{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:02:13Z","timestamp":1743080533939,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642375019"},{"type":"electronic","value":"9783642375026"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37502-6_144","type":"book-chapter","created":{"date-parts":[[2013,5,7]],"date-time":"2013-05-07T08:25:55Z","timestamp":1367915155000},"page":"1237-1247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Genetic Algorithm for Solving Survivable Network Design with Simultaneous Unicast and Anycast Flows"],"prefix":"10.1007","author":[{"given":"Huynh Thi Thanh","family":"Binh","sequence":"first","affiliation":[]},{"given":"Son Hong","family":"Ngo","sequence":"additional","affiliation":[]},{"given":"Dat Ngoc","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"144_CR1","doi-asserted-by":"crossref","unstructured":"G\u0142adysz J et al (2010) Tabu search algorithm for survivable network design problem with simultaneous unicast and anycast flows. Int J Electron Telecommun 56(1):41-48, Versita Publisher, Warsaw","DOI":"10.2478\/v10177-010-0005-4"},{"key":"#cr-split#-144_CR2.1","unstructured":"Walkowiak K (2008) Optimization of unicast and anycast flows in connection-oriented networks. In: Gervas O"},{"key":"#cr-split#-144_CR2.2","unstructured":"(ed) Proceedings of computational science and its applications-ICCSA 2008, LNCS, vol 5072. Springer, Perugia, pp 797-807"},{"key":"144_CR3","unstructured":"Anycast vs Unicast. http:\/\/communitydns.eu\/Anycast.pdf. Accessed 18 July 2012"},{"key":"144_CR4","doi-asserted-by":"crossref","unstructured":"Walkowiak K (2006) A new function for optimization of working paths in survivable MPLS networks. In: Proceedings of computer and information sciences\u2014ISCIS 2006. Springer, Istanbul, pp 424\u2013433","DOI":"10.1007\/11902140_46"},{"key":"144_CR5","volume-title":"Mesh-based survivable networks: options and strategies for optical, MPLS SONET and ATM networking","author":"W Grover","year":"2004","unstructured":"Grover W (2004) Mesh-based survivable networks: options and strategies for optical, MPLS SONET and ATM networking. Prentice Hall PTR, New Jersey"},{"key":"144_CR6","unstructured":"Sharma V, Hellstrand F (2003) Framework for MPLS-based recovery. RFC 3469"},{"key":"144_CR7","doi-asserted-by":"crossref","unstructured":"Gladysz J, Walkowiak K (2009) Optimization of survivable networks with simultaneous unicast and anycast flows. In: Proceedings of ICUMT. Poland, pp 1\u20136","DOI":"10.1109\/ICUMT.2009.5345592"},{"key":"144_CR8","doi-asserted-by":"crossref","unstructured":"Binh H et al (2012) Heuristic algorithms for solving survivable network design problem with simultaneous unicast and anycast flows. In: Proceedings of 8th international conference on intelligence on computing, ICIC 2012. Huangshang, China, pp 137\u2013145","DOI":"10.1007\/978-3-642-31588-6_18"},{"key":"144_CR9","doi-asserted-by":"crossref","unstructured":"Nissen V, Gold S (2008) Survivable network design with an evolution strategy. In: Proceedings of success in evolutionary computation. Springer, Berlin, pp 263\u2013283","DOI":"10.1007\/978-3-540-76286-7_12"},{"key":"144_CR10","doi-asserted-by":"crossref","unstructured":"Pioro M, Medhi D (2004) Routing, flow, and capacity design in communication and computer networks. Morgan Kaufmann Publishers, San Francisco","DOI":"10.1016\/B978-012557189-0\/50011-1"},{"key":"144_CR11","volume-title":"Reactive search intelligent optimization","author":"R Battiti","year":"2008","unstructured":"Battiti R, Brunato M, Mascia F (2008) Reactive search intelligent optimization. Springer, New York"},{"key":"144_CR12","volume-title":"Network recovery: protection and restoration of optical, SONET-SDH IP and MPLS","author":"J Vasseur","year":"2004","unstructured":"Vasseur J, Pickavet M, Demeester P (2004) Network recovery: protection and restoration of optical, SONET-SDH IP and MPLS. Morgan Kaufmann, San Francisco"},{"key":"144_CR13","volume-title":"Algorithms of flow, capacity and topology structure in computer networks","author":"A Kasprzak","year":"1989","unstructured":"Kasprzak A (1989) Algorithms of flow, capacity and topology structure in computer networks. Monography, Wroclaw"},{"key":"144_CR14","doi-asserted-by":"crossref","unstructured":"Walkowiak K (2003) Anycast communication\u2014a new approach to survivability of connection-oriented networks. In: Proceedings of communications in computer and information science. Springer, Berlin, pp 378\u2013389","DOI":"10.1007\/978-3-540-73986-9_32"},{"key":"144_CR15","doi-asserted-by":"crossref","unstructured":"Johnson D, Deering S (1999) Reserved IPv6 subnet anycast addresses. RFC 2526","DOI":"10.17487\/rfc2526"},{"key":"144_CR16","doi-asserted-by":"crossref","unstructured":"Michalewicz Z (1995) Genetic algorithms\u00a0+\u00a0data structures\u00a0=\u00a0evolution programs, 3rd edn. Springer","DOI":"10.1007\/978-3-662-03315-9"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37502-6_144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T09:11:12Z","timestamp":1710839472000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-37502-6_144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642375019","9783642375026"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37502-6_144","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"8 May 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}