• Orthey A, Chamzas C and Kavraki L. (2024). Sampling-Based Motion Planning: A Comparative Review. Annual Review of Control, Robotics, and Autonomous Systems. 10.1146/annurev-control-061623-094742. 7:1. (285-310). Online publication date: 10-Jul-2024.

    https://www.annualreviews.org/content/journals/10.1146/annurev-control-061623-094742

  • Wang C, Xie K, Tian J, Wen J, Li X, Xie G and Li K. HPETC: History Priority Enhanced Tensor Completion for Network Distance Measurement. IEEE Transactions on Parallel and Distributed Systems. 10.1109/TPDS.2023.3274305. 35:6. (1012-1028).

    https://ieeexplore.ieee.org/document/10121636/

  • Huang H, Li L, Min G, Miao W, Zhu Y and Zhao Y. TNDP: Tensor-Based Network Distance Prediction With Confidence Intervals. IEEE Transactions on Services Computing. 10.1109/TSC.2021.3089241. 15:6. (3554-3565).

    https://ieeexplore.ieee.org/document/9454377/

  • Ghandi S, Reiffers-Masson A, Vaton S and Chonavel T. (2022). Non-negative Matrix Factorization For Network Delay Matrix Completion NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium. 10.1109/NOMS54207.2022.9789871. 978-1-6654-0601-7. (1-6).

    https://ieeexplore.ieee.org/document/9789871/

  • Nguyen P, Nga C and Luong H. (2022). Research and Accomplishments in Applications of Non-negative Matrix Factorization. International Conference on Artificial Intelligence for Smart Community. 10.1007/978-981-16-2183-3_101. (1061-1072).

    https://link.springer.com/10.1007/978-981-16-2183-3_101

  • Sun W, Tao J, Xu Y, Gao Y and Wang Z. (2021). Network Latency Estimation: A Tensor-based Weighted Singular Value Thresholding Method 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys). 10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00081. 978-1-6654-9457-1. (431-438).

    https://ieeexplore.ieee.org/document/9781112/

  • Gao Y, Shi J, Wang X, Shi R, Yin Z and Yang Y. (2021). Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). 10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00191. 978-1-6654-3574-1. (1402-1409).

    https://ieeexplore.ieee.org/document/9644904/

  • Renl B, Guo D, Tang G, Wang W, Luo L and Fu X. (2021). SRUF: Low-Latency Path Routing with SRv6 Underlay Federation in Wide Area Network 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). 10.1109/ICDCS51616.2021.00091. 978-1-6654-4513-9. (910-920).

    https://ieeexplore.ieee.org/document/9546478/

  • Tripathi R and Rajawat K. Adaptive Network Latency Prediction From Noisy Measurements. IEEE Transactions on Network and Service Management. 10.1109/TNSM.2021.3051736. 18:1. (807-821).

    https://ieeexplore.ieee.org/document/9324791/

  • Pasteris S, Wang S, Herbster M and He T. (2019). Service Placement with Provable Guarantees in Heterogeneous Edge Computing Systems IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 10.1109/INFOCOM.2019.8737449. 978-1-7281-0515-4. (514-522).

    https://ieeexplore.ieee.org/document/8737449/

  • de Araujo J, Arantes L, Júnior E, Rodrigues L and Sens P. A Communication-Efficient Causal Broadcast Protocol. Proceedings of the 47th International Conference on Parallel Processing. (1-10).

    https://doi.org/10.1145/3225058.3225121

  • Tripathi R and Rajawat K. (2018). Dynamic Network Latency Prediction with Adaptive Matrix Completion 2018 International Conference on Signal Processing and Communications (SPCOM). 10.1109/SPCOM.2018.8724422. 978-1-5386-3821-7. (407-411).

    https://ieeexplore.ieee.org/document/8724422/

  • Tran D and Do T. (2018). A Geometrically Unified Network Coordinate System for Network Latency Estimation 2018 IEEE International Conference on Communications (ICC 2018). 10.1109/ICC.2018.8422604. 978-1-5386-3180-5. (1-6).

    https://ieeexplore.ieee.org/document/8422604/

  • Mirkovic D, Armitage G and Branch P. A Survey of Round Trip Time Prediction Systems. IEEE Communications Surveys & Tutorials. 10.1109/COMST.2018.2816917. 20:3. (1758-1776).

    https://ieeexplore.ieee.org/document/8319486/

  • Gencer A, Basu S, Eyal I, van Renesse R and Sirer E. (2018). Decentralization in Bitcoin and Ethereum Networks. Financial Cryptography and Data Security. 10.1007/978-3-662-58387-6_24. (439-457).

    http://link.springer.com/10.1007/978-3-662-58387-6_24

  • Wei J, Wang S, Zhou A and Yang F. (2017). CMIP: Data Transmission Latency Optimization for Cooperative Group in Multi-cloud by Adaptive Routing 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). 10.1109/ICPADS.2017.00061. 978-1-5386-2129-5. (410-418).

    https://ieeexplore.ieee.org/document/8368390/

  • Fu Y, Biersack E, Yongquan Fu and Biersack E. (2017). MCR. IEEE/ACM Transactions on Networking. 25:5. (3016-3029). Online publication date: 1-Oct-2017.

    https://doi.org/10.1109/TNET.2017.2715331

  • Gomez R, Luchian E, Ivanciu I, Taut A, Dobrota V and Riviere E. (2017). On the impact of indirect WAN routing on geo-replicated storage 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). 10.1109/LANMAN.2017.7972171. 978-1-5386-0728-2. (1-6).

    http://ieeexplore.ieee.org/document/7972171/

  • Zhang M, Lehman V and Wang L. (2017). Scalable name-based data synchronization for named data networking IEEE INFOCOM 2017 - IEEE Conference on Computer Communications. 10.1109/INFOCOM.2017.8057193. 978-1-5090-5336-0. (1-9).

    http://ieeexplore.ieee.org/document/8057193/

  • Zhang Z and Kumar P. (2017). mEEC: A novel error estimation code with multi-dimensional feature IEEE INFOCOM 2017 - IEEE Conference on Computer Communications. 10.1109/INFOCOM.2017.8057134. 978-1-5090-5336-0. (1-9).

    http://ieeexplore.ieee.org/document/8057134/

  • Zhang Y, Wu W, Banerjee S, Kang J and Sanchez M. (2017). SLA-verifier: Stateful and quantitative verification for service chaining IEEE INFOCOM 2017 - IEEE Conference on Computer Communications. 10.1109/INFOCOM.2017.8057041. 978-1-5090-5336-0. (1-9).

    http://ieeexplore.ieee.org/document/8057041/

  • Xu B, Hu C, Liu B, Xing C and Li D. (2017). Queue demotion threshold configuration for minimizing flow completion in information-agnostic datacenters ICC 2017 - 2017 IEEE International Conference on Communications. 10.1109/ICC.2017.7996827. 978-1-4673-8999-0. (1-6).

    http://ieeexplore.ieee.org/document/7996827/

  • Xu S, Liu P and Panwar S. (2017). Exploiting network similarity for latency prediction of edge devices ICC 2017 - 2017 IEEE International Conference on Communications. 10.1109/ICC.2017.7996450. 978-1-4673-8999-0. (1-5).

    http://ieeexplore.ieee.org/document/7996450/

  • Zhang C, Wang A, Hei X and Podobnik B. (2017). Relay discovery and selection for large-scale P2P streaming. PLOS ONE. 10.1371/journal.pone.0175360. 12:4. (e0175360).

    https://dx.plos.org/10.1371/journal.pone.0175360

  • Zhu R, Liu B, Niu D, Li Z and Zhao H. (2017). Network Latency Estimation for Personal Devices. IEEE/ACM Transactions on Networking. 25:2. (724-737). Online publication date: 1-Apr-2017.

    https://doi.org/10.1109/TNET.2016.2612695

  • Chen Y, Wu S, Li J and Fu X. NCShield: Protecting Decentralized, Matrix Factorization-Based Network Coordinate Systems. IEEE Transactions on Services Computing. 10.1109/TSC.2015.2437383. 10:2. (244-257).

    http://ieeexplore.ieee.org/document/7112533/

  • Abdou A, Matrawy A and van Oorschot P. (2017). CPV. IEEE Transactions on Dependable and Secure Computing. 14:2. (130-144). Online publication date: 1-Mar-2017.

    https://doi.org/10.1109/TDSC.2015.2451614

  • Fu Y and Xiaoping X. (2017). Self-Stabilized Distributed Network Distance Prediction. IEEE/ACM Transactions on Networking. 25:1. (451-464). Online publication date: 1-Feb-2017.

    https://doi.org/10.1109/TNET.2016.2581592

  • Sinha S, Niu D, Wang Z and Lu P. (2016). Mitigating Routing Inefficiencies to Cloud-Storage Providers: A Case Study 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW). 10.1109/IPDPSW.2016.177. 978-1-5090-3682-0. (1298-1306).

    http://ieeexplore.ieee.org/document/7530016/

  • Schwabe A and Karl H. (2015). Topology model to generate realistic latency for simulations 2015 IEEE International Conference on Signal Processing for Communications (ICC). 10.1109/ICC.2015.7249298. 978-1-4673-6432-4. (6122-6127).

    http://ieeexplore.ieee.org/document/7249298/

  • Liu B, Niu D, Li Z and Zhao H. (2015). Network latency prediction for personal devices: Distance-feature decomposition from 3D sampling IEEE INFOCOM 2015 - IEEE Conference on Computer Communications. 10.1109/INFOCOM.2015.7218395. 978-1-4799-8381-0. (307-315).

    http://ieeexplore.ieee.org/document/7218395/

  • Guomin Z, Zhanfeng W, Rui W, Na W and Changyou X. (2014). What is New about the Internet Delay Space?. International Journal of Mobile Computing and Multimedia Communications. 6:4. (36-55). Online publication date: 1-Oct-2014.

    https://doi.org/10.4018/IJMCMC.2014100103

  • Abdou A, Matrawy A and van Oorschot P. (2014). Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients 2014 IEEE Conference on Communications and Network Security (CNS). 10.1109/CNS.2014.6997484. 978-1-4799-5890-0. (175-183).

    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6997484

  • Rizk R, Saber W and Harb H. (2014). Conditional clustered matrix factorization based network coordinate system. Journal of Network and Computer Applications. 45:C. (191-202). Online publication date: 1-Oct-2014.

    https://doi.org/10.1016/j.jnca.2014.07.027

  • Guo D, Jin H, Chen T, Wu J, Lu L, Li D and Zhou X. (2013). Partial Probing for Scaling Overlay Routing. IEEE Transactions on Parallel and Distributed Systems. 24:11. (2261-2272). Online publication date: 1-Nov-2013.

    https://doi.org/10.1109/TPDS.2012.326

  • Liao Y, Du W, Geurts P and Leduc G. (2013). DMFSGD. IEEE/ACM Transactions on Networking. 21:5. (1511-1524). Online publication date: 1-Oct-2013.

    https://doi.org/10.1109/TNET.2012.2228881

  • Tsamoura E and Gounaris A. Incorporating change detection in network coordinate systems for large data transfers. Proceedings of the 17th Panhellenic Conference on Informatics. (55-62).

    https://doi.org/10.1145/2491845.2491864

  • Fu Y, Wang Y and Biersack E. (2013). HybridNN. Future Generation Computer Systems. 29:6. (1485-1504). Online publication date: 1-Aug-2013.

    https://doi.org/10.1016/j.future.2012.12.002

  • Girlich F, Rossberg M, Schaefer G, Boehme T and Schreyer J. Bounds for the Security of the Vivaldi Network Coordinate System. Proceedings of the 2013 Conference on Networked Systems. (66-75).

    https://doi.org/10.1109/NetSys.2013.21

  • Fu Y and Wang Y. (2011). DKNNS: Scalable and accurate distributed K nearest neighbor search for latency-sensitive applications. Science China Information Sciences. 10.1007/s11432-011-4449-7. 56:3. (1-17). Online publication date: 1-Mar-2013.

    http://link.springer.com/10.1007/s11432-011-4449-7

  • Zhang C, Hei X, Liu W and Cheng W. (2012). On improving dynamic stochastic routing algorithms in overlay networks 2012 18th IEEE International Conference on Networks (ICON). 10.1109/ICON.2012.6506599. 978-1-4673-4523-1. (447-452).

    http://ieeexplore.ieee.org/document/6506599/

  • Ahmad M and Guha R. (2012). Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation. The Journal of Supercomputing. 10.1007/s11227-012-0811-9. 62:3. (1425-1450). Online publication date: 1-Dec-2012.

    http://link.springer.com/10.1007/s11227-012-0811-9

  • Ahmad M and Guha R. A tale of nine Internet exchange points. Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012). (618-625).

    https://doi.org/10.1109/LCN.2012.6423683

  • Ahmad M and Guha R. (2012). Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops). 10.1109/LCNW.2012.6424046. 978-1-4673-2129-7. (1078-1085).

    http://ieeexplore.ieee.org/document/6424046/

  • Wu S, Chen Y, Fu X and Li J. NCShield. Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service. (1-9).

    /doi/10.5555/2330748.2330755

  • Shining Wu , Yang Chen , Xiaoming Fu and Jun Li . (2012). NCShield: Securing decentralized, matrix factorization-based network coordinate systems 2012 IEEE 20th International Workshop on Quality of Service (IWQoS). 10.1109/IWQoS.2012.6245983. 978-1-4673-1298-1. (1-9).

    http://ieeexplore.ieee.org/document/6245983/

  • Montessoro P, Wieser S and Boszormenyi L. (2012). An efficient and scalable engine for large scale multimedia overlay networks 2012 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR 2012). 10.1109/CQR.2012.6267109. 978-1-4673-1862-4. (1-6).

    http://ieeexplore.ieee.org/document/6267109/

  • Zhang Y and Zhang H. (2012). Triangulation Inequality Violation in Internet Delay Space. Advances in Computer Science and Information Engineering. 10.1007/978-3-642-30223-7_52. (331-337).

    https://link.springer.com/10.1007/978-3-642-30223-7_52

  • Ma T and Zhang C. A Power Law Relay Routing Overlay. Proceedings of the 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming. (258-262).

    https://doi.org/10.1109/PAAP.2011.39

  • Ma T and Hu Q. On the Power Law Property of Latency-Reducing Relays. Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed Systems. (788-792).

    https://doi.org/10.1109/ICPADS.2011.88

  • Chen Y, Wang X, Shi C, Lua E, Fu X, Deng B and Li X. Phoenix: A Weight-Based Network Coordinate System Using Matrix Factorization. IEEE Transactions on Network and Service Management. 10.1109/TNSM.2011.110911.100079. 8:4. (334-347).

    http://ieeexplore.ieee.org/document/6092405/

  • Zhang Y, Zhang C and Wang G. Exploit TIVs to Find Faster Paths. Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. (1779-1782).

    https://doi.org/10.1109/TrustCom.2011.248

  • Chan-Tin E, Heorhiadi V, Hopper N and Kim Y. (2011). The Frog-Boiling Attack. ACM Transactions on Information and System Security. 14:3. (1-23). Online publication date: 1-Nov-2011.

    https://doi.org/10.1145/2043621.2043627

  • Cong Ly , Cheng-Hsin Hsu and Hefeeda M. (2011). IRS. IEEE Transactions on Multimedia. 13:4. (733-747). Online publication date: 1-Aug-2011.

    https://doi.org/10.1109/TMM.2011.2114645

  • Zhu Y, Chen Y, Zhang Z, Fu X, Li D, Deng B and Li X. Taming the triangle inequality violations with network coordinate system on real internet. Proceedings of the Re-Architecting the Internet Workshop. (1-6).

    https://doi.org/10.1145/1921233.1921242

  • Donnet B, Gueye B and Kaafar M. (2010). A Survey on Network Coordinates Systems, Design, and Security. IEEE Communications Surveys & Tutorials. 12:4. (488-503). Online publication date: 1-Oct-2010.

    https://doi.org/10.1109/SURV.2010.032810.00007

  • Xiong M, Zhang C, Qiu X, Ma T and Wang H. (2010). Towards Autonomous System Topology Aware Relay Service Scheme 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). 10.1109/WICOM.2010.5601424. 978-1-4244-3708-5. (1-4).

    http://ieeexplore.ieee.org/document/5601424/

  • Chen Y, Sun P, Fu X and Xu T. (2010). Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). 10.1109/ICCCN.2010.5560092. 978-1-4244-7114-0. (1-8).

    http://ieeexplore.ieee.org/document/5560092/

  • Chen S, Pierre G and Chi C. (2010). Secure Data Aggregation through Proactive Defense 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). 10.1109/ICCCN.2010.5560026. 978-1-4244-7114-0. (1-6).

    http://ieeexplore.ieee.org/document/5560026/

  • Ping F, McConnell C and Hwang J. (2010). A Retrospective Approach for Accurate Network Latency Prediction 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). 10.1109/ICCCN.2010.5560025. 978-1-4244-7114-0. (1-6).

    http://ieeexplore.ieee.org/document/5560025/

  • Qian Z, Mao Z, Xie Y and Yu F. Investigation of Triangular Spamming. Proceedings of the 2010 IEEE Symposium on Security and Privacy. (207-222).

    https://doi.org/10.1109/SP.2010.42

  • Liao Y, Geurts P and Leduc G. Network distance prediction based on decentralized matrix factorization. Proceedings of the 9th IFIP TC 6 international conference on Networking. (15-26).

    https://doi.org/10.1007/978-3-642-12963-6_2

  • Shamsi J and Brockmeyer M. Evaluation of QoS-compliant overlays under denial of service attacks. Proceedings of the 2010 Spring Simulation Multiconference. (1-8).

    https://doi.org/10.1145/1878537.1878644

  • Choffnes D and Bustamante F. (2010). Pitfalls for testbed evaluations of internet systems. ACM SIGCOMM Computer Communication Review. 40:2. (43-50). Online publication date: 9-Apr-2010.

    https://doi.org/10.1145/1764873.1764880

  • Choffnes D, Sánchez M and Bustamante F. Network positioning from the edge. Proceedings of the 29th conference on Information communications. (291-295).

    /doi/10.5555/1833515.1833574

  • Choffnes D, Sanchez M and Bustamante F. (2010). Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems IEEE INFOCOM 2010 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2010.5462225. 978-1-4244-5836-3. (1-5).

    http://ieeexplore.ieee.org/document/5462225/

  • Sun Y, Wang B and Chiu K. A Graph Clustering Approach to Computing Network Coordinates. Proceedings of the 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing. (129-136).

    https://doi.org/10.1109/PDP.2010.72

  • (2010). References. Overlay Networks. 10.1201/9781439813737-b. (217-234). Online publication date: 9-Feb-2010.

    http://www.crcnetbase.com/doi/10.1201/9781439813737-b

  • Lumezanu C, Baden R, Spring N and Bhattacharjee B. Triangle inequality variations in the internet. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement. (177-183).

    https://doi.org/10.1145/1644893.1644914

  • Wang L and Wu S. (2009). Protecting location privacy through Identity Diffusion Workshops (ICUMT). 10.1109/ICUMT.2009.5345458. 978-1-4244-3942-3. (1-4).

    http://ieeexplore.ieee.org/document/5345458/

  • Wang G, Shining Wu , Wang G, Deng B and Li X. (2009). Experimental study on neighbor selection policy for Phoenix Network Coordinate system Workshops (ICUMT). 10.1109/ICUMT.2009.5345351. 978-1-4244-3942-3. (1-5).

    http://ieeexplore.ieee.org/document/5345351/

  • Agarwal S and Lorch J. (2009). Matchmaking for online games and other latency-sensitive P2P systems. ACM SIGCOMM Computer Communication Review. 39:4. (315-326). Online publication date: 16-Aug-2009.

    https://doi.org/10.1145/1594977.1592605

  • Agarwal S and Lorch J. Matchmaking for online games and other latency-sensitive P2P systems. Proceedings of the ACM SIGCOMM 2009 conference on Data communication. (315-326).

    https://doi.org/10.1145/1592568.1592605

  • Sherr M, Blaze M and Loo B. Scalable Link-Based Relay Selection for Anonymous Routing. Proceedings of the 9th International Symposium on Privacy Enhancing Technologies. (73-93).

    https://doi.org/10.1007/978-3-642-03168-7_5

  • Kaafar M, Cantin F, Gueye B and Leduc G. (2009). Detecting Triangle Inequality Violations for Internet Coordinate Systems 2009 IEEE International Conference on Communications Workshops. 10.1109/ICCW.2009.5207998. 978-1-4244-3437-4. (1-6).

    http://ieeexplore.ieee.org/document/5207998/

  • Shamsi J and Brockmeyer M. QoSMap. Proceedings of the 2009 Fourth International Conference on Internet and Web Applications and Services. (58-67).

    https://doi.org/10.1109/ICIW.2009.17

  • Liao Y, Kaafar M, Gueye B, Cantin F, Geurts P and Leduc G. Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning. Proceedings of the 8th International IFIP-TC 6 Networking Conference. (352-363).

    https://doi.org/10.1007/978-3-642-01399-7_28

  • Chen Y, Wang X, Song X, Lua E, Shi C, Zhao X, Deng B and Li X. Phoenix. Proceedings of the 8th International IFIP-TC 6 Networking Conference. (313-325).

    https://doi.org/10.1007/978-3-642-01399-7_25

  • Lumezanu C, Baden R, Spring N and Bhattacharjee B. Triangle Inequality and Routing Policy Violations in the Internet. Proceedings of the 10th International Conference on Passive and Active Network Measurement. (45-54).

    https://doi.org/10.1007/978-3-642-00975-4_5

  • Wang X, Chen Y, Deng B and Li X. Nonlinear modeling of the internet delay structure. Proceedings of the 2008 ACM CoNEXT Conference. (1-2).

    https://doi.org/10.1145/1544012.1544043

  • Abrahao B and Kleinberg R. On the internet delay space dimensionality. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. (157-168).

    https://doi.org/10.1145/1452520.1452541

  • Wang G and Ng T. Distributed algorithms for stable and secure network coordinates. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. (131-144).

    https://doi.org/10.1145/1452520.1452537

  • Kaafar M, Gueye B, Cantin F, Leduc G and Mathy L. (2008). Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations. NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet. 10.1007/978-3-540-79549-0_35. (397-408).

    http://link.springer.com/10.1007/978-3-540-79549-0_35