Ayda saidane, vincent nicomette, and yves deswarte, member, ieee , the design of a generic intrusion-tolerant architecture for web servers in ieee transactions on dependable and secure computing, vol. 6, no. 1, january-march 2009
Xiao qin, senior member, ieee, hong jiang, member, ieee,adam manzanares, student member, ieee, xiaojun ruan, student member, ieee, and shu yin, student member, ieee , communication-aware load balancing for parallel applications on clusters in ieee transactions on computers, vol. 59, no. 1, january 2010
Paulo sousa, member, ieee computer society, alysson neves bessani, miguel correia, member, ieee, nuno ferreira neves, member, ieee, and paulo verissimo, fellow, ieee , highly available intrusion-tolerant services with proactive-reactive recovery in ieee transactions on parallel and distributed systems, vol. 21, no. 4, april 2010
“Malicious-and Accidental-Fault Tolerance for Internet Applications: Conceptual Model and Architecture,” Technical Report 03011, Project IST-1999-11583 MAFTIA, Deliverable D21, D. Powell and R. Stroud, eds., LAAS-CNRS, Jan. 2003.
http://support.sas.com/documentation/cdl/en/orlsoug/59688/HTML/default/ga_sect67.htm
http://www.obitko.com/tutorials/genetic-algorithms/example-function-minimum.php
http://en.wikipedia.org/wiki/Genetic_algorithm
Refbacks
- There are currently no refbacks.