Xiansi Tan

  • Citations Per Year
Learn More
Time-slotted optical burst switched network is a new paradigm to support IP over WDM by combining time division multiplexing and optical burst switching technology. This paper presents a framework to evaluate blocking performance of time-slotted OBS networks with multi-fiber wavelength channels. The model is applied to analyze effect of the change of(More)
This paper addresses the dynamic traffic grooming problem in wavelength-division-multiplexed (WDM) mesh optical networks subject to wavelength constraint and transceiver constraint. As an improvement over the existing link bundled auxiliary graph (LBAG) model which thinks all traffic streams must go though the grooming fabric before entering the wavelength(More)
We propose an intermediate computational step, frequency domain filtering of gradient image, to improve contour detection performance of gradient-based edge detectors. This step is inspired by analyzing the spectrum distribution of object contours and texture edges in the frequency domain of gradient image. We illustrate the principle and effect of this(More)
As optical networks grow form SONET rings to arbitrary mesh topology, traffic grooming on wavelength-division multiplexing (WDM) mesh networks have become an extremely important research issue. To solve this problem, we propose a transceiver saving auxiliary graph (TSAG) model for traffic grooming in WDM mesh networks. Based on the proposed auxiliary graph,(More)
This paper addresses the traffic grooming problem in wavelength-division multiplexing (WDM) mesh networks. We first introduce a transceiver saving auxiliary graph model, in which various grooming policies can easily be achieved by assigning weight values for various edges. Then we propose a resource efficient grooming policy (REGP) based on the graph model,(More)
an analytical framework for the performance of different protection switching restoration mechanisms with different protection policies in Multi-Protocol Label Switching (MPLS) networks is developed, where the protection policy may be 1+1, 1:1,n:1 orn:m. As a general rule, it aims at the MPLS networks with the protection paths created in advance, of fault(More)
  • 1