{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:59:52Z","timestamp":1773413992995,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,5,15]],"date-time":"2018-05-15T00:00:00Z","timestamp":1526342400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"crossref","award":["141040\/2015-7"],"award-info":[{"award-number":["141040\/2015-7"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s00607-018-0620-y","type":"journal-article","created":{"date-parts":[[2018,5,15]],"date-time":"2018-05-15T00:40:24Z","timestamp":1526344824000},"page":"937-967","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Virtual network mapping considering energy consumption and availability"],"prefix":"10.1007","volume":"101","author":[{"given":"Victor","family":"Lira","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Tavares","sequence":"additional","affiliation":[]},{"suffix":"Jr.","given":"Meuse","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Erica","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Nogueira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,15]]},"reference":[{"key":"620_CR1","unstructured":"An inefficient truth, Global Action Plan, London, Dec. 2007 [online]. Available: \n                    http:\/\/www.globalactionplan.org.uk\/\n                    \n                  . Accessed 03 Mar 2016"},{"key":"620_CR2","doi-asserted-by":"crossref","unstructured":"Balbo G (2001) Introduction to stochastic Petri nets. In: Lectures on formal methods and performance analysis","DOI":"10.1007\/3-540-44667-2_3"},{"key":"620_CR3","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/LCOMM.2012.030912.120082","volume":"16","author":"JF Botero","year":"2012","unstructured":"Botero JF et al (2012) Energy efficient virtual network embedding. IEEE Commun Lett 16:756\u2013759","journal-title":"IEEE Commun Lett"},{"key":"620_CR4","doi-asserted-by":"crossref","unstructured":"Chabarek J et al (2008) Power awareness in network design and routing. In: Chabarek J, Sommers J, Barford P (eds) Proceedings of the IEEE INFOCOM","DOI":"10.1109\/INFOCOM.2008.93"},{"issue":"2","key":"620_CR5","doi-asserted-by":"publisher","first-page":"163,476","DOI":"10.1109\/TNET.2011.2161487","volume":"20","author":"L Chiaraviglio","year":"2012","unstructured":"Chiaraviglio L et al (2012) Minimizing ISP network energy cost: formulation and solutions. IEEE\/ACM Trans Netw 20(2):163,476","journal-title":"IEEE\/ACM Trans Netw"},{"key":"620_CR6","doi-asserted-by":"crossref","unstructured":"Chowdhury N et al (2009) Virtual network embedding with coordinated node and link mapping. In: Proceedings of the IEEE INFOCOM","DOI":"10.1109\/INFCOM.2009.5061987"},{"issue":"4","key":"620_CR7","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/TNSM.2016.2574239","volume":"13","author":"SR Chowdhury","year":"2016","unstructured":"Chowdhury SR et al (2016) Dedicated protection for survivable virtual network embedding. IEEE Trans Netw Serv Manag 13(4):913\u2013926","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"620_CR8","unstructured":"Fernandes Stenio et al (2012) Dependability Assessment of Virtualized Networks. In: Proceedings of the IEEE ICC 2012 next-generation networking symposium (ICC12 NGN) in conjunction with IEEE international conference on communications ICC 2012, Ottawa"},{"key":"620_CR9","doi-asserted-by":"crossref","unstructured":"Gong S et al (2016) Energy-efficient virtual network embedding for heterogeneous networks. In: 2016 first IEEE international conference on computer communication and the internet (ICCCI), Wuhan, pp 85\u201390","DOI":"10.1109\/CCI.2016.7778883"},{"key":"620_CR10","doi-asserted-by":"crossref","unstructured":"Iannacconeand G et al (2002) Analysis of link failures in an IP backbone. In: Proceedings on 2002 ACM SIGCOMM workshop on internet measurment","DOI":"10.1145\/637201.637238"},{"key":"620_CR11","doi-asserted-by":"crossref","unstructured":"Jarray A, Karmouch A (2012) Column generation approach for one-shot virtual network embedding. In: Proceedings of the GlobeCom","DOI":"10.1109\/GLOCOMW.2012.6477689"},{"issue":"2","key":"620_CR12","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TNSM.2016.2558598","volume":"13","author":"MMA Khan","year":"2016","unstructured":"Khan MMA et al (2016) Multi-path link embedding for survivability in virtual networks. IEEE Trans Netw Serv Manag 13(2):253\u2013266","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"620_CR13","doi-asserted-by":"crossref","unstructured":"Koslovski G et al (2010) Reliability support in virtual infrastructures. In: Proceedings of the IEEE 2nd international conference on cloud computing technology and science, pp 49\u201358","DOI":"10.1109\/CloudCom.2010.23"},{"key":"620_CR14","volume-title":"Optimal reliability modeling: principles and applications","author":"W Kuo","year":"2003","unstructured":"Kuo W, Zuo M (2003) Optimal reliability modeling: principles and applications. Wiley, Hoboken"},{"key":"620_CR15","unstructured":"Lira V et al (2014) Dependable virtual network mapping. Springer Computing. ISSN: 0010-485X (print) 1436\u20135057 (online)"},{"key":"620_CR16","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.comnet.2015.05.016","volume":"88","author":"V Lira","year":"2015","unstructured":"Lira V et al (2015) An automated approach to dependability evaluation of virtual networks. Comput Netw 88:89\u2013102 (ISSN 1389-1286)","journal-title":"Comput Netw"},{"key":"620_CR17","doi-asserted-by":"crossref","unstructured":"Lischka J, Karl H (2009) A virtual network mapping algorithm based on subgraph isomorphism detection. In: Proceedings of ACM SIGCOMM VISA","DOI":"10.1145\/1592648.1592662"},{"key":"620_CR18","unstructured":"Lu J, Turner J (2006) Efficient mapping of virtual networks onto a shared substrate. Technical Report WUCSE-2006-35, Washington University in St Louis, pp 1\u201311"},{"key":"620_CR19","unstructured":"Maciel PRM et al (2010) Dependability modeling. In: Performance and dependability in service computing: concepts, techniques and research directions. Edward Hershey, IGI Global, PA"},{"issue":"4","key":"620_CR20","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TNSM.2013.092813.130397","volume":"10","author":"M Melo","year":"2013","unstructured":"Melo M et al (2013) Optimal virtual network embedding: node-link formulation. IEEE Trans Netw Serv Manag 10(4):356\u2013368","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"620_CR21","doi-asserted-by":"crossref","unstructured":"Onguetou DP, Grover WD (2008) A new insight and approach to node failure protection with ordinary p-cycles. In: Proceedings of the IEEE international conference on communication (ICC 08)","DOI":"10.1109\/ICC.2008.966"},{"issue":"2","key":"620_CR22","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/LCOMM.2011.120211.111900","volume":"16","author":"A Pagesand","year":"2012","unstructured":"Pagesand A et al (2012) Strategies for virtual optical network allocation. IEEE Comm Lett 16(2):268\u2013271","journal-title":"IEEE Comm Lett"},{"key":"620_CR23","doi-asserted-by":"crossref","unstructured":"Pickavet M et al (2008) Worldwide energy needs for ICT: the rise of power-aware networking. In: Proceedings of the IEEE ANTS, Bombay, India, p 13","DOI":"10.1109\/ANTS.2008.4937762"},{"key":"620_CR24","doi-asserted-by":"crossref","unstructured":"Rahman MR et al (2010) Survivable virtual network embedding. Inl Proceedings of the 9th IFIP NETWORKING conference, Chennai","DOI":"10.1007\/978-3-642-12963-6_4"},{"issue":"2","key":"620_CR25","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TNSM.2013.013013.110202","volume":"10","author":"M Rahman","year":"2013","unstructured":"Rahman M, Boutaba R (2013) SVNE: survivable virtual network embedding algorithms for network virtualization. IEEE Trans Netw Serv Manag 10(2):105\u2013118","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"620_CR26","volume-title":"State-of-the-art handbook in metaheuristics","author":"MGC Resende","year":"2001","unstructured":"Resende MGC et al (2001) Greedy randomized adaptive search procedures. In: Glover F, Kochenberger G (eds) State-of-the-art handbook in metaheuristics. Kluwer Academic Publisher, Dordrecht"},{"key":"620_CR27","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cor.2008.05.011","volume":"37","author":"MGC Resende","year":"2010","unstructured":"Resende MGC et al (2010) GRASP and path relinking for the maxmin diversity problem. Comput Oper Res 37:498\u2013508","journal-title":"Comput Oper Res"},{"key":"620_CR28","doi-asserted-by":"crossref","unstructured":"Schaffrath G et al (2009) Network virtualization architecture: proposal and initial prototype. In: Proceedings of the 1st ACM workshop on virtualized infrastructure systems and architectures (VISA09)","DOI":"10.1145\/1592648.1592659"},{"key":"620_CR29","volume-title":"Theory of linear and integer programming","author":"A Schrijver","year":"1986","unstructured":"Schrijver A (1986) Theory of linear and integer programming. Wiley, NewYork"},{"key":"620_CR30","first-page":"1","volume":"2","author":"B Silva","year":"2013","unstructured":"Silva B et al (2013) ASTRO: an integrated environment for dependability and sustainability evaluation. Sustain Comput Inform Syst 2:1\u201331","journal-title":"Sustain Comput Inform Syst"},{"key":"620_CR31","doi-asserted-by":"crossref","unstructured":"Sivaraman V et al (2011) Profiling perpacket and per-byte energy consumption in the netfpga gigabit router. In Proceedings of the IEEE INFOCOM WKSHPS","DOI":"10.1109\/INFCOMW.2011.5928833"},{"issue":"5","key":"620_CR32","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1109\/TNET.2013.2286156","volume":"22","author":"S Su","year":"2014","unstructured":"Su S et al (2014) Energy-aware virtual network embedding. IEEE ACM Trans Netw 22(5):1607\u20131620","journal-title":"IEEE ACM Trans Netw"},{"key":"620_CR33","doi-asserted-by":"crossref","unstructured":"Szeto W et al (2003) A multi-commodity flow based approach to virtual network resource allocation. In: Proceedings of the IEEE global telecommunications conference (GLOBECOM03), pp 3004\u20133008","DOI":"10.1109\/GLOCOM.2003.1258787"},{"key":"620_CR34","unstructured":"Texas-Instruments (2015) Evm430-f6736-msp430f6736 evm for metering. \n                    http:\/\/www.ti.com\/tool\/EVM430-F6736\n                    \n                  . Accessed 22 Mar 2016"},{"key":"620_CR35","volume-title":"Probability and statistics with reliability, queueing, and computer science applications","author":"K Trivedi","year":"2002","unstructured":"Trivedi K (2002) Probability and statistics with reliability, queueing, and computer science applications, 2nd edn. Wiley, Hoboken","edition":"2"},{"key":"620_CR36","unstructured":"USFERC, Washington, DC, USA, United States Federal Energy Regulatory Commission [online]. Available: \n                    http:\/\/www.ferc.gov\n                    \n                  . Accessed 03 Mar 2016"},{"key":"620_CR37","first-page":"19","volume":"47","author":"S Walllerstein","year":"1980","unstructured":"Walllerstein S et al (1980) Some statistical methods useful in circulation research. Circ Res 47:19","journal-title":"Circ Res"},{"key":"620_CR38","doi-asserted-by":"crossref","unstructured":"Wang B et al (2012) Reducing power consumption in embedding virtual infrastructures. In: Proceeding of the IEEE globecom workshops, Dec 37, pp 714\u2013718","DOI":"10.1109\/GLOCOMW.2012.6477662"},{"key":"620_CR39","unstructured":"Yu Y et al (2011) RMap: an algorithm of virtual network resilience mapping. In: Proceedings of the seventh international conference on wireless communication, networking and mobile computing (WiCOM), pp 1\u20134"},{"issue":"2","key":"620_CR40","doi-asserted-by":"publisher","first-page":"1729","DOI":"10.1145\/1355734.1355737","volume":"38","author":"M Yu","year":"2008","unstructured":"Yu M et al (2008) Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Comput Commun Rev 38(2):1729","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"620_CR41","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10922-011-9209-x","volume":"20","author":"H Yu","year":"2012","unstructured":"Yu H et al (2012) A cost efficient design of virtual infrastructures with joint node and link mapping. J Netw Syst Manag 20:97\u2013115","journal-title":"J Netw Syst Manag"},{"key":"620_CR42","doi-asserted-by":"crossref","unstructured":"Zegura E et al (1996) How to model an Internetwork. In: Proceedings of IEEE INFOCOM, pp 594\u2013602","DOI":"10.1109\/INFCOM.1996.493353"},{"key":"620_CR43","doi-asserted-by":"crossref","unstructured":"Zhu Y, Ammar M (2006) Algorithms for assigning substrate network resources to virtual network components. In: Proceedings of IEEE INFOCOM","DOI":"10.1109\/INFOCOM.2006.322"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0620-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0620-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0620-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T13:51:56Z","timestamp":1581947516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0620-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,15]]},"references-count":43,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["620"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0620-y","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,15]]},"assertion":[{"value":"14 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}