{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:36:39Z","timestamp":1766136999995,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T00:00:00Z","timestamp":1521676800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373149","61672329"],"award-info":[{"award-number":["61373149","61672329"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s00500-018-3152-7","type":"journal-article","created":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T05:01:00Z","timestamp":1521694860000},"page":"1453-1463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["A heuristic survivable virtual network mapping algorithm"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4873-4567","authenticated-orcid":false,"given":"Xiangwei","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Jie","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Xiancui","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Xinchun","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Xiaomei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"3152_CR1","first-page":"27","volume-title":"International conference on research in networking","author":"NF Butt","year":"2010","unstructured":"Butt NF, Chowdhury M, Boutaba R (2010) Topology-awareness and reoptimization mechanism for virtual network embedding. International conference on research in networking. Springer, Berlin, Heidelberg, pp 27\u201339"},{"issue":"4","key":"3152_CR2","doi-asserted-by":"publisher","first-page":"731","DOI":"10.3390\/s17040731","volume":"17","author":"LV Caraguay","year":"2017","unstructured":"Caraguay LV, Villalba LJG (2017) Monitoring and discovery for self-organized network management in virtualized and software defined networks. Sensors 17(4):731","journal-title":"Sensors"},{"issue":"1","key":"3152_CR3","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TNET.2011.2159308","volume":"20","author":"M Chowdhury","year":"2012","unstructured":"Chowdhury M, Rahman MR, Boutaba R (2012) Vineyard: virtual network embedding algorithms with coordinated node and link mapping. IEEE\/ACM Trans Netw 20(1):206\u2013219","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"7","key":"3152_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2009.5183468","volume":"47","author":"NMMK Chowdhury","year":"2009","unstructured":"Chowdhury NMMK, Boutaba R (2009) Network virtualization: state of the art and research challenges. IEEE Commun Mag 47(7):20\u201326","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"3152_CR5","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1016\/j.comnet.2009.10.017","volume":"54","author":"NMMK Chowdhury","year":"2010","unstructured":"Chowdhury NMMK, Boutaba R (2010) A survey of network virtualization. Comput Netw 54(5):862\u2013876","journal-title":"Comput Netw"},{"issue":"4","key":"3152_CR6","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"XL Da","year":"2014","unstructured":"Da XL, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inf 10(4):2233\u20132243","journal-title":"IEEE Trans Ind Inf"},{"key":"3152_CR7","doi-asserted-by":"crossref","unstructured":"Fajjari I, Aitsaadi N, Pujolle G (2011) Vnr algorithm: a greedy approach for virtual networks reconfigurations. In: Global Telecommunications Conference (GLOBECOM 2011). IEEE, pp 1\u20136","DOI":"10.1109\/GLOCOM.2011.6134006"},{"issue":"1","key":"3152_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1198255.1198265","volume":"37","author":"N Feamster","year":"2007","unstructured":"Feamster N, Gao L, Rexford J (2007) How to lease the internet in your spare time. ACM SIGCOMM Comput Commun Rev 37(1):61\u201364","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"1","key":"3152_CR9","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1109\/LAWP.2013.2259790","volume":"12","author":"GP Gao","year":"2013","unstructured":"Gao GP, Hu B, Zhang JS (2013) Design of a miniaturization printed circular-slot UWB antenna by the half-cutting method. IEEE Antennas Wireless Propag. Lett. 12(1):567\u2013570","journal-title":"IEEE Antennas Wireless Propag. Lett."},{"key":"3152_CR10","doi-asserted-by":"crossref","unstructured":"Gong L, Wen Y, Zhu Z (2014) Toward profit-seeking virtual network embedding algorithm via global resource capacity. In: Proceedings of the 2014 INFOCOM. IEEE, pp 1\u20139","DOI":"10.1109\/INFOCOM.2014.6847918"},{"issue":"5","key":"3152_CR11","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1109\/TNNLS.2016.2527796","volume":"28","author":"B Gu","year":"2017","unstructured":"Gu B, Sheng VS (2017) A robust regularization path algorithm for $$\\nu $$ \u03bd -support vector classification. IEEE Trans Neural Netw Learn Syst 28(5):1241\u20131248","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"3152_CR12","doi-asserted-by":"crossref","unstructured":"Hu Q, Wang Y, Cao X (2013) Resolve the virtual network embedding problem: a column generation approach. In: Proceedings of the 2013 INFOCOM. IEEE, pp 410\u2013414","DOI":"10.1109\/INFCOM.2013.6566805"},{"issue":"1","key":"3152_CR13","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MCOM.2012.6122544","volume":"50","author":"A Khan","year":"2012","unstructured":"Khan A, Zugenmaier A, Jurca D (2012) Network virtualization: a hypervisor for the internet? IEEE Commun Mag 50(1):136\u2013143","journal-title":"IEEE Commun Mag"},{"issue":"12","key":"3152_CR14","doi-asserted-by":"publisher","first-page":"3569","DOI":"10.1109\/TC.2015.2401017","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Chen XF, Huang XY, Tang SH (2015a) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569\u20133579","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"3152_CR15","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Li JW, Chen XF (2015b) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425\u2013437","journal-title":"IEEE Trans Comput"},{"key":"3152_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li J, Zhang YM, Chen XF, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1\u201312","journal-title":"Comput Secur"},{"key":"3152_CR17","doi-asserted-by":"crossref","unstructured":"Lischka J, Karl H (2009) A virtual network mapping algorithm based on subgraph isomorphism detection. In: Proceedings of the ACM workshop on virtualized infrastructure systems and architectures. ACM, pp 81\u201388","DOI":"10.1145\/1592648.1592662"},{"issue":"8","key":"3152_CR18","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1360\/112011-921","volume":"42","author":"J Luo","year":"2012","unstructured":"Luo J, Chen L, Li RF (2012) A heuristic resource allocation algorithm for virtual network embedding. Sci Sin Inf 42(8):960\u2013973","journal-title":"Sci Sin Inf"},{"key":"3152_CR19","doi-asserted-by":"crossref","unstructured":"Qiao C, Guo B, Huang S (2011) A novel two-step approach to surviving facility failures. In: Proceedings of optical fiber communication conference and exposition (OFC\/NFOEC), pp 1\u20133","DOI":"10.1364\/OFC.2011.OWAA3"},{"issue":"2","key":"3152_CR20","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TNSM.2013.013013.110202","volume":"10","author":"MR Rahman","year":"2013","unstructured":"Rahman MR, Boutaba R (2013) Svne: survivable virtual network embedding algorithms for network virtualization. IEEE Trans Netw Serv Manage 10(2):105\u2013118","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"3152_CR21","first-page":"40","volume":"6091","author":"MR Rahman","year":"2010","unstructured":"Rahman MR, Aib I, Boutaba R (2010) Survivable virtual network embedding. Networking 6091:40\u201352","journal-title":"Networking"},{"key":"3152_CR22","doi-asserted-by":"crossref","unstructured":"Soualah O, Fajjari I, Aitsaadi N (2014) A reliable virtual network embedding algorithm based on game theory within cloud\u2019s backbone. In: IEEE international conference on communications, pp 2975\u20132981","DOI":"10.1109\/ICC.2014.6883777"},{"issue":"3","key":"3152_CR23","doi-asserted-by":"publisher","first-page":"241","DOI":"10.3233\/JHS-160546","volume":"22","author":"X Xiao","year":"2016","unstructured":"Xiao X, Zheng XW (2016) A proposal of survivable virtual network embedding algorithm. J High Speed Netw 22(3):241\u2013251","journal-title":"J High Speed Netw"},{"issue":"2","key":"3152_CR24","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1355734.1355737","volume":"38","author":"M Yu","year":"2008","unstructured":"Yu M, Yi Y, Rexford J (2008) Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Comput Commun Rev 38(2):17\u201329","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"3152_CR25","unstructured":"Zheng XW, Liu H, Wang XG (2013) A virtual network embedding algorithm incorporating biogeography based optimization. In: Proceedings of the joint international conference on pervasive computing and the networked world. Springer, Cham, pp 810\u2013818"},{"issue":"1","key":"3152_CR26","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10489-014-0627-9","volume":"43","author":"XW Zheng","year":"2015","unstructured":"Zheng XW, Lu DJ, Wang X, Liu H (2015) A cooperative coevolutionary biogeography-based optimizer. Appl Intell 43(1):95\u2013111","journal-title":"Appl Intell"},{"key":"3152_CR27","doi-asserted-by":"crossref","unstructured":"Zhu Y, Ammar MH (2006) Algorithms for assigning substrate network resources to virtual network components. In: Proceedings of the 2006 INFOCOM, vol 1200. IEEE, pp 1\u201312","DOI":"10.1109\/INFOCOM.2006.322"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3152-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3152-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3152-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T03:35:42Z","timestamp":1570937742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3152-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,22]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["3152"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3152-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2018,3,22]]},"assertion":[{"value":"22 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human participants or animals"}}]}}