{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:17:25Z","timestamp":1740107845027,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2018,9,14]],"date-time":"2018-09-14T00:00:00Z","timestamp":1536883200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Core Electronic Devices, High-end Generic Chips and Basic Software Project","award":["2016ZX01040101"],"award-info":[{"award-number":["2016ZX01040101"]}]},{"name":"Mobile Terminal Operating System","award":["2016ZX01040101"],"award-info":[{"award-number":["2016ZX01040101"]}]},{"name":"the National Natural Science Foundation of China","award":["61602492","61502511","61772070"],"award-info":[{"award-number":["61602492","61502511","61772070"]}]},{"DOI":"10.13039\/501100003213","name":"Beijing Municipal Education Commission","doi-asserted-by":"publisher","award":["KM201510016009"],"award-info":[{"award-number":["KM201510016009"]}],"id":[{"id":"10.13039\/501100003213","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s00500-018-3463-8","type":"journal-article","created":{"date-parts":[[2018,9,14]],"date-time":"2018-09-14T11:54:51Z","timestamp":1536926091000},"page":"7797-7810","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A virtual cluster embedding approach by coordinating virtual network and software-defined network"],"prefix":"10.1007","volume":"22","author":[{"given":"Yusong","family":"Tan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0306-3982","authenticated-orcid":false,"given":"Rongzhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qingbo","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,14]]},"reference":[{"key":"3463_CR1","doi-asserted-by":"crossref","unstructured":"Al-Shabibi M, De Leenheer M, Gerola M, Koshibe A, Parulkar G, Salvadori E, Snow B (2014) OpenVirteX: make your virtual SDNs programmable. In: ACM SIGCOMM HotSDN workshop","DOI":"10.1145\/2620728.2620741"},{"key":"3463_CR2","volume-title":"Topology-awareness and reoptimization mechanism for virtual network embedding","author":"NF Butt","year":"2010","unstructured":"Butt NF, Chowdhury M, Boutaba R (2010) Topology-awareness and reoptimization mechanism for virtual network embedding. Springer, Berlin"},{"key":"3463_CR3","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/j.future.2017.08.014","volume":"87","author":"J Cai","year":"2018","unstructured":"Cai J, Wang Y, Liu Y, Luo J-Z, Wei W, Xu X (2018) Enhancing network capacity by weakening community structure in scale-free network. Future Gener Comput Syst 87:765\u2013771","journal-title":"Future Gener Comput Syst"},{"key":"3463_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tcs.2014.02.017","volume":"530","author":"W Chen","year":"2014","unstructured":"Chen W, Chen Z, Samatova NF, Peng L, Wang J, Tang M (2014) Solving the maximum duo-preservation string mapping problem with linear programming. Theoret Comput Sci 530:1\u201311","journal-title":"Theoret Comput Sci"},{"issue":"1","key":"3463_CR5","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TNET.2011.2159308","volume":"20","author":"M Chowdhury","year":"2012","unstructured":"Chowdhury M, Rahman M, Boutaba R (2012) Vineyard: virtual network embedding algorithms with coordinated node and link mapping. IEEE\/ACM Trans Networking 20(1):206\u2013219","journal-title":"IEEE\/ACM Trans Networking"},{"key":"3463_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/SURV.2013.013013.00155","volume":"15","author":"A Fischer","year":"2013","unstructured":"Fischer A, Botero J, Beck M, De Meer H, Hesselbach X (2013) Virtual network embedding: a survey. IEEE Commun Surv Tutor 15:1\u201319","journal-title":"IEEE Commun Surv Tutor"},{"key":"3463_CR7","doi-asserted-by":"crossref","unstructured":"Gomes RL, Bittencourt LF, Madeira ER, Cerqueira E, Gerla M (2014) An architecture for dynamic resource adjustment in VSDNs based on traffic demand. In: GLOBECOM, pp 2005\u20132010","DOI":"10.1109\/GLOCOM.2014.7037102"},{"issue":"5","key":"3463_CR8","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.comnet.2016.02.024","volume":"100","author":"RL Gomes","year":"2016","unstructured":"Gomes RL, Bittencourt LF, Madeira ER, Cerqueira E, Gerla M (2016) Bandwidth-aware allocation of resilient virtual software-defined networks. Comput Netw 100(5):179\u2013194","journal-title":"Comput Netw"},{"issue":"6","key":"3463_CR9","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/JIOT.2017.2690522","volume":"4","author":"Z Guan","year":"2017","unstructured":"Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J 4(6):1934\u20131944","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"3463_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MCOM.2018.1700401","volume":"56","author":"Z Guan","year":"2018","unstructured":"Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, Ma Y (2018) Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag 56(7):1\u20137","journal-title":"IEEE Commun Mag"},{"issue":"9","key":"3463_CR11","doi-asserted-by":"publisher","first-page":"3537","DOI":"10.1007\/s00500-015-1710-9","volume":"20","author":"P He","year":"2016","unstructured":"He P, Deng Z, Wang H, Liu Z (2016) Model approach to grammatical evolution: theory and case study. Soft Comput 20(9):3537\u20133548","journal-title":"Soft Comput"},{"issue":"18","key":"3463_CR12","doi-asserted-by":"publisher","first-page":"5413","DOI":"10.1007\/s00500-016-2130-1","volume":"21","author":"P He","year":"2017","unstructured":"He P, Deng Z, Gao C, Wang X, Li J (2017) Model approach to grammatical evolution: deep-structured analyzing of model and representation. Soft Comput 21(18):5413\u20135423","journal-title":"Soft Comput"},{"key":"3463_CR39","unstructured":"Iperf-TCP and UDP bandwidth performance measurement tool. http:\/\/iperf.sourceforge.net\/"},{"key":"3463_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2822945","author":"R Jhaveri","year":"2018","unstructured":"Jhaveri R, Patel N, Zhong Y, Sangaiah A (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2018.2822945","journal-title":"IEEE Access"},{"key":"3463_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0928-7","author":"L Jiang","year":"2018","unstructured":"Jiang L, Cheng Y, Yang L, Li J, Yan H, Wang X (2018) A trust-based collaborative filtering algorithm for E-commerce recommendation system. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-018-0928-7","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"3463_CR15","doi-asserted-by":"crossref","unstructured":"Lantz B, O\u2019Connor B (2015) A Mininet-based virtual testbed for distributed SDN development. In: ACM conference on special interest group on data communication. ACM, pp 365\u2013366","DOI":"10.1145\/2785956.2790030"},{"key":"3463_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2013.09.028","volume":"32","author":"X Li","year":"2014","unstructured":"Li X, Wang H, Ding B, Li X, Feng D (2014a) Resource allocation with multi-factor node ranking in data center networks. Future Gener Comput Syst 32:1\u201312","journal-title":"Future Gener Comput Syst"},{"issue":"8","key":"3463_CR17","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014b) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"3463_CR18","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Chen X, Li M, Li J, Lee P, Lou W (2014c) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615\u20131625","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3463_CR19","unstructured":"Li R, Zhang J, Tan Y, Wu Q (2016) TMVCE\u2014topology-aware multipath virtual cluster embedding algorithm. In: CCIOT. IEEE"},{"key":"3463_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9641273","author":"T Li","year":"2018","unstructured":"Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoT. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2018\/9641273","journal-title":"Secur Commun Netw"},{"issue":"2","key":"3463_CR22","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1504\/IJWGS.2015.068899","volume":"11","author":"W Lin","year":"2015","unstructured":"Lin W, Zhu C, Li J, Liu B, Lian H (2015) Novel algorithms and equivalence optimisation for resource allocation in cloud computing. IJWGS 11(2):193\u2013210","journal-title":"IJWGS"},{"issue":"5","key":"3463_CR23","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1007\/s00500-015-1862-7","volume":"21","author":"W Lin","year":"2017","unstructured":"Lin W, Xu S, Li J, Xu L, Peng Z (2017a) Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics. Soft Comput 21(5):1301\u20131314","journal-title":"Soft Comput"},{"key":"3463_CR24","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.ins.2017.02.054","volume":"397","author":"W Lin","year":"2017","unstructured":"Lin W, Xu S, He L, Li J (2017b) Multi-resource scheduling and power simulation for cloud computing. Inf Sci 397:168\u2013186","journal-title":"Inf Sci"},{"key":"3463_CR25","doi-asserted-by":"crossref","unstructured":"Medved J, Varga R, Tkacik A, Tkacik A, Gray K (2014) Opendaylight: towards a model-driven SDN controller architecture. In: 15th international symposium on 2014 IEEE. IEEE, pp 1\u20136","DOI":"10.1109\/WoWMoM.2014.6918985"},{"key":"3463_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.03.008","volume":"45","author":"D Mehmet","year":"2014","unstructured":"Mehmet D, Mostafa A (2014) Design and analysis of techniques for mapping virtual networks to software-defined network substrates. Comput Commun 45:1\u201310","journal-title":"Comput Commun"},{"key":"3463_CR27","doi-asserted-by":"publisher","unstructured":"Mijumbi R, Serrat J, Rubio J (2014) Dynamic resource management in SDN-based virtualized networks. In: Proceedings of international conference on network and service management. https:\/\/doi.org\/10.1109\/cnsm.2014.7014204","DOI":"10.1109\/cnsm.2014.7014204"},{"issue":"3","key":"3463_CR28","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11704-014-3500-9","volume":"8","author":"Z Pang","year":"2014","unstructured":"Pang Z, Wang K, Xie M (2014) The TH express-2 high performance interconnect networks. Front Comput Sci 8(3):357\u2013366","journal-title":"Front Comput Sci"},{"key":"3463_CR29","doi-asserted-by":"crossref","unstructured":"Papagianni C, Androulidakis G, Papavassiliou S (2014) Virtual topology mapping in SDN-enabled clouds. NCCA","DOI":"10.1109\/NCCA.2014.18"},{"key":"3463_CR30","unstructured":"Rabbani M, Pereira Esteves R, Podlesny M, Simon G, Zambenedetti Granville L, Boutaba R (2013) On tackling virtual data center embedding problem. In: IFIP\/IEEE IM 2013. Virtual network embedding base on real-time topological attributes, pp 177\u2013184"},{"key":"3463_CR31","doi-asserted-by":"crossref","unstructured":"Salvadori E, Doriguzzi Corin R, Broglio A, Gerola M (2011) Generalizing virtual network topologies in openflow-based networks. In: IEEE global telecommunications conference (GLOBECOM 2011), Houston, TX, USA, pp 1\u20136","DOI":"10.1109\/GLOCOM.2011.6134525"},{"issue":"1","key":"3463_CR32","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TCSVT.2016.2605045","volume":"28","author":"Z Sun","year":"2018","unstructured":"Sun Z, Zhang Q, Li Y, Tan Y (2018) DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans Circuits Syst Video Technol 28(1):193\u2013205","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"5","key":"3463_CR33","doi-asserted-by":"publisher","first-page":"155014771877956","DOI":"10.1177\/1550147718779568","volume":"14","author":"Y Tan","year":"2018","unstructured":"Tan Y, Xu X, Liang C, Zhang X, Zhang Q, Li Y (2018) An end-to-end covert channel via packet dropout for mobile networks. Int J Distrib Sens Netw 14(5):1550147718779568","journal-title":"Int J Distrib Sens Netw"},{"key":"3463_CR34","unstructured":"Wang Z, Han Y, Lin T, Tang H, Ci S (2012) Virtual network embedding by exploiting topological information. In: IEEE GLOBECOM"},{"issue":"4","key":"3463_CR35","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1007\/s10766-016-0445-2","volume":"45","author":"Y Wang","year":"2017","unstructured":"Wang Y, Li K, Li K (2017) Partition scheduling on heterogeneous multicore processors for multi-dimensional loops applications. Int J Parallel Prog 45(4):827\u2013852","journal-title":"Int J Parallel Prog"},{"key":"3463_CR36","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.ins.2018.01.041","volume":"438","author":"H Wang","year":"2018","unstructured":"Wang H, Wang W, Cui Z, Zhou X, Zhao J, Li Y (2018a) A new dynamic firefly algorithm for demand estimation of water resources. Inf Sci 438:95\u2013106","journal-title":"Inf Sci"},{"key":"3463_CR37","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3680851","author":"C Wang","year":"2018","unstructured":"Wang C, Shen J, Liu Q, Ren Y, Li T (2018b) A novel security scheme based on instant encrypted transmission for Internet-of-Things. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2018\/3680851","journal-title":"Secur Commun Netw"},{"issue":"10","key":"3463_CR38","doi-asserted-by":"publisher","first-page":"2721","DOI":"10.1109\/TPDS.2013.224","volume":"25","author":"X Wei","year":"2014","unstructured":"Wei X, Li H, Yang K, Zou L (2014) Topology-aware partial virtual cluster mapping algorithm on shared distributed infrastructures. IEEE Trans Parallel Distrib Syst 25(10):2721\u20132730","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3463_CR40","unstructured":"Wireshark. https:\/\/www.wireshark.org\/#download"},{"issue":"2","key":"3463_CR41","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1355734.1355737","volume":"38","author":"M Yu","year":"2008","unstructured":"Yu M, Yi Y, Rexford J, Chiang M (2008) Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Comput Commun Rev 38(2):17\u201329","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"3463_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0726-2","author":"X Yu","year":"2018","unstructured":"Yu X, Tan Y, Sun Z, Liu J, Liang C, Zhang Q (2018a) A fault-tolerant and energy-efficient continuous data protection system. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-018-0726-2","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"3463_CR43","doi-asserted-by":"publisher","first-page":"4563","DOI":"10.1007\/s11042-017-4540-1","volume":"77","author":"X Yu","year":"2018","unstructured":"Yu X, Zhang C, Xue Y, Zhu H, Li Y, Tan Y (2018b) An extra-parity energy saving data layout for video surveillance. Multimed Tools Appl 77:4563\u20134583","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"3463_CR44","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1049\/cje.2017.10.008","volume":"27","author":"X Yu","year":"2018","unstructured":"Yu X, Tan Y, Zhang C, Liang C, Khaled A, Zheng J, Zhang Q (2018c) A high-performance hierarchical snapshot scheme for hybrid storage systems. Chin J Electron 27(1):76\u201385","journal-title":"Chin J Electron"},{"issue":"3","key":"3463_CR45","doi-asserted-by":"publisher","first-page":"2393","DOI":"10.1007\/s10586-016-0721-3","volume":"20","author":"X Zhang","year":"2017","unstructured":"Zhang X, Tan Y, Xue Y, Zhang Q, Li Y, Zhang C, Zheng J (2017) Cryptographic key protection against FROST for mobile devices. Clust Comput 20(3):2393\u20132402","journal-title":"Clust Comput"},{"issue":"9","key":"3463_CR46","doi-asserted-by":"publisher","first-page":"11137","DOI":"10.1007\/s11042-017-5363-9","volume":"77","author":"X Zhang","year":"2018","unstructured":"Zhang X, Tan Y, Zhang C, Xue Y, Li Y, Zheng J (2018) A code protection scheme by process memory relocation for android devices. Multimed Tools Appl 77(9):11137\u201311157","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"3463_CR47","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/JIOT.2015.2497712","volume":"3","author":"Z Zhou","year":"2016","unstructured":"Zhou Z, Dong M, Ota K, Wang G, Yang LT (2016) Energy-efficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks. IEEE Internet Things J 3(3):428\u2013438","journal-title":"IEEE Internet Things J"},{"key":"3463_CR48","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.future.2017.01.031","volume":"73","author":"H Zhu","year":"2017","unstructured":"Zhu H, Tan Y, Zhang X, Zhu L, Zhang C, Zheng J (2017) A round-optimal lattice-based blind signature scheme for cloud services. Future Gener Comput Syst 73:106\u2013114","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"3463_CR49","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1049\/cje.2017.09.008","volume":"27","author":"H Zhu","year":"2018","unstructured":"Zhu H, Tan Y, Yu X, Xue Y, Zhang Q, Zhu L, Li Y (2018) An identity-based proxy signature on NTRU lattice. Chin J Electron 27(2):297\u2013303","journal-title":"Chin J Electron"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3463-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3463-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3463-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T11:25:35Z","timestamp":1662031535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3463-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,14]]},"references-count":48,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["3463"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3463-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2018,9,14]]},"assertion":[{"value":"14 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}