T. Erlebach and M. Ruegg, ''Optimal bandwidth reservation in hose-model VPNs with multi-path routing,'' in Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004) (IEEE, 2004), pp. 2275-2282.

A. Jüttner, I. Szabó, and A. Szentesi, ''On bandwith efficiency of the hose resource managment model in virtual private networks,'' in Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003) (IEEE, 2003), pp. 386-395.

M. Maliosz and T. Cinkler, ''Methods for optical VPN design over multifiber wavelength routing networks,'' in Proceedings of the 7th IFIP Working Conference on Optical Design & Modelling (ONDM) (Elsevier, 2003).

A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, ''Deriving traffic demands for operational IP networks: methodology and experience,'' in ACM SIGCOMM 2000 (Association for Computing Machinery, 2003), pp. 257-270.

N. Duffield, C. Lund, and M. Thorup, ''Estimating flow distributions from sampled flow statistics,'' in ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 325-336.

Y. Zhang, M. Roughan, C. Lund, and D. Donoho, ''An information-theoretic approach to traffic matrix estimation,'' in (ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 301-312

B. G. Józsa, D. Orincsay, and A. Kern, ''On the use of routing optimization for virtual private network design,'' in Proceedings of the 7th IFIP Working Conference on Optical Network Design and Modelling (ONDM) (Elsevier, 2003).

G. Italiano, R. Rastogi, and B. Yener, ''Restoration algorithms for virtual private networks in the hose model,'' in Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002) (IEEE, 2002), pp. 131-139.

S. Raghunath, K. Chandrayana, and S. Kalyanaraman, ''Edge-based QoS provisioning for point-to-set assured services,'' in International Conference on Communications (ICC '02) (IEEE, 2002), pp. 1128-1134.

A. Kumar, R. Rastogi, A. Silberschatz, and B. Yener, ''Algorithms for provisioning virtual private networks in the hose model,'' in ACM SIGCOMM 2001 (Association for Computing Machinery, 2001), pp. 135-148.

S. Bhattacharyya, C. Diot, J. Jetcheva, and N. Taft, ''POP-level and access-link-level traffic dynamics in a tier-1 POP,'' in Internet Measurement Workshop (IMW) (Association for Computing Machinery, 2001), pp. 39-53.

M. Pióro, A. Myslek, A. Jüttner, J. Harmatos, and A. Szentesi, ''Topological design of MPLS networks,'' in Global Telecommunications Conference (GLOBECOM 2001) (IEEE, 2001), pp. 12-16.

''AT&Tx2019's internet backbone network,'' http://www.cybergeography.org/atlas/morelowbarisplowbarmaps.html (2000).

T. Cinkler, T. Henk, and G. Gordos, ''Stochastic algorithms for design of thrifty single-failure-protected networks,'' in Proceedings of Design of Reliable Communications Networks DRCN 2000 (2000).

N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. V. der Merwe, ''A flexible model for resource management in virtual private networks,'' in ACM SIGCOMM '99 (Association for Computing Machinery, 1999), pp. 95-108.

M. Pióro and P. Gajowniczek, ''Solving multicommodity integral flow problems by simulated allocation,'' Telecommun. Syst. 1, 17-28 (1997).

J. A. Fingerhut, S. Suri, and J. S. Turner, ''Designing least-cost nonblocking broadband networks,'' J. Algorithms 24, 287-309 (1997).

[Crossref]

J. A. Fingerhut, ''Approximation algorithms for configuring nonblocking communication networks,'' Ph.D. dissertation (Washington University, 1994).

R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications (Prentice-Hall, 1993).

M. Minoux, ''Network synthesis and optimum network design problems: models, solution methods and applications,'' Networks 13, 313-360 (1989).

R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications (Prentice-Hall, 1993).

M. Berkelaar and J. Dirks, ''lplowbarsolve 4.0,'' ftp://ftp.es.ele.tue.nl/pub/lplowbarsolve.

S. Bhattacharyya, C. Diot, J. Jetcheva, and N. Taft, ''POP-level and access-link-level traffic dynamics in a tier-1 POP,'' in Internet Measurement Workshop (IMW) (Association for Computing Machinery, 2001), pp. 39-53.

S. Raghunath, K. Chandrayana, and S. Kalyanaraman, ''Edge-based QoS provisioning for point-to-set assured services,'' in International Conference on Communications (ICC '02) (IEEE, 2002), pp. 1128-1134.

M. Maliosz and T. Cinkler, ''Methods for optical VPN design over multifiber wavelength routing networks,'' in Proceedings of the 7th IFIP Working Conference on Optical Design & Modelling (ONDM) (Elsevier, 2003).

T. Cinkler, T. Henk, and G. Gordos, ''Stochastic algorithms for design of thrifty single-failure-protected networks,'' in Proceedings of Design of Reliable Communications Networks DRCN 2000 (2000).

N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. V. der Merwe, ''A flexible model for resource management in virtual private networks,'' in ACM SIGCOMM '99 (Association for Computing Machinery, 1999), pp. 95-108.

S. Bhattacharyya, C. Diot, J. Jetcheva, and N. Taft, ''POP-level and access-link-level traffic dynamics in a tier-1 POP,'' in Internet Measurement Workshop (IMW) (Association for Computing Machinery, 2001), pp. 39-53.

M. Berkelaar and J. Dirks, ''lplowbarsolve 4.0,'' ftp://ftp.es.ele.tue.nl/pub/lplowbarsolve.

Y. Zhang, M. Roughan, C. Lund, and D. Donoho, ''An information-theoretic approach to traffic matrix estimation,'' in (ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 301-312

N. Duffield, C. Lund, and M. Thorup, ''Estimating flow distributions from sampled flow statistics,'' in ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 325-336.

N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. V. der Merwe, ''A flexible model for resource management in virtual private networks,'' in ACM SIGCOMM '99 (Association for Computing Machinery, 1999), pp. 95-108.

T. Erlebach and M. Ruegg, ''Optimal bandwidth reservation in hose-model VPNs with multi-path routing,'' in Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004) (IEEE, 2004), pp. 2275-2282.

A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, ''Deriving traffic demands for operational IP networks: methodology and experience,'' in ACM SIGCOMM 2000 (Association for Computing Machinery, 2003), pp. 257-270.

J. A. Fingerhut, S. Suri, and J. S. Turner, ''Designing least-cost nonblocking broadband networks,'' J. Algorithms 24, 287-309 (1997).

[Crossref]

J. A. Fingerhut, ''Approximation algorithms for configuring nonblocking communication networks,'' Ph.D. dissertation (Washington University, 1994).

M. Pióro and P. Gajowniczek, ''Solving multicommodity integral flow problems by simulated allocation,'' Telecommun. Syst. 1, 17-28 (1997).

T. Cinkler, T. Henk, and G. Gordos, ''Stochastic algorithms for design of thrifty single-failure-protected networks,'' in Proceedings of Design of Reliable Communications Networks DRCN 2000 (2000).

N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. V. der Merwe, ''A flexible model for resource management in virtual private networks,'' in ACM SIGCOMM '99 (Association for Computing Machinery, 1999), pp. 95-108.

A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, ''Deriving traffic demands for operational IP networks: methodology and experience,'' in ACM SIGCOMM 2000 (Association for Computing Machinery, 2003), pp. 257-270.

N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. V. der Merwe, ''A flexible model for resource management in virtual private networks,'' in ACM SIGCOMM '99 (Association for Computing Machinery, 1999), pp. 95-108.

M. Pióro, A. Myslek, A. Jüttner, J. Harmatos, and A. Szentesi, ''Topological design of MPLS networks,'' in Global Telecommunications Conference (GLOBECOM 2001) (IEEE, 2001), pp. 12-16.

T. Cinkler, T. Henk, and G. Gordos, ''Stochastic algorithms for design of thrifty single-failure-protected networks,'' in Proceedings of Design of Reliable Communications Networks DRCN 2000 (2000).

G. Italiano, R. Rastogi, and B. Yener, ''Restoration algorithms for virtual private networks in the hose model,'' in Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002) (IEEE, 2002), pp. 131-139.

S. Bhattacharyya, C. Diot, J. Jetcheva, and N. Taft, ''POP-level and access-link-level traffic dynamics in a tier-1 POP,'' in Internet Measurement Workshop (IMW) (Association for Computing Machinery, 2001), pp. 39-53.

B. G. Józsa, D. Orincsay, and A. Kern, ''On the use of routing optimization for virtual private network design,'' in Proceedings of the 7th IFIP Working Conference on Optical Network Design and Modelling (ONDM) (Elsevier, 2003).

A. Jüttner, I. Szabó, and A. Szentesi, ''On bandwith efficiency of the hose resource managment model in virtual private networks,'' in Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003) (IEEE, 2003), pp. 386-395.

M. Pióro, A. Myslek, A. Jüttner, J. Harmatos, and A. Szentesi, ''Topological design of MPLS networks,'' in Global Telecommunications Conference (GLOBECOM 2001) (IEEE, 2001), pp. 12-16.

S. Raghunath, K. Chandrayana, and S. Kalyanaraman, ''Edge-based QoS provisioning for point-to-set assured services,'' in International Conference on Communications (ICC '02) (IEEE, 2002), pp. 1128-1134.

B. G. Józsa, D. Orincsay, and A. Kern, ''On the use of routing optimization for virtual private network design,'' in Proceedings of the 7th IFIP Working Conference on Optical Network Design and Modelling (ONDM) (Elsevier, 2003).

A. Kumar, R. Rastogi, A. Silberschatz, and B. Yener, ''Algorithms for provisioning virtual private networks in the hose model,'' in ACM SIGCOMM 2001 (Association for Computing Machinery, 2001), pp. 135-148.

A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, ''Deriving traffic demands for operational IP networks: methodology and experience,'' in ACM SIGCOMM 2000 (Association for Computing Machinery, 2003), pp. 257-270.

Y. Zhang, M. Roughan, C. Lund, and D. Donoho, ''An information-theoretic approach to traffic matrix estimation,'' in (ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 301-312

N. Duffield, C. Lund, and M. Thorup, ''Estimating flow distributions from sampled flow statistics,'' in ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 325-336.

R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications (Prentice-Hall, 1993).

M. Maliosz and T. Cinkler, ''Methods for optical VPN design over multifiber wavelength routing networks,'' in Proceedings of the 7th IFIP Working Conference on Optical Design & Modelling (ONDM) (Elsevier, 2003).

M. Minoux, ''Network synthesis and optimum network design problems: models, solution methods and applications,'' Networks 13, 313-360 (1989).

N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. V. der Merwe, ''A flexible model for resource management in virtual private networks,'' in ACM SIGCOMM '99 (Association for Computing Machinery, 1999), pp. 95-108.

M. Pióro, A. Myslek, A. Jüttner, J. Harmatos, and A. Szentesi, ''Topological design of MPLS networks,'' in Global Telecommunications Conference (GLOBECOM 2001) (IEEE, 2001), pp. 12-16.

B. G. Józsa, D. Orincsay, and A. Kern, ''On the use of routing optimization for virtual private network design,'' in Proceedings of the 7th IFIP Working Conference on Optical Network Design and Modelling (ONDM) (Elsevier, 2003).

R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications (Prentice-Hall, 1993).

M. Pióro, A. Myslek, A. Jüttner, J. Harmatos, and A. Szentesi, ''Topological design of MPLS networks,'' in Global Telecommunications Conference (GLOBECOM 2001) (IEEE, 2001), pp. 12-16.

M. Pióro and P. Gajowniczek, ''Solving multicommodity integral flow problems by simulated allocation,'' Telecommun. Syst. 1, 17-28 (1997).

S. Raghunath, K. Chandrayana, and S. Kalyanaraman, ''Edge-based QoS provisioning for point-to-set assured services,'' in International Conference on Communications (ICC '02) (IEEE, 2002), pp. 1128-1134.

N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. V. der Merwe, ''A flexible model for resource management in virtual private networks,'' in ACM SIGCOMM '99 (Association for Computing Machinery, 1999), pp. 95-108.

G. Italiano, R. Rastogi, and B. Yener, ''Restoration algorithms for virtual private networks in the hose model,'' in Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002) (IEEE, 2002), pp. 131-139.

A. Kumar, R. Rastogi, A. Silberschatz, and B. Yener, ''Algorithms for provisioning virtual private networks in the hose model,'' in ACM SIGCOMM 2001 (Association for Computing Machinery, 2001), pp. 135-148.

A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, ''Deriving traffic demands for operational IP networks: methodology and experience,'' in ACM SIGCOMM 2000 (Association for Computing Machinery, 2003), pp. 257-270.

A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, ''Deriving traffic demands for operational IP networks: methodology and experience,'' in ACM SIGCOMM 2000 (Association for Computing Machinery, 2003), pp. 257-270.

Y. Zhang, M. Roughan, C. Lund, and D. Donoho, ''An information-theoretic approach to traffic matrix estimation,'' in (ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 301-312

T. Erlebach and M. Ruegg, ''Optimal bandwidth reservation in hose-model VPNs with multi-path routing,'' in Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004) (IEEE, 2004), pp. 2275-2282.

A. Kumar, R. Rastogi, A. Silberschatz, and B. Yener, ''Algorithms for provisioning virtual private networks in the hose model,'' in ACM SIGCOMM 2001 (Association for Computing Machinery, 2001), pp. 135-148.

J. A. Fingerhut, S. Suri, and J. S. Turner, ''Designing least-cost nonblocking broadband networks,'' J. Algorithms 24, 287-309 (1997).

[Crossref]

A. Jüttner, I. Szabó, and A. Szentesi, ''On bandwith efficiency of the hose resource managment model in virtual private networks,'' in Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003) (IEEE, 2003), pp. 386-395.

A. Jüttner, I. Szabó, and A. Szentesi, ''On bandwith efficiency of the hose resource managment model in virtual private networks,'' in Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003) (IEEE, 2003), pp. 386-395.

M. Pióro, A. Myslek, A. Jüttner, J. Harmatos, and A. Szentesi, ''Topological design of MPLS networks,'' in Global Telecommunications Conference (GLOBECOM 2001) (IEEE, 2001), pp. 12-16.

S. Bhattacharyya, C. Diot, J. Jetcheva, and N. Taft, ''POP-level and access-link-level traffic dynamics in a tier-1 POP,'' in Internet Measurement Workshop (IMW) (Association for Computing Machinery, 2001), pp. 39-53.

N. Duffield, C. Lund, and M. Thorup, ''Estimating flow distributions from sampled flow statistics,'' in ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 325-336.

A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, ''Deriving traffic demands for operational IP networks: methodology and experience,'' in ACM SIGCOMM 2000 (Association for Computing Machinery, 2003), pp. 257-270.

J. A. Fingerhut, S. Suri, and J. S. Turner, ''Designing least-cost nonblocking broadband networks,'' J. Algorithms 24, 287-309 (1997).

[Crossref]

G. Italiano, R. Rastogi, and B. Yener, ''Restoration algorithms for virtual private networks in the hose model,'' in Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002) (IEEE, 2002), pp. 131-139.

A. Kumar, R. Rastogi, A. Silberschatz, and B. Yener, ''Algorithms for provisioning virtual private networks in the hose model,'' in ACM SIGCOMM 2001 (Association for Computing Machinery, 2001), pp. 135-148.

Y. Zhang, M. Roughan, C. Lund, and D. Donoho, ''An information-theoretic approach to traffic matrix estimation,'' in (ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 301-312

J. A. Fingerhut, S. Suri, and J. S. Turner, ''Designing least-cost nonblocking broadband networks,'' J. Algorithms 24, 287-309 (1997).

[Crossref]

M. Minoux, ''Network synthesis and optimum network design problems: models, solution methods and applications,'' Networks 13, 313-360 (1989).

M. Pióro and P. Gajowniczek, ''Solving multicommodity integral flow problems by simulated allocation,'' Telecommun. Syst. 1, 17-28 (1997).

T. Cinkler, T. Henk, and G. Gordos, ''Stochastic algorithms for design of thrifty single-failure-protected networks,'' in Proceedings of Design of Reliable Communications Networks DRCN 2000 (2000).

M. Maliosz and T. Cinkler, ''Methods for optical VPN design over multifiber wavelength routing networks,'' in Proceedings of the 7th IFIP Working Conference on Optical Design & Modelling (ONDM) (Elsevier, 2003).

A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, ''Deriving traffic demands for operational IP networks: methodology and experience,'' in ACM SIGCOMM 2000 (Association for Computing Machinery, 2003), pp. 257-270.

N. Duffield, C. Lund, and M. Thorup, ''Estimating flow distributions from sampled flow statistics,'' in ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 325-336.

Y. Zhang, M. Roughan, C. Lund, and D. Donoho, ''An information-theoretic approach to traffic matrix estimation,'' in (ACM SIGCOMM 2003 (Association for Computing Machinery, 2003), pp. 301-312

M. Pióro, A. Myslek, A. Jüttner, J. Harmatos, and A. Szentesi, ''Topological design of MPLS networks,'' in Global Telecommunications Conference (GLOBECOM 2001) (IEEE, 2001), pp. 12-16.

A. Jüttner, I. Szabó, and A. Szentesi, ''On bandwith efficiency of the hose resource managment model in virtual private networks,'' in Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003) (IEEE, 2003), pp. 386-395.

J. A. Fingerhut, ''Approximation algorithms for configuring nonblocking communication networks,'' Ph.D. dissertation (Washington University, 1994).

N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. V. der Merwe, ''A flexible model for resource management in virtual private networks,'' in ACM SIGCOMM '99 (Association for Computing Machinery, 1999), pp. 95-108.

A. Kumar, R. Rastogi, A. Silberschatz, and B. Yener, ''Algorithms for provisioning virtual private networks in the hose model,'' in ACM SIGCOMM 2001 (Association for Computing Machinery, 2001), pp. 135-148.

G. Italiano, R. Rastogi, and B. Yener, ''Restoration algorithms for virtual private networks in the hose model,'' in Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002) (IEEE, 2002), pp. 131-139.

S. Raghunath, K. Chandrayana, and S. Kalyanaraman, ''Edge-based QoS provisioning for point-to-set assured services,'' in International Conference on Communications (ICC '02) (IEEE, 2002), pp. 1128-1134.

T. Erlebach and M. Ruegg, ''Optimal bandwidth reservation in hose-model VPNs with multi-path routing,'' in Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004) (IEEE, 2004), pp. 2275-2282.

M. Berkelaar and J. Dirks, ''lplowbarsolve 4.0,'' ftp://ftp.es.ele.tue.nl/pub/lplowbarsolve.

''AT&Tx2019's internet backbone network,'' http://www.cybergeography.org/atlas/morelowbarisplowbarmaps.html (2000).

S. Bhattacharyya, C. Diot, J. Jetcheva, and N. Taft, ''POP-level and access-link-level traffic dynamics in a tier-1 POP,'' in Internet Measurement Workshop (IMW) (Association for Computing Machinery, 2001), pp. 39-53.

B. G. Józsa, D. Orincsay, and A. Kern, ''On the use of routing optimization for virtual private network design,'' in Proceedings of the 7th IFIP Working Conference on Optical Network Design and Modelling (ONDM) (Elsevier, 2003).

R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications (Prentice-Hall, 1993).