{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:06:38Z","timestamp":1725764798617},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319042763"},{"type":"electronic","value":"9783319042770"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-04277-0_6","type":"book-chapter","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T07:33:24Z","timestamp":1387265604000},"page":"69-82","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Path Selection in Multihomed Nodes"],"prefix":"10.1007","author":[{"given":"Bruno","family":"Sousa","sequence":"first","affiliation":[]},{"given":"Kostas","family":"Pentikousis","sequence":"additional","affiliation":[]},{"given":"Marilia","family":"Curado","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Hou, R., Lui, K., Leung, K., Baker, F.: Approximation Algorithm for QoS Routing With Multiple Additive Constraints. In: ICC 2009, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/ICC.2009.5198760"},{"key":"6_CR2","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-642-37935-2_7","volume-title":"Mobile Networks and Management","author":"X. Li","year":"2013","unstructured":"Li, X., Mehani, O., Ag\u00fcero, R., Boreli, R., Zaki, Y., Toseef, U.: Evaluating User-Centric Multihomed Flow Management for Mobile Devices in Simulated Heterogeneous Networks. In: Timm-Giel, A., Strassner, J., Ag\u00fcero, R., Sargento, S., Pentikousis, K. (eds.) MONAMI 2012. LNICST, vol.\u00a058, pp. 84\u201398. Springer, Heidelberg (2013)"},{"issue":"4","key":"6_CR3","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/s11036-011-0318-2","volume":"16","author":"J. Choque","year":"2011","unstructured":"Choque, J., Ag\u00fcero, R., Mu\u00f1oz, L.: Optimum Selection of Access Networks Within Heterogeneous Wireless Environments Based on Linear Programming Techniques. Mob. Netw. Appl.\u00a016(4), 412\u2013423 (2011)","journal-title":"Mob. Netw. Appl."},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/978-3-642-22875-9_48","volume-title":"Smart Spaces and Next Generation Wired\/Wireless Networking","author":"M. Kucharzak","year":"2011","unstructured":"Kucharzak, M., Walkowiak, K.: On modelling of fair throughput allocation in overlay multicast networks. In: Balandin, S., Koucheryavy, Y., Hu, H. (eds.) NEW2AN 2011 and ruSMART 2011. LNCS, vol.\u00a06869, pp. 529\u2013540. Springer, Heidelberg (2011)"},{"issue":"17","key":"6_CR5","doi-asserted-by":"publisher","first-page":"13051","DOI":"10.1016\/j.eswa.2012.05.056","volume":"39","author":"M. Behzadian","year":"2012","unstructured":"Behzadian, M., Otaghsara, S.K., Yazdani, M., Ignatius, J.: A State-of The-Art Survey of TOPSIS Applications. Expert Systems with Applications\u00a039(17), 13051\u201313069 (2012)","journal-title":"Expert Systems with Applications"},{"issue":"12","key":"6_CR6","doi-asserted-by":"publisher","first-page":"7745","DOI":"10.1016\/j.eswa.2010.04.066","volume":"37","author":"C.-C. Sun","year":"2010","unstructured":"Sun, C.-C.: A Performance Evaluation Model by Integrating Fuzzy AHP and Fuzzy TOPSIS Methods. Expert Systems with Applications\u00a037(12), 7745\u20137754 (2010)","journal-title":"Expert Systems with Applications"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Nacef, B., Montavont, N.: A Generic End-Host Mechanism for Path Selection and Flow Distribution. In: Proc. PIMRC 2008. IEEE (September 2008)","DOI":"10.1109\/PIMRC.2008.4699676"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Tran, P.N., Boukhatem, N.: The Distance to The Ideal Alternative (DiA) Algorithm for Interface Selection in Heterogeneous Wireless Networks. In: Proc. MobiWac 2008 (October 2008)","DOI":"10.1145\/1454659.1454671"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Lahby, M., Cherkaoui, L., Adib, A.: New Optimized Network Selection Decision in Heterogeneous Wireless Networks. International Journal of Computer Applications\u00a054(16) (September 2012)","DOI":"10.5120\/8647-2550"},{"key":"6_CR10","first-page":"1","volume":"2007","author":"L. Ren","year":"2010","unstructured":"Ren, L., Zhang, Y., Wang, Y., Sun, Z.: Comparative Analysis of a Novel M-TOPSIS Method and TOPSIS. Applied Mathematics Research eXpress\u00a02007, 1\u201310 (2010)","journal-title":"Applied Mathematics Research eXpress"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Yeh, C.-H.: A Simulation Comparison of Normalization Procedures for TOPSIS. In: CIE 2009, pp. 1815\u20131820. IEEE (2009)","DOI":"10.1109\/ICCIE.2009.5223811"},{"key":"6_CR12","unstructured":"Sousa, B.: Evaluating MADM techniques, \n                    \n                      http:\/\/mcoa.dei.uc.pt\/doe\/\n                    \n                    \n                   (last Visit: May 12, 2013)"},{"key":"6_CR13","unstructured":"Montgomery, D.C.: Design and Analysis of Experiments. John Wiley & Sons (2008)"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.rcim.2011.09.005","volume":"28","author":"Y.T. \u0130\u00e7","year":"2012","unstructured":"\u0130\u00e7, Y.T.: An Experimental Design Approach Using TOPSIS Method for The Selection of Computer-Integrated Manufacturing Technologies. Robot. Comput.-Integr. Manuf.\u00a028(2), 245\u2013256 (2012)","journal-title":"Robot. Comput.-Integr. Manuf."},{"issue":"6","key":"6_CR15","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1016\/j.rcim.2008.03.013","volume":"24","author":"Y. Sandanayake","year":"2008","unstructured":"Sandanayake, Y., Oduoza, C., Proverbs, D.: A systematic modelling and simulation approach for jit performance optimisation. Robotics and Computer-Integrated Manufacturing\u00a024(6), 735\u2013743 (2008)","journal-title":"Robotics and Computer-Integrated Manufacturing"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Drago, I., Mellia, M., Munaf\u00f2, M.M., Sperotto, A., Sadre, R., Pras, A.: Inside dropbox: Understanding personal cloud storage services. In: Proceedings of the 12th ACM Internet Measurement Conference, IMC 2012 (2012)","DOI":"10.1145\/2398776.2398827"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., Zekauskas, M.: A One-way Active Measurement Protocol (OWAMP). IETF Request for Comments: 4656 (September 2006)","DOI":"10.17487\/rfc4656"},{"key":"6_CR18","unstructured":"Boote, J., Karp, A.: Internet 2 One-Way Ping (OWAMP) (2013),\n                    \n                      http:\/\/www.internet2.edu\/performance\/owamp\/index.html\n                    \n                    \n                   (last visit: May 12, 2013)"},{"key":"6_CR19","unstructured":"Boote, J., Brown, A.: Internet 2 Bandwidth Test Controller (BWCTL) (2013), \n                    \n                      http:\/\/www.internet2.edu\/performance\/bwctl\/index.html\n                    \n                    \n                   (last visit: May 12, 2013)"},{"key":"6_CR20","unstructured":"R Core Team, R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria (2012), ISBN 3-900051-07-0"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Networks and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04277-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T14:07:57Z","timestamp":1558793277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-04277-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319042763","9783319042770"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04277-0_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}