{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:54Z","timestamp":1725520674034},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_28","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T07:31:09Z","timestamp":1224487869000},"page":"219-226","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Algorithm for Freeing Network from Points of Failure"],"prefix":"10.1007","author":[{"given":"Rahul","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Suneeta","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","volume-title":"Computer Networks","author":"A.S. Tanenbaum","year":"2004","unstructured":"Tanenbaum, A.S.: Computer Networks, 4th edn. Pearson Education, London (2004)","edition":"4"},{"key":"28_CR2","volume-title":"Interconnections: Bridges, Routers, Switches, and Internetworking Protocols","author":"R. Pearlman","year":"2006","unstructured":"Pearlman, R.: Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, 2nd edn. Pearson Education, London (2006)","edition":"2"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Kamiyana, N.: Network Topology Design Using Data Envelopment Analysis. In: IEEE Global Telecommunications Conference (2007)","DOI":"10.1109\/GLOCOM.2007.101"},{"issue":"1","key":"28_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/24.589921","volume":"46","author":"B. Dengiz","year":"1997","unstructured":"Dengiz, B., Altiparmak, F., Smith, A.E.: Efficient optimization of all-terminal reliable networks, using an evolutionary approach. IEEE Transactions on Reliability\u00a046(1), 18\u201326 (1997)","journal-title":"IEEE Transactions on Reliability"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Mandal, S., Saha, D., Mukherjee, R., Roy, A.: An efficient algorithm for designing optimal backbone topology for a communication network. In: International Conference on Communication Technology, vol.\u00a01, pp. 103\u2013106 (2003)","DOI":"10.1109\/ICCT.2003.1209046"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Ray, G.A., Dunsmore, J.J.: Reliability of network topologies. In: IEEE INFOCOM 1988 Networks, pp. 842\u2013850 (1988)","DOI":"10.1109\/INFCOM.1988.12999"},{"key":"28_CR7","unstructured":"Horowitz, E., Sahni, S., Anderson-Freed, S.: Fundamentals of Data Structures in C, 8th edn. Computer Science Press (1998)"},{"key":"28_CR8","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. Prentice-Hall, India (2004)"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:57:04Z","timestamp":1619510224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_28","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}