{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:33:50Z","timestamp":1774449230655,"version":"3.50.1"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,4,8]],"date-time":"2023-04-08T00:00:00Z","timestamp":1680912000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,8]],"date-time":"2023-04-08T00:00:00Z","timestamp":1680912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s10922-023-09734-3","type":"journal-article","created":{"date-parts":[[2023,4,8]],"date-time":"2023-04-08T09:02:40Z","timestamp":1680944560000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["On Ensuring Full Yet Cost-Efficient Survivability of Service Function Chains in NFV Environments"],"prefix":"10.1007","volume":"31","author":[{"given":"Zakaria","family":"Alomari","sequence":"first","affiliation":[]},{"given":"Mohamed Faten","family":"Zhani","sequence":"additional","affiliation":[]},{"given":"Moayad","family":"Aloqaily","sequence":"additional","affiliation":[]},{"given":"Ouns","family":"Bouachir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,8]]},"reference":[{"key":"9734_CR1","doi-asserted-by":"crossref","unstructured":"Halpern, J., Pignataro, C.: Service function chaining (SFC) architecture. Technical Report (2015)","DOI":"10.17487\/RFC7665"},{"issue":"2","key":"9734_CR2","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1109\/SURV.2012.090512.00043","volume":"15","author":"MF Bari","year":"2012","unstructured":"Bari, M.F., Boutaba, R., Esteves, R., Granville, L.Z., Podlesny, M., Rabbani, M.G., Zhang, Q., Zhani, M.F.: Data center network virtualization: a survey. IEEE Commun. Surv. Tutor. 15(2), 909\u2013928 (2012)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"9734_CR3","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TNSM.2016.2598420","volume":"13","author":"JG Herrera","year":"2016","unstructured":"Herrera, J.G., Botero, J.F.: Resource allocation in NFV: a comprehensive survey. IEEE Trans. Netw. Serv. Manag. 13(3), 518\u2013532 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"1","key":"9734_CR4","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/COMST.2015.2477041","volume":"18","author":"R Mijumbi","year":"2015","unstructured":"Mijumbi, R., Serrat, J., Gorricho, J.-L., Bouten, N., De Turck, F., Boutaba, R.: Network function virtualization: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 18(1), 236\u2013262 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9734_CR5","doi-asserted-by":"crossref","unstructured":"Lee, J., Ko, H., Suh, D., Jang, S., Pack, S.: Overload and failure management in service function chaining. In: IEEE Conference on Network Softwarization (NetSoft), pp. 1\u20135 (2017)","DOI":"10.1109\/NETSOFT.2017.8004241"},{"key":"9734_CR6","unstructured":"ISG, N.: Network function virtualisation NFV-resiliency requirements. ETSI GS NFV-REL 1, 1 (2014)"},{"key":"9734_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Zhani, M.F., Jabri, M., Boutaba, R.: Venice: Reliable virtual data center embedding in clouds. In: IEEE Conference on Computer Communications (INFOCOM), pp. 289\u2013297 (2014)","DOI":"10.1109\/INFOCOM.2014.6847950"},{"key":"9734_CR8","unstructured":"Cohen, G.: Downtime, Outages and Failures-Understanding Their True Costs. https:\/\/www.evolven.com\/blog\/downtime-outages-and-failures-understanding-their-true-costs.html. Accessed 10 May 2022"},{"key":"9734_CR9","first-page":"295","volume":"15","author":"MF Zhani","year":"2015","unstructured":"Zhani, M.F., Boutaba, R.: Survivability and fault tolerance in the cloud. Cloud Serv. Netw. Manag. 15, 295\u2013308 (2015)","journal-title":"Cloud Serv. Netw. Manag."},{"key":"9734_CR10","doi-asserted-by":"crossref","unstructured":"Yu, H., Anand, V., Qiao, C., Sun, G.: Cost-efficient design of survivable virtual infrastructure to recover from facility node failures. In: IEEE International Conference on Communications (ICC), pp. 1\u20136 (2011)","DOI":"10.1109\/icc.2011.5962604"},{"issue":"5","key":"9734_CR11","doi-asserted-by":"publisher","first-page":"3218","DOI":"10.1109\/TNET.2015.2510864","volume":"24","author":"S Ayoubi","year":"2016","unstructured":"Ayoubi, S., Chen, Y., Assi, C.: Towards promoting backup-sharing in survivable virtual network design. IEEE\/ACM Trans. Network. 24(5), 3218\u20133231 (2016)","journal-title":"IEEE\/ACM Trans. Network."},{"issue":"4","key":"9734_CR12","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/TNSM.2016.2574239","volume":"13","author":"SR Chowdhury","year":"2016","unstructured":"Chowdhury, S.R., Ahmed, R., Khan, M.M.A., Shahriar, N., Boutaba, R., Mitra, J., Zeng, F.: Dedicated protection for survivable virtual network embedding. IEEE Trans. Netw. Serv. Manag. 13(4), 913\u2013926 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9734_CR13","doi-asserted-by":"crossref","unstructured":"Fan, J., Ye, Z., Guan, C., Gao, X., Ren, K., Qiao, C.: Grep: Guaranteeing reliability with enhanced protection in nfv. In: ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, pp. 13\u201318 (2015)","DOI":"10.1145\/2785989.2786000"},{"issue":"3","key":"9734_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/S1005-8885(14)60304-6","volume":"21","author":"L Bo","year":"2014","unstructured":"Bo, L., Huang, T., Sun, X.-C., Chen, J.-Y., Liu, Y.-J.: Dynamic recovery for survivable virtual network embedding. J. China Univ. Posts Telecommun. 21(3), 77\u201384 (2014)","journal-title":"J. China Univ. Posts Telecommun."},{"key":"9734_CR15","doi-asserted-by":"crossref","unstructured":"Xiao, A., Wang, Y., Meng, L., Qiu, X., Li, W.: Topology-aware virtual network embedding to survive multiple node failures. In: IEEE Global Communications Conference (GLOBECOM), pp. 1823\u20131828 (2014)","DOI":"10.1109\/GLOCOM.2014.7037073"},{"key":"9734_CR16","unstructured":"Aidi, S., Zhani, M.F., Elkhatib, Y.: On improving service chains survivability through efficient backup provisioning. In: International Conference on Network and Service Management (CNSM), pp. 108\u2013115 (2018)"},{"issue":"9","key":"9734_CR17","first-page":"855","volume":"4","author":"MF Zhani","year":"2009","unstructured":"Zhani, M.F., Elbiaze, H., Kamoun, F.: Analysis and prediction of real network traffic. J. Netw. 4(9), 855\u2013865 (2009)","journal-title":"J. Netw."},{"key":"9734_CR18","unstructured":"IBM: IBM ILOG CPLEX Optimizer. Accessed 19 July 2022 (2020). https:\/\/www.ibm.com\/analytics\/cplex-optimizer"},{"key":"9734_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-020-09525-0","volume":"28","author":"MF Zhani","year":"2020","unstructured":"Zhani, M.F., ElBakoury, H.: FlexNGIA: a flexible Internet architecture for the next-generation tactile Internet. J. Netw. Syst. Manag. 28, 1\u201345 (2020)","journal-title":"J. Netw. Syst. Manag."},{"key":"9734_CR20","doi-asserted-by":"crossref","unstructured":"Alomari, Z., Zhani, M.F., Aloqaily, M., Bouachir, O.: On minimizing synchronization cost in NFV-based environments. In: IEEE\/ACM International Conference on Network and Service Management (CNSM), pp. 1\u20139 (2020)","DOI":"10.23919\/CNSM50824.2020.9269121"},{"key":"9734_CR21","doi-asserted-by":"crossref","unstructured":"Boutaba, R., Zhang, Q., Zhani, M.F.: Virtual machine migration in cloud computing environments: Benefits, challenges, and approaches. In: IGI Global Communication Infrastructures for Cloud Computing, pp. 383\u2013408 (2014)","DOI":"10.4018\/978-1-4666-4522-6.ch017"},{"key":"9734_CR22","doi-asserted-by":"crossref","first-page":"2218","DOI":"10.1002\/nem.2218","volume":"33","author":"Z Alomari","year":"2022","unstructured":"Alomari, Z., Zhani, M.F., Aloqaily, M., Bouachir, O.: Towards optimal synchronization in nfv-based environments. Int. J. Netw. Manag. 33, 2218 (2022)","journal-title":"Int. J. Netw. Manag."},{"key":"9734_CR23","unstructured":"Moufakir, T., Zhani, M.F., Gherbi, A., Aloqaily, M., Ghrada, N.: SFCaaS: Service Function Chains as a Service in NFV Environments. arXiv preprint arXiv:2203.01098 (2022)"},{"key":"9734_CR24","unstructured":"Aben, E.: Internet Traffic During the World Cup 2014. Preprint at https:\/\/labs.ripe.net\/author\/emileaben\/internet-traffic-during-the-world-cup-2014\/ (2014)"},{"key":"9734_CR25","unstructured":"Sandvine: Global Internet Phenomena: Latin America & North America. Publisher at Sandvine Waterloo, ON (2015)"},{"key":"9734_CR26","doi-asserted-by":"crossref","unstructured":"Beck, M.T., Botero, J.F., Samelin, K.: Resilient allocation of service function chains. In: IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 128\u2013133 (2016)","DOI":"10.1109\/NFV-SDN.2016.7919487"},{"key":"9734_CR27","doi-asserted-by":"crossref","unstructured":"Ding, W., Yu, H., Luo, S.: Enhancing the reliability of services in NFV with the cost-efficient redundancy scheme. In: IEEE International Conference on Communications (ICC), pp. 1\u20136 (2017)","DOI":"10.1109\/ICC.2017.7996840"},{"issue":"11","key":"9734_CR28","doi-asserted-by":"publisher","first-page":"2699","DOI":"10.1109\/TMC.2019.2927214","volume":"19","author":"M Huang","year":"2019","unstructured":"Huang, M., Liang, W., Shen, X., Ma, Y., Kan, H.: Reliability-aware virtualized network function services provisioning in mobile edge computing. IEEE Trans. Mobile Comput. 19(11), 2699\u20132713 (2019)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"9734_CR29","doi-asserted-by":"publisher","first-page":"76909","DOI":"10.1109\/ACCESS.2018.2882793","volume":"6","author":"S Yin","year":"2018","unstructured":"Yin, S., Huang, S., Liu, H., Guo, B., Gao, T., Li, W.: Survivable multipath virtual network embedding against multiple failures for SDN\/NFV. IEEE Access 6, 76909\u201376923 (2018)","journal-title":"IEEE Access"},{"issue":"10","key":"9734_CR30","doi-asserted-by":"publisher","first-page":"2246","DOI":"10.1109\/JSAC.2018.2869960","volume":"36","author":"J Fan","year":"2018","unstructured":"Fan, J., Jiang, M., Rottenstreich, O., Zhao, Y., Guan, T., Ramesh, R., Das, S., Qiao, C.: A framework for provisioning availability of nfv in data center networks. IEEE J. Select. Areas Commun. 36(10), 2246\u20132259 (2018)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"9734_CR31","doi-asserted-by":"crossref","unstructured":"Li, J., Liang, W., Huang, M., Jia, X.: Providing reliability-aware virtualized network function services for mobile edge computing. In: International Conference on Distributed Computing Systems (ICDCS), pp. 732\u2013741 (2019)","DOI":"10.1109\/ICDCS.2019.00078"},{"key":"9734_CR32","doi-asserted-by":"crossref","unstructured":"Yamada, D., Shinomiya, N.: Computing and network resource minimization problem for service function chaining against multiple vnf failures. In: IEEE Region 10 Conference (TENCON), pp. 1478\u20131482 (2019)","DOI":"10.1109\/TENCON.2019.8929446"},{"issue":"4","key":"9734_CR33","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1002\/net.21782","volume":"70","author":"A Hmaity","year":"2017","unstructured":"Hmaity, A., Savi, M., Musumeci, F., Tornatore, M., Pattavina, A.: Protection strategies for virtual network functions placement and service chains provisioning. Networks 70(4), 373\u2013387 (2017)","journal-title":"Networks"},{"key":"9734_CR34","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.comnet.2019.02.017","volume":"155","author":"M Casazza","year":"2019","unstructured":"Casazza, M., Bouet, M., Secci, S.: Availability-driven NFV orchestration. Comput. Netw. 155, 47\u201361 (2019)","journal-title":"Comput. Netw."},{"issue":"4","key":"9734_CR35","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1109\/TNSM.2016.2616283","volume":"13","author":"AM Ghaleb","year":"2016","unstructured":"Ghaleb, A.M., Khalifa, T., Ayoubi, S., Shaban, K.B., Assi, C.: Surviving multiple failures in multicast virtual networks with virtual machines migration. IEEE Trans. Netw. Serv. Manag. 13(4), 899\u2013912 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"8","key":"9734_CR36","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1109\/LCOMM.2016.2571691","volume":"20","author":"S Ayoubi","year":"2016","unstructured":"Ayoubi, S., Assi, C., Narayanan, L., Shaban, K.: Optimal polynomial time algorithm for restoring multicast cloud services. IEEE Commun. Lett. 20(8), 1543\u20131546 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"9734_CR37","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1109\/TNSM.2021.3138968","volume":"19","author":"N Siasi","year":"2021","unstructured":"Siasi, N., Jasim, M.A., Yayimli, A., Ghani, N.: Service function chain survivability provisioning in fog networks. IEEE Trans. Netw. Serv. Manag. 19(2), 1117\u20131128 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"1","key":"9734_CR38","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/TNSM.2020.3045174","volume":"18","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Zhang, L., Yu, P., Chen, K., Qiu, X., Meng, L., Kadoch, M., Cheriet, M.: Reliability-oriented and resource-efficient service function chain construction and backup. IEEE Trans. Netw. Serv. Manag. 18(1), 240\u2013257 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9734_CR39","doi-asserted-by":"crossref","unstructured":"Hu, Y., Guo, Y.: Survivable service function chain mapping in nfv-enabled 5g networks. In: IEEE 7th International Conference on Network Softwarization (NetSoft), pp. 375\u2013380 (2021)","DOI":"10.1109\/NetSoft51509.2021.9492596"},{"key":"9734_CR40","doi-asserted-by":"crossref","unstructured":"Cao, H., Zhao, H., Luo, D.X., Kumar, N., Yang, L.: Dynamic virtual resource allocation mechanism for survivable services in emerging nfv-enabled vehicular networks. IEEE Transactions on Intelligent Transportation Systems (2021)","DOI":"10.1109\/TITS.2021.3120723"},{"key":"9734_CR41","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.comcom.2021.04.008","volume":"174","author":"G Kibalya","year":"2021","unstructured":"Kibalya, G., Serrat, J., Gorricho, J.-L., Serugunda, J., Zhang, P.: A multi-stage graph based algorithm for survivable service function chain orchestration with backup resource sharing. Comput. Commun. 174, 42\u201360 (2021)","journal-title":"Comput. Commun."},{"key":"9734_CR42","doi-asserted-by":"crossref","unstructured":"Kang, R., He, F., Oki, E.: Resilient resource allocation model in service function chains with diversity and redundancy. In: IEEE International Conference on Communications, pp. 1\u20136 (2021)","DOI":"10.1109\/ICC42927.2021.9500867"},{"issue":"3","key":"9734_CR43","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/JSAC.2018.2815338","volume":"36","author":"L Qu","year":"2018","unstructured":"Qu, L., Khabbaz, M., Assi, C.: Reliability-aware service chaining in carrier-grade softwarized networks. IEEE J. Select. Areas Commun. 36(3), 558\u2013573 (2018)","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"3","key":"9734_CR44","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1109\/TNSM.2017.2723090","volume":"14","author":"L Qu","year":"2017","unstructured":"Qu, L., Assi, C., Shaban, K., Khabbaz, M.J.: A reliability-aware network service chain provisioning with delay guarantees in nfv-enabled enterprise datacenter networks. IEEE Trans. Netw. Serv. Manag. 14(3), 554\u2013568 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"5","key":"9734_CR45","doi-asserted-by":"publisher","first-page":"2759","DOI":"10.1109\/TNET.2017.2703080","volume":"25","author":"Y Kanizo","year":"2017","unstructured":"Kanizo, Y., Rottenstreich, O., Segall, I., Yallouz, J.: Optimizing virtual backup allocation for middleboxes. IEEE\/ACM Trans. Network. 25(5), 2759\u20132772 (2017)","journal-title":"IEEE\/ACM Trans. Network."},{"key":"9734_CR46","doi-asserted-by":"crossref","unstructured":"Yang, B., Xu, Z., Chai, W.K., Liang, W., Tuncer, D., Galis, A., Pavlou, G.: Algorithms for fault-tolerant placement of stateful virtualized network functions. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20137 (2018)","DOI":"10.1109\/ICC.2018.8422444"},{"key":"9734_CR47","doi-asserted-by":"crossref","unstructured":"Tomassilli, A., Huin, N., Giroire, F., Jaumard, B.: Resource requirements for reliable service function chaining. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20137 (2018)","DOI":"10.1109\/ICC.2018.8422774"},{"key":"9734_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, Z., Peng, C., Zhang, L., Huang, T., Liu, Y.: Raba: Resource-aware backup allocation for a chain of virtual network functions. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 1918\u20131926 (2019)","DOI":"10.1109\/INFOCOM.2019.8737565"},{"key":"9734_CR49","doi-asserted-by":"crossref","unstructured":"Woldeyohannes, Y.T., Tola, B., Jiang, Y.: Towards carrier-grade service provisioning in nfv. In: 2019 15th International Conference on the Design of Reliable Communication Networks (DRCN), pp. 130\u2013137 (2019)","DOI":"10.1109\/DRCN.2019.8713616"},{"issue":"4","key":"9734_CR50","doi-asserted-by":"publisher","first-page":"1742","DOI":"10.1109\/TNET.2019.2930809","volume":"27","author":"F He","year":"2019","unstructured":"He, F., Sato, T., Oki, E.: Optimization model for backup resource allocation in middleboxes with importance. IEEE\/ACM Trans. Network. 27(4), 1742\u20131755 (2019)","journal-title":"IEEE\/ACM Trans. Network."},{"key":"9734_CR51","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/TNET.2021.3132279","volume":"30","author":"YT Woldeyohannes","year":"2021","unstructured":"Woldeyohannes, Y.T., Tola, B., Jiang, Y., Ramakrishnan, K.: Coshare: an efficient approach for redundancy allocation in nfv. IEEE\/ACM Trans. Netw. 30, 1014\u20131028 (2021)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9734_CR52","doi-asserted-by":"crossref","unstructured":"Nozomi, K., He, F., Oki, E.: Unavailability-aware backup allocation model for middleboxes with two-stage shared protection. In: 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), pp. 384\u2013392 (2022)","DOI":"10.1109\/NetSoft54395.2022.9844095"},{"key":"9734_CR53","doi-asserted-by":"crossref","unstructured":"Luizelli, M.C., Bays, L.R., Buriol, L.S., Barcellos, M.P., Gaspary, L.P.: Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions. In: IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 98\u2013106 (2015)","DOI":"10.1109\/INM.2015.7140281"},{"key":"9734_CR54","doi-asserted-by":"crossref","unstructured":"Racheg, W., Ghrada, N., Zhani, M.F.: Profit-driven resource provisioning in NFV-based environments. In: IEEE International Conference on Communications (ICC), pp. 1\u20137 (2017)","DOI":"10.1109\/ICC.2017.7997163"},{"key":"9734_CR55","volume-title":"Time Series Analysis: Forecasting and Control","author":"GE Box","year":"2015","unstructured":"Box, G.E., Jenkins, G.M., Reinsel, G.C., Ljung, G.M.: Time Series Analysis: Forecasting and Control. Wiley, New York (2015)"},{"key":"9734_CR56","unstructured":"Andersen, D.G.: Theoretical approaches to node assignment. Carnegie Mellon University. https:\/\/kilthub.cmu.edu\/ndownloader\/files\/12103001. Accessed 10 Jan 2022 (2002)"},{"key":"9734_CR57","unstructured":"Zhani, M.F., Zhang, Q., Simona, G., Boutaba, R.: Vdc planner: Dynamic migration-aware virtual data center embedding for clouds. In: IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013), pp. 18\u201325 (2013)"},{"issue":"1","key":"9734_CR58","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TNET.2011.2159308","volume":"20","author":"M Chowdhury","year":"2011","unstructured":"Chowdhury, M., Rahman, M.R., Boutaba, R.: Vineyard: virtual network embedding algorithms with coordinated node and link mapping. IEEE\/ACM Trans. Netw. 20(1), 206\u2013219 (2011)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9734_CR59","volume-title":"Knapsack Problems: Algorithms and Computer Implementations","author":"S Martello","year":"1990","unstructured":"Martello, S., Toth, P.: Knapsack Problems: Algorithms and Computer Implementations. Wiley, New York (1990)"},{"issue":"3","key":"9734_CR60","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s11107-014-0432-8","volume":"27","author":"J Zhao","year":"2014","unstructured":"Zhao, J., Yao, Q., Liu, X., Li, W., Maier, M.: Distance-adaptive routing and spectrum assignment in ofdm-based flexible transparent optical networks. Photonic Netw. Commun. 27(3), 119\u2013127 (2014)","journal-title":"Photonic Netw. Commun."},{"key":"9734_CR61","doi-asserted-by":"crossref","unstructured":"Ghrada, N., Zhani, M.F., Elkhatib, Y.: Price and performance of cloud-hosted virtual network functions: Analysis and future challenges. In: IEEE Conference on Network Softwarization and Workshops (NetSoft), pp. 482\u2013487 (2018)","DOI":"10.1109\/NETSOFT.2018.8460032"},{"key":"9734_CR62","doi-asserted-by":"crossref","unstructured":"Alomari, Z., AL-Oudat, M., Alkhushayni, S.: Pricing the cloud based on multi-attribute auction mechanism. Clust. Comput. 1\u201326 (2023)","DOI":"10.1007\/s10586-023-03975-2"},{"key":"9734_CR63","unstructured":"Jiang, J.: The price of electricity in your state. https:\/\/www.npr.org\/sections\/money\/2011\/10\/27\/141766341\/the-price-of-electricity-in-your-state. Accessed 5 March 2022 (2011)"},{"key":"9734_CR64","unstructured":"Amazon Web Services Inc., Amazon EC2 Instance Types. https:\/\/aws.amazon.com\/ec2\/instance-types\/?nc1=h_ls. Accessed 15 Feb 2022 (2022)"},{"issue":"2","key":"9734_CR65","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1049\/iet-its.2016.0208","volume":"11","author":"Z Zhao","year":"2017","unstructured":"Zhao, Z., Chen, W., Wu, X., Chen, P.C., Liu, J.: Lstm network: a deep learning approach for short-term traffic forecast. IET Intell. Transp. Syst. 11(2), 68\u201375 (2017)","journal-title":"IET Intell. Transp. Syst."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09734-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-023-09734-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09734-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,10]],"date-time":"2023-12-10T11:10:33Z","timestamp":1702206633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-023-09734-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,8]]},"references-count":65,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["9734"],"URL":"https:\/\/doi.org\/10.1007\/s10922-023-09734-3","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,8]]},"assertion":[{"value":"10 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}},{"value":"not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"45"}}