ZENG Rong-fei1, ZHANG De-yong1, WANG Xing-wei2, HUANG Min3
1. School of Software, Northeastern University, Shenyang 110169, China; 2. School of Computer Science & Engineering, Northeastern University, Shenyang 110169, China; 3. School of Information Science & Engineering, Northeastern University, Shenyang 110819, China.
ZENG Rong-fei, ZHANG De-yong, WANG Xing-wei, HUANG Min. A Customized Routing Backup Mechanism for IPv6[J]. Journal of Northeastern University Natural Science, 2020, 41(10): 1369-1376.
[1]胡宇翔,董芳,王鹏,等.面向多样化服务定制的多态路由机制研究[J].通信学报,2015,36(7):48-59.(Hu Yu-xiang,Dong Fang,Wang Peng,et al.Research on polymorphic routing mechanism for customized diversified services[J].Journal on Communications,2015,36(7):48-59.) [2]刘韵洁,黄韬,张娇,等.服务定制网络[J].通信学报, 2014,35(12):1-9.(Liu Yun-jie,Huang Tao,Zhang Jiao,et al.Service customized networking[J].Journal on Communications,2014,35(12):1-9.) [3]Yan J,Gao H,Mu Y. Attribute based service customization and selection[C]//International Conference on Service-Oriented Computing and Applications.Piscataway,NJ:IEEE,2014:57-64. [3]Hasan M Z,Al-Rizzo H,Al-Turjman F.A survey on multipath routing protocols for QoS assurances in real-time wireless multimedia sensor networks[J].IEEE Communications Surveys & Tutorials,2017,19(3): 1424-1456. [4]Hassan R,Jabbar R.End-to-end quality of service for IPv6 video streaming[C]//19th International Conference on Advanced Communication Technology.Piscataway,NJ:IEEE,2017:1-4. [5]Karamchati S,Rawat S,Varma V.A novel architecture to enhance quality of service in IP networks[C]//International Conference on Information Networking (ICOIN).Piscataway,NJ:IEEE,2017:616-621. [6]Smith L,Jacobi M,Al-Khayatt S.Evaluation of IPv6 transition mechanisms using QoS service policies[C]//11th International Symposium on Communication Systems,Networks,and Digital Signal Processing.Piscataway,NJ:IEEE,2018:1-5. [7]Khan R Z,Shiranzaei A.IPv6 security tools—a systematic review[C]//International Conference on Computing,Communication and Automation.Piscataway,NJ:IEEE,2016:459-464. [8]Shah J L,Parvez J.IPv6 cryptographically generated address:analysis and optimization[C]//International Conference on Advances in Information Communication Technology & Computing.New York:ACM,2016:2. [9]Nicolls V,Le-Khac N A,Chen L,et al.IPv6 security and forensics[C]//Sixth International Conference on Innovative Computing Technology.Piscataway,NJ:IEEE,2016:743-748. [15]关守平,房少纯.一种新型的区间-粒子群优化算法[J].东北大学学报(自然科学版),2012,33(10):1381-1384.(Guan Shou-ping,Fang Shao-chun.A new interval particle swarm optimization algorithm[J].Journal of Northeastern University(Natural Science),2012,33(10):1381-1384.)