1 |
Arbor Inc., peakflow, http://www. arbometworks.com/products_platform.php
|
2 |
K. S. Kim, M. H. Cho and T. Y. Nam, 'Analysis of Session Admission Control based on Area (SACA) for Software Download in Cellular CDMA Systems,' ICOIN' 2003 Feb. 2003
|
3 |
K. S. Kim, T. Y. Nam, and C. M. Han, 'Analysis of Abnormal traffic controller deployed in Internet access point,' ICOIN' 2004, Feb. 2004
|
4 |
Wolfram Inc., Mathematica V4.2, http:// www.wolfram.com
|
5 |
Vern Paxson, Sally Floyd, 'Wide-area traffic: The failure of poisson modeling,' IEEE/ACM Transaction on networking, 3(3), pp. 226-244, June 1995
DOI
ScienceOn
|
6 |
Kishor S. Trivedi, Xiaomin Ma and S. Dharmaraja, 'Performability modeling of wireless communication systems,' Int. Journal of communication systems, pp.561-577 May 2003
|
7 |
DARPA FTN, http://www.iaands.org/iaands2002/ftn/index.html
|
8 |
'State of the NGN : Carriers and vendors must take security seriously,' Gartner, March 2003
|
9 |
J.Pescatrore, M. Easley, R.Stiennon, 'Network security platform will transform security markets,' Gartner, Nov. 2002
|