{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:56:19Z","timestamp":1676076979356},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T00:00:00Z","timestamp":1112313600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Technol Manage"],"published-print":{"date-parts":[[2005,4]]},"DOI":"10.1007\/s10799-005-5883-2","type":"journal-article","created":{"date-parts":[[2005,4,28]],"date-time":"2005-04-28T08:01:44Z","timestamp":1114675304000},"page":"293-303","source":"Crossref","is-referenced-by-count":1,"title":["Designing Partially Survivable Cellular Telecommunications Networks"],"prefix":"10.1007","volume":"6","author":[{"given":"Syam","family":"Menon","sequence":"first","affiliation":[]},{"given":"Ali","family":"Amiri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"Agilent Technologies, Identify problems in wireless networks using SS7 measurements, Agilent Technologies, Telecommunications News, European Edition, Issue 20 (2000)."},{"key":"CR2","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1287\/opre.28.5.1130","volume":"28","author":"E. Balas","year":"1980","unstructured":"E. Balas and E. Zemel, An algorithm for large zero\u2013one knapsack problems, Operations Research 28 (1980) 1130\u20131154.","journal-title":"Operations Research"},{"key":"CR3","doi-asserted-by":"crossref","first-page":"1188","DOI":"10.1109\/49.35564","volume":"7","author":"R. Cardwell","year":"1989","unstructured":"R. Cardwell, C. Monma and T. Wu, Computer aided design procedures for survivable fiber optic telephone networks, IEEE Journal on Selective Areas in Communications 7 (1989) 1188\u20131197.","journal-title":"IEEE Journal on Selective Areas in Communications"},{"key":"CR4","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/S0377-2217(98)00281-1","volume":"118","author":"A. Dutta","year":"1999","unstructured":"A. Dutta and P. Kubat, Design of partially survivable networks for cellular telecommunications systems, European Journal of Operations Research 118 (1999) 52\u201364.","journal-title":"European Journal of Operations Research"},{"key":"CR5","volume-title":"Mobile Cellular Telecommunications: Analog and Digital Systems","author":"W. Lee","year":"1995","unstructured":"W. Lee, Mobile Cellular Telecommunications: Analog and Digital Systems, 2nd edition (McGraw-Hill, New York, 1995).","edition":"2"},{"key":"CR6","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/S0377-2217(99)00260-X","volume":"123","author":"S. Martello","year":"2000","unstructured":"S. Martello, D. Pisinger and P. Toth, New trends in exact algorithms for the 0-1 knapsack problem, European Journal of Operations Research 123 (2000) 325\u2013332.","journal-title":"European Journal of Operations Research"},{"key":"CR7","unstructured":"NORTEL, SONET 101: An Introduction to Basic Synchronous Optical Networks (NORTEL Northern Telecom, 2221 Lakeside Boulevard, Richardson, TX 75802, 1995)."},{"key":"CR8","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1287\/opre.45.5.758","volume":"45","author":"D. Pisinger","year":"1997","unstructured":"D. Pisinger, A minimal algorithm for the 0-1 knapsack problem, Operations Research 45 (1997) 758\u2013767.","journal-title":"Operations Research"},{"key":"CR9","doi-asserted-by":"crossref","unstructured":"J. Sosnosky and T. Wu, SONET ring applications for survivable fiber loop networks, IEEE Communications Magazine (June 1991) 51\u201358.","DOI":"10.1109\/35.79402"},{"key":"CR10","unstructured":"C. Wilson, Lease vs. own: new options for wireless carriers, The Source 1 (2003)."},{"key":"CR11","unstructured":"D. Woods, SONET from scratch, WAN Systems and Telephony Feature (May 15, 2000), http:\/\/www.networkcomputing.com\/1109\/1109f25.html."}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-005-5883-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-005-5883-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-005-5883-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:37:21Z","timestamp":1559263041000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-005-5883-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,4]]},"references-count":11,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2005,4]]}},"alternative-id":["5883"],"URL":"https:\/\/doi.org\/10.1007\/s10799-005-5883-2","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,4]]}}}