{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T21:21:20Z","timestamp":1773436880679,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540308188","type":"print"},{"value":"9783540315995","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596448_32","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T13:12:37Z","timestamp":1150549957000},"page":"224-229","source":"Crossref","is-referenced-by-count":2,"title":["On the Relevance of Using Gene Expression Programming in Destination-Based Traffic Engineering"],"prefix":"10.1007","author":[{"given":"Antoine B.","family":"Bagula","sequence":"first","affiliation":[]},{"given":"Hong F.","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Moy, J.: OSPF Version 2, Request For Comments (March 1994), http:\/\/www.ietf.org\/rfc\/rfc1583.txt","DOI":"10.17487\/rfc1583"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Fortz, B., Thorup, M.: Internet Traffic Engineering by Optimizing OSPF Weights. In: Proceedings of IEEE INFOCOM (March 2000)","DOI":"10.1109\/INFCOM.2000.832225"},{"key":"32_CR3","unstructured":"Riedl, A.: A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utlizing Bandwidth and Delay Metrics. In: Proceedings of the IPOM 2002 Conference (October 2002)"},{"issue":"2","key":"32_CR4","first-page":"87","volume":"13","author":"C. Ferreira","year":"2001","unstructured":"Ferreira, C.: Gene Expression Programming: A New Adaptive Algorithm for solving problems. Complex Systems\u00a013(2), 87\u2013129 (2001)","journal-title":"Complex Systems"},{"key":"32_CR5","unstructured":"Network Simulator, http:\/\/www.isi.edu\/nsnam\/ns\/"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596448_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:56:01Z","timestamp":1619506561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596448_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308188","9783540315995"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/11596448_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}