{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:12:15Z","timestamp":1725505935236},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540787600"},{"type":"electronic","value":"9783540787617"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-78761-7_5","type":"book-chapter","created":{"date-parts":[[2008,4,2]],"date-time":"2008-04-02T14:24:48Z","timestamp":1207146288000},"page":"38-51","source":"Crossref","is-referenced-by-count":0,"title":["A Self-learning Optimization Technique for Topology Design of Computer Networks"],"prefix":"10.1007","author":[{"given":"Angan","family":"Das","sequence":"first","affiliation":[]},{"given":"Ranga","family":"Vemuri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","volume-title":"Telecommunications network design algorithms","author":"A. Kershenbaum","year":"1993","unstructured":"Kershenbaum, A.: Telecommunications network design algorithms. McGraw-Hill, Inc., New York (1993)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"El-Alfy, E.S.: MPLS network topology design using genetic algorithms. In: Proc. of IEEE Intl. Conf. on Computer Systems and Applications, pp. 1059\u20131065 (March 2006)","DOI":"10.1109\/AICCSA.2006.205218"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Ghosh, P., Basu, K., Das, S.K.: GaMa: An evolutionary algorithmic approach for the design of mesh-based radio access networks. In: Proc. of IEEE Conf. on Local Computer Networks (November 2005)","DOI":"10.1109\/LCN.2005.72"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Elbaum, R., Sidi, M.: Topological design of local-area networks using genetic algorithms. IEEE\/ACM Transactions on Networking\u00a04(5) (1996)","DOI":"10.1109\/90.541324"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Quoitin, B.: Topology generation based on network design heuristics. In: Proc. of CoNEXT, pp. 278\u2013279 (2005)","DOI":"10.1145\/1095921.1095979"},{"issue":"3","key":"5_CR6","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/S0952-1976(02)00066-0","volume":"15","author":"H. Youssef","year":"2002","unstructured":"Youssef, H., Sait, S.M., Khan, S.A.: Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm. Engineering Applications of Artificial Intelligence\u00a015(3), 327\u2013340 (2002)","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Runggeratigul, S.: A memetic algorithm for communication network design taking into consideration an existing network. Applied Optimization - Metaheuristics: computer decision-making, 615\u2013626 (2004)","DOI":"10.1007\/978-1-4757-4137-7_29"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Pioro, M., Myslek, A., Juttner, A., Harmatos, J., Szentesi, A.: Topological design of MPLS networks. In: Proc. of IEEE Globecom, vol.\u00a01, pp. 12\u201316 (November 2001)","DOI":"10.1109\/GLOCOM.2001.965071"},{"issue":"4","key":"5_CR9","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/4235.942526","volume":"5","author":"J. Arabas","year":"2001","unstructured":"Arabas, J., Kozdrowski, S.: Applying an evolutionary algorithm to telecommunication network design. IEEE Transactions on Evolutionary Computation\u00a05(4), 309\u2013322 (2001)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"4","key":"5_CR10","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/4235.797971","volume":"3","author":"G.R. Harik","year":"1999","unstructured":"Harik, G.R., Lobo, F.G., Goldberg, D.E.: The compact genetic algorithm. IEEE Transactions on Evolutionary Computation\u00a03(4), 287\u2013297 (1999)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1162\/evco.1997.5.3.303","volume":"5","author":"H. Muhlenbein","year":"1997","unstructured":"Muhlenbein, H.: The equation for response to selection and its use for prediction. Evolutionary Computation\u00a05(3), 303\u2013346 (1997)","journal-title":"Evolutionary Computation"},{"key":"5_CR12","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Add.-Wesley Prof., London (1989)"},{"key":"5_CR13","unstructured":"Burkardt, J.: Halton random sequence generator, http:\/\/people.scs.fsu.edu\/~burkardt\/cpp_src\/halton\/halton.html"},{"issue":"2","key":"5_CR14","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1177\/003754970107600201","volume":"76","author":"Z.W. Geem","year":"2001","unstructured":"Geem, Z.W., Kim, J.H., Loganathan, G.V.: A new heuristic optimization algorithm: Harmony search. Simulation, the Society for Modeling and Simulation International\u00a076(2), 60\u201368 (2001)","journal-title":"Simulation, the Society for Modeling and Simulation International"},{"issue":"1","key":"5_CR15","doi-asserted-by":"crossref","first-page":"45","DOI":"10.3390\/mca10010045","volume":"10","author":"O. Yeniay","year":"2005","unstructured":"Yeniay, O.: Penalty function methods for constrained optimization with genetic algorithms. Mathematical and Computational Applications\u00a010(1), 45\u201356 (2005)","journal-title":"Mathematical and Computational Applications"},{"key":"5_CR16","unstructured":"GNU_Public_License: Integer linear programming (ILP) solver \u2018lp_solve\u2019, http:\/\/lpsolve.sourceforge.net\/5.5\/"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78761-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T20:23:01Z","timestamp":1557433381000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78761-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540787600","9783540787617"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78761-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}