Research Article
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective
Algorithm 3
Evaluation of related nodes.
Input: SFC request; | ; | bool direction; | X: ; | Output: the node which has the minimum value of ; | Temp = | int i= 0; | if direction is true | i= X-1; | end if | if direction is false | i= X+1; | end if | for do | if | if && && ; | Compute according to Equation (7); | if < Temp | Temp = δ; | = ; | end if | end if | end if | end for | return . |
|