{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T05:29:34Z","timestamp":1725946174691},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319738291"},{"type":"electronic","value":"9783319738307"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-73830-7_36","type":"book-chapter","created":{"date-parts":[[2018,1,17]],"date-time":"2018-01-17T14:13:00Z","timestamp":1516198380000},"page":"365-374","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Algorithm for Traffic Engineering in Multi-domain Networks"],"prefix":"10.1007","author":[{"given":"Jian","family":"Sun","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Siyu","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Ke","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Dan","family":"Liao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Victor","family":"Chang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,1,18]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Dastjerdi, A.V., Gupta, H., Calheiros, R.N., et al.: Fog computing: principles, architectures, and applications. arXiv preprint arXiv:1601.02752 (2016)","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"36_CR2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.jnca.2016.01.010","volume":"67","author":"M D\u00edaz","year":"2016","unstructured":"D\u00edaz, M., Mart\u00edn, C., Rubio, B.: State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 67, 99\u2013117 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"36_CR3","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s11277-011-0288-5","volume":"58","author":"D Bandyopadhyay","year":"2011","unstructured":"Bandyopadhyay, D., Sen, J.: Internet of things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49\u201369 (2011)","journal-title":"Wirel. Pers. Commun."},{"key":"36_CR4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.jnca.2016.10.011","volume":"89","author":"G Sun","year":"2017","unstructured":"Sun, G., Chang, V., Ramachandran, M., et al.: Efficient location privacy algorithm for internet of things services and applications. J. Netw. Comput. Appl. 89, 3\u201313 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Sohal, A.S., Sandhu, R., Sood, S.K., et al.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. (2017)","DOI":"10.1016\/j.cose.2017.08.016"},{"key":"36_CR6","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.knosys.2017.03.003","volume":"127","author":"V Chang","year":"2017","unstructured":"Chang, V.: Towards data analysis for weather cloud computing. Knowl.-Based Syst. 127, 29\u201345 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"36_CR7","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.jnca.2016.11.024","volume":"86","author":"G Sun","year":"2017","unstructured":"Sun, G., Xie, Y., Liao, D., et al.: User-defined privacy location-sharing system in mobile online social networks. J. Netw. Comput. Appl. 86, 34\u201345 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"36_CR8","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1007\/s11107-012-0372-0","volume":"24","author":"G Sun","year":"2012","unstructured":"Sun, G., Yu, H., Anand, V., et al.: Optimal provisioning for virtual network request in cloud-based data centers. Photon. Netw. Commun. 24(2), 118\u2013131 (2012)","journal-title":"Photon. Netw. Commun."},{"issue":"3","key":"36_CR9","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/TC.2013.2297306","volume":"64","author":"Y Al Ridhawi","year":"2015","unstructured":"Al Ridhawi, Y., Karmouch, A.: QoS-based composition of service specific overlay networks. IEEE Trans. Comput. 64(3), 832\u2013846 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"36_CR10","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.cor.2014.11.003","volume":"57","author":"Y Chen","year":"2015","unstructured":"Chen, Y., Radhakrishnan, S., Dhall, S., et al.: The service overlay network design problem for interactive internet applications. Comput. Oper. Res. 57, 73\u201382 (2015)","journal-title":"Comput. Oper. Res."},{"key":"36_CR11","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.adhoc.2015.09.001","volume":"37","author":"R Liu","year":"2016","unstructured":"Liu, R., Liu, H., Kwak, D., et al.: Balanced traffic routing: design, implementation, and evaluation. Ad Hoc Netw. 37, 14\u201328 (2016)","journal-title":"Ad Hoc Netw."},{"issue":"5","key":"36_CR12","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1016\/j.future.2012.08.002","volume":"29","author":"G Sun","year":"2013","unstructured":"Sun, G., Yu, H., Anand, V., et al.: A cost efficient framework and algorithm for embedding dynamic virtual network requests. Future Gener. Comput. Syst. 29(5), 1265\u20131277 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"36_CR13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/MNET.2005.1541715","volume":"19","author":"M Caesar","year":"2005","unstructured":"Caesar, M., Rexford, J.: BGP routing policies in ISP networks. IEEE Netw. 19, 5\u201311 (2005)","journal-title":"IEEE Netw."},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Sermpezis, P., Dimitropoulos, X.: Analysing the Effects of Routing Centralization on BGP Convergence Time. arXiv preprint arXiv:1605.08864 (2016)","DOI":"10.1145\/3003977.3003988"}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-73830-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T13:08:39Z","timestamp":1570626519000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-73830-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319738291","9783319738307"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-73830-7_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}