{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T20:40:42Z","timestamp":1740343242029,"version":"3.37.3"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,8,5]],"date-time":"2010-08-05T00:00:00Z","timestamp":1280966400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Photon Netw Commun"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s11107-010-0266-y","type":"journal-article","created":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T12:58:19Z","timestamp":1280926699000},"page":"247-256","source":"Crossref","is-referenced-by-count":1,"title":["Ellipse-underlay protection algorithm to deal with regional demolishments in mesh optical networks"],"prefix":"10.1007","volume":"20","author":[{"given":"Xianwei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Junling","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,5]]},"reference":[{"key":"266_CR1","doi-asserted-by":"crossref","unstructured":"Ramaswami, R., Sivarajan, K.N.: Network survivability. In: Ramaswami, R., Sivarajan, K.N. Optical Networks: A Practical Perspective, pp. . Morgan Kaufmann, MA, USA (2001)","DOI":"10.1016\/B978-155860655-5\/50012-5"},{"key":"266_CR2","volume-title":"Next Generation Intelligent Optical Networks: From Access to Backbone","author":"S.V. Kartalopoulos","year":"2008","unstructured":"Kartalopoulos S.V.: Next Generation Intelligent Optical Networks: From Access to Backbone. 2nd edn. Springer, NY, USA (2008)","edition":"2"},{"key":"266_CR3","doi-asserted-by":"crossref","unstructured":"Ramamurthy, S., Mukherjee, B.: Survivable WDM mesh networks, Part I - Protection. In: Proc. IEEE INFOCOM, vol. 2, pp. 744\u2013751. New York, Mar 1999","DOI":"10.1109\/INFCOM.1999.751461"},{"issue":"6","key":"266_CR4","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/65.885666","volume":"14","author":"D. Zhou","year":"2000","unstructured":"Zhou D., Subramaniam S.: survivability in optical networks. IEEE Netw. 14(6), 16\u201323 (2000)","journal-title":"IEEE Netw."},{"key":"266_CR5","doi-asserted-by":"crossref","unstructured":"Sivakumar, M., Shenai, R.K., Sivalingam, K.M.: A survey of survivability techniques for optical WDM networks. In: Sivalingam, K.M., Subramaniam, S. Emerging Optical Network: Architectures, Protocols and Performance Technologies, Springer, Boston (2005)","DOI":"10.1007\/0-387-22584-6_13"},{"issue":"3\/4","key":"266_CR6","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1023\/A:1016047527226","volume":"4","author":"G. Maier","year":"2002","unstructured":"Maier G., Pattavina A., De Patre S., Martinelli M.: Optical network survivability: Protection techniques in the WDM layer. Photon. Netw. Commun. 4(3\/4), 251\u2013269 (2002)","journal-title":"Photon. Netw. Commun."},{"key":"266_CR7","doi-asserted-by":"crossref","unstructured":"Bonenfant, P.A.: Optical layer survivability: a comprehensive approach. In: Proceedings of OFC, vol. 2, pp. 270\u2013271. San Jose (1998)","DOI":"10.1109\/OFC.1998.657389"},{"key":"266_CR8","doi-asserted-by":"crossref","first-page":"1158","DOI":"10.1109\/49.725186","volume":"10","author":"O. Crochat","year":"1998","unstructured":"Crochat O., Le Boudec J.Y.: Design protection for WDM optical networks. IEEE J. Sel. Area Commun. 10, 1158\u20131165 (1998)","journal-title":"IEEE J. Sel. Area Commun."},{"key":"266_CR9","unstructured":"Anand, V., Chauhan, S., Qiao, C.: Sub-path protection: a new framework for optical layer survivability and its quantitative evaluation, UB CSE, Technical report, Feb 2002"},{"key":"266_CR10","doi-asserted-by":"crossref","unstructured":"Choi, H., Subramaniam, S., Choi, H.-A.: On double-link failure recovery in WDM optical networks. In: Proceedings of IEEE INFOCOM, vol. 2, pp. 808\u2013816 (2002)","DOI":"10.1109\/INFCOM.2002.1019327"},{"issue":"7","key":"266_CR11","first-page":"379","volume":"2","author":"L. Guo","year":"2004","unstructured":"Guo L., Yu H., Li L.: Double-link failure protection algorithm for shared sub-path in survivable WDM mesh networks. Chin. Opt. Lett. 2(7), 379\u2013382 (2004)","journal-title":"Chin. Opt. Lett."},{"issue":"1","key":"266_CR12","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/TNET.2007.900368","volume":"16","author":"S. Ramasubramanian","year":"2008","unstructured":"Ramasubramanian S., Chandak A.: Dual-link failure resiliency through backup mutual exclusion. IEEE ACM Trans. Netw. 16(1), 157\u2013169 (2008)","journal-title":"IEEE ACM Trans. Netw."},{"issue":"19","key":"266_CR13","first-page":"74","volume":"2","author":"J. Xu","year":"2010","unstructured":"Xu J., Chang H., Xu C., Yi Y.: A novel shared-link protection algorithm with correlated link failure probability for dual-link failure. Photon. Netw. Commun. 2(19), 74\u201380 (2010)","journal-title":"Photon. Netw. Commun."},{"issue":"4","key":"266_CR14","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/0097-8493(95)00037-D","volume":"19","author":"F. Feito","year":"1995","unstructured":"Feito F., Torres J.C., Urena A.: Orientation, simplicity, and inclusion test for planar polygons. Comput. Graph. 19(4), 595\u2013600 (1995)","journal-title":"Comput. Graph."},{"key":"266_CR15","first-page":"405","volume":"6","author":"W. Li","year":"2000","unstructured":"Li W., Li J., Ke Y.: Orientation and point inclusion test for planar polygon. J. Comput. Aided Des. Comput. Graph. 6, 405\u2013407 (2000)","journal-title":"J. Comput. Aided Des. Comput. Graph."}],"container-title":["Photonic Network Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11107-010-0266-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11107-010-0266-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11107-010-0266-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T20:13:35Z","timestamp":1740341615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11107-010-0266-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,5]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["266"],"URL":"https:\/\/doi.org\/10.1007\/s11107-010-0266-y","relation":{},"ISSN":["1387-974X","1572-8188"],"issn-type":[{"type":"print","value":"1387-974X"},{"type":"electronic","value":"1572-8188"}],"subject":[],"published":{"date-parts":[[2010,8,5]]}}}