Obtaining Provably Legitimate Internet Topologies. He, Y., Faloutsos, M., Krishnamurthy, S. V., & Chrobak, M. IEEE/ACM Trans. Netw., 20(1):271–284, 2012. Paper doi bibtex @article{DBLP:journals/ton/HeFKC12,
author = {Yihua He and
Michalis Faloutsos and
Srikanth V. Krishnamurthy and
Marek Chrobak},
title = {Obtaining Provably Legitimate Internet Topologies},
journal = {{IEEE/ACM} Trans. Netw.},
volume = {20},
number = {1},
pages = {271--284},
year = {2012},
url = {https://doi.org/10.1109/TNET.2011.2159272},
doi = {10.1109/TNET.2011.2159272},
timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ton/HeFKC12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"awwGSkQLgcJEbsLEX","bibbaseid":"he-faloutsos-krishnamurthy-chrobak-obtainingprovablylegitimateinternettopologies-2012","authorIDs":[],"author_short":["He, Y.","Faloutsos, M.","Krishnamurthy, S. V.","Chrobak, M."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Yihua"],"propositions":[],"lastnames":["He"],"suffixes":[]},{"firstnames":["Michalis"],"propositions":[],"lastnames":["Faloutsos"],"suffixes":[]},{"firstnames":["Srikanth","V."],"propositions":[],"lastnames":["Krishnamurthy"],"suffixes":[]},{"firstnames":["Marek"],"propositions":[],"lastnames":["Chrobak"],"suffixes":[]}],"title":"Obtaining Provably Legitimate Internet Topologies","journal":"IEEE/ACM Trans. Netw.","volume":"20","number":"1","pages":"271–284","year":"2012","url":"https://doi.org/10.1109/TNET.2011.2159272","doi":"10.1109/TNET.2011.2159272","timestamp":"Mon, 26 Oct 2020 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/ton/HeFKC12.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/ton/HeFKC12,\n author = {Yihua He and\n Michalis Faloutsos and\n Srikanth V. Krishnamurthy and\n Marek Chrobak},\n title = {Obtaining Provably Legitimate Internet Topologies},\n journal = {{IEEE/ACM} Trans. Netw.},\n volume = {20},\n number = {1},\n pages = {271--284},\n year = {2012},\n url = {https://doi.org/10.1109/TNET.2011.2159272},\n doi = {10.1109/TNET.2011.2159272},\n timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/ton/HeFKC12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["He, Y.","Faloutsos, M.","Krishnamurthy, S. V.","Chrobak, M."],"key":"DBLP:journals/ton/HeFKC12","id":"DBLP:journals/ton/HeFKC12","bibbaseid":"he-faloutsos-krishnamurthy-chrobak-obtainingprovablylegitimateinternettopologies-2012","role":"author","urls":{"Paper":"https://doi.org/10.1109/TNET.2011.2159272"},"metadata":{"authorlinks":{}},"html":""},"bibtype":"article","biburl":"https://dblp.org/pid/f/MichalisFaloutsos.bib","creationDate":"2020-07-05T21:25:27.871Z","downloads":0,"keywords":[],"search_terms":["obtaining","provably","legitimate","internet","topologies","he","faloutsos","krishnamurthy","chrobak"],"title":"Obtaining Provably Legitimate Internet Topologies","year":2012,"dataSources":["nE2ivoWy72sz7kvve"]}