{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T14:52:40Z","timestamp":1648565560196},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Photon Netw Commun"],"published-print":{"date-parts":[[2005,1]]},"DOI":"10.1007\/s11107-005-4531-4","type":"journal-article","created":{"date-parts":[[2005,2,24]],"date-time":"2005-02-24T10:00:52Z","timestamp":1109239252000},"page":"55-75","source":"Crossref","is-referenced-by-count":5,"title":["Increasing the Link Utilization in IP over WDM Networks Using Availability as QoS"],"prefix":"10.1007","volume":"9","author":[{"given":"Antonio","family":"Nucci","sequence":"first","affiliation":[]},{"given":"Nina","family":"Taft","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Thiran","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zang","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Diot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45400-4_18","volume-title":"A protection-based approach to qos in packet-over-fiber networks.","author":"P Thiran","year":"2001"},{"key":"CR2","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.2002.1019298","volume-title":"Analysis of measured single-hop delay from an operational backbone network","author":"K Papagiannaki","year":"2002"},{"key":"CR3","volume-title":"Increasing the link utilization in ip over wdm networks","author":"A Nucci","year":"2002"},{"key":"CR4","first-page":"3","volume":"41","author":"E Taillard","year":"1993","journal-title":"Annals of Operations Research"},{"issue":"3","key":"CR5","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/35.825647","volume":"38","author":"O Gerstel","year":"2000","journal-title":"IEEE Communication Magazine"},{"key":"CR6","unstructured":"G. Mohan, A. K. Somani, Routing dependable connections with specified failure restoration guarantees in wdm networks. Proc. Infocom 2000, Jerusalem, April 2000"},{"key":"CR7","volume-title":"Revenue maximization in survivable wdm networks","author":"M Sridharan","year":"2000"},{"key":"CR8","volume-title":"Survivable wdm mesh network","author":"R Ramamurthy","year":"1999"},{"issue":"7","key":"CR9","doi-asserted-by":"crossref","first-page":"1158","DOI":"10.1109\/49.725186","volume":"16","author":"J. O Crochat","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communication,"},{"issue":"3","key":"CR10","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/90.851984","volume":"8","author":"J. O Crochat","year":"2000","journal-title":"IEEE Transaction on Networking,"},{"key":"CR11","doi-asserted-by":"crossref","unstructured":"E. Modiano, A. Narula-Tam, Survivable routing of logical topologies in wdm networks. in Proc. INFOCOM 2001, 1:348?357, Anchorage, April 2001","DOI":"10.1109\/INFCOM.2001.916717"},{"key":"CR12","unstructured":"Bertsekas, Gallager, Algorithm?data networks, vol. 2nd edn (Prentice-Hall, 1992)"},{"key":"CR13","unstructured":"Ilog cplex software optimization suite: http:\/\/www.ilog.com\/products\/cplex\/"},{"key":"CR14","unstructured":"G. L. Nemhauser, A. H. G. Rinnoy Kan, M. J. Todd, Optimization?handbooks in operations research and management science, vol. 1, North-Holland, 1989"}],"container-title":["Photonic Network Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11107-005-4531-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11107-005-4531-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11107-005-4531-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:03:11Z","timestamp":1559358191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11107-005-4531-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,1]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,1]]}},"alternative-id":["4531"],"URL":"https:\/\/doi.org\/10.1007\/s11107-005-4531-4","relation":{},"ISSN":["1387-974X","1572-8188"],"issn-type":[{"value":"1387-974X","type":"print"},{"value":"1572-8188","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,1]]}}}