{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T22:57:40Z","timestamp":1649026660830},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T00:00:00Z","timestamp":1459814400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11235-016-0159-1","type":"journal-article","created":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T20:10:13Z","timestamp":1459887013000},"page":"75-85","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Instantaneous recovery route design scheme using multiple coding-aware protection scenarios"],"prefix":"10.1007","volume":"64","author":[{"given":"Phong Vu","family":"Pham","sequence":"first","affiliation":[]},{"given":"Bijoy Chand","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Abu Hena","family":"Al\u00a0Muktadir","sequence":"additional","affiliation":[]},{"given":"Eiji","family":"Oki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,5]]},"reference":[{"key":"159_CR1","unstructured":"Fawaz, W., & Chen, K. (2010). Survivability-oriented quality of service in optical networks. End-to-End Quality of Service Engineering in Next Generation Heterogenous, 197\u2013211."},{"issue":"8","key":"159_CR2","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/LCOMM.2012.061912.120724","volume":"16","author":"JM Simmons","year":"2012","unstructured":"Simmons, J. M. (2012). Catastrophic failures in a backbone network. IEEE Communications Letters, 16(8), 1328\u20131331.","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"159_CR3","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1109\/TNET.2003.813044","volume":"11","author":"M Kodialam","year":"2003","unstructured":"Kodialam, M., & Lakshman, T. (2003). Dynamic routing of restorable bandwidth-guaranteed tunnels using aggregated network resource usage information. IEEE\/ACM Transactions on Networking, 11(3), 399\u2013410.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"159_CR4","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S. Y. R., & Yeung, R. W. (2000). Network information flow. IEEE Transactions on Information Theory, 46(4), 1204\u20131216.","journal-title":"IEEE Transactions on Information Theory"},{"key":"159_CR5","doi-asserted-by":"crossref","unstructured":"Muktadir, A., Hena, A., & Oki, E. (2014). A heuristic routing algorithm with erasure correcting code based instantaneous recovery technique. In: 2014 IEEE International Conference on Communications (ICC), pp. 1143\u20131147. IEEE","DOI":"10.1109\/ICC.2014.6883475"},{"issue":"1","key":"159_CR6","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1587\/comex.1.28","volume":"1","author":"AA Jose","year":"2012","unstructured":"Jose, A. A., Muktadir, A. H. A., & Oki, E. (2012). Network coding aware instantaneous recovery scheme based on optimal traffic splitting. IEICE Communications Express, 1(1), 28\u201332.","journal-title":"IEICE Communications Express"},{"issue":"9","key":"159_CR7","doi-asserted-by":"crossref","first-page":"1974","DOI":"10.1016\/j.comnet.2013.03.015","volume":"57","author":"P Babarczi","year":"2013","unstructured":"Babarczi, P., Bicz\u00f3k, G., \u00d8verby, H., Tapolcai, J., & Soproni, P. (2013). Realization strategies of dedicated path protection: A bandwidth cost perspective. Computer Networks, 57(9), 1974\u20131990.","journal-title":"Computer Networks"},{"key":"159_CR8","doi-asserted-by":"crossref","unstructured":"Al\u00a0Muktadir, A.H., & Oki, E. (2015). Differential delay aware instantaneous recovery scheme with traffic splitting. International Journal of Communication Systems (to appear)","DOI":"10.1002\/dac.3075"},{"key":"159_CR9","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.comnet.2015.02.010","volume":"82","author":"P Babarczi","year":"2015","unstructured":"Babarczi, P., Pa\u0161i\u0107, A., Tapolcai, J., N\u00e9meth, F., & Lad\u00f3czki, B. (2015). Instantaneous recovery of unicast connections in transport networks: Routing versus coding. Computer Networks, 82, 68\u201380.","journal-title":"Computer Networks"},{"key":"159_CR10","unstructured":"Belzner, M., & Haunstein, H. (2009) Performance of network coding in transport networks with traffic protection. In: Photonic Networks, 2009 ITG Symposium on, pp. 1\u20137. VDE"},{"key":"159_CR11","doi-asserted-by":"crossref","unstructured":"Al\u00a0Muktadir, A.H., & Oki, E. (2015). A coding-aware reliable route design scheme for instantaneous recovery. Telecommunication Systems (to appear)","DOI":"10.1007\/s11235-015-0089-3"},{"issue":"1","key":"159_CR12","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1587\/transcom.E97.B.87","volume":"97","author":"AH Al Muktadir","year":"2014","unstructured":"Al Muktadir, A. H., & Oki, E. (2014). Optimum route design in 1+ 1 protection with network coding for instantaneous recovery. IEICE Transactions on Communications, 97(1), 87\u2013104.","journal-title":"IEICE Transactions on Communications"},{"issue":"6","key":"159_CR13","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1587\/comex.1.228","volume":"1","author":"AHA Muktadir","year":"2012","unstructured":"Muktadir, A. H. A., & Oki, E. (2012). A mathematical model for routing in 1 + 1 protection with network coding for instantaneous recovery. IEICE Communications Express, 1(6), 228\u2013233.","journal-title":"IEICE Communications Express"},{"issue":"1","key":"159_CR14","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1587\/comex.4.8","volume":"4","author":"PV Phong","year":"2015","unstructured":"Phong, P. V., Al\u00a0Muktadir, A. H., & Oki, E. (2015). A hybrid instantaneous recovery route design scheme with two different coding aware scenarios. IEICE Communications Express, 4(1), 8\u201313.","journal-title":"IEICE Communications Express"},{"issue":"4","key":"159_CR15","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1364\/JOCN.2.000175","volume":"2","author":"ED Manley","year":"2010","unstructured":"Manley, E. D., Deogun, J. S., Xu, L., & Alexander, D. R. (2010). All-optical network coding. Journal of Optical Communications and Networking, 2(4), 175\u2013191.","journal-title":"Journal of Optical Communications and Networking"},{"issue":"1","key":"159_CR16","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/TNET.2009.2020503","volume":"18","author":"AE Kamal","year":"2010","unstructured":"Kamal, A. E. (2010). Network protection for mesh networks: network coding-based protection using p-cycles. Networking, IEEE\/ACM Transactions on, 18(1), 67\u201380.","journal-title":"Networking, IEEE\/ACM Transactions on"},{"issue":"2","key":"159_CR17","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.910575","volume":"47","author":"MG Luby","year":"2001","unstructured":"Luby, M. G., Mitzenmacher, M., Shokrollahi, M. A., & Spielman, D. A. (2001). Efficient erasure correcting codes. IEEE Transactions on Information Theory, 47(2), 569\u2013584.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"159_CR18","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1587\/transcom.E94.B.698","volume":"94","author":"T Matsuda","year":"2011","unstructured":"Matsuda, T., Noguchi, T., & Takine, T. (2011). Survey of network coding and its applications. IEICE Transactions on Communications, 94(3), 698\u2013717.","journal-title":"IEICE Transactions on Communications"},{"key":"159_CR19","doi-asserted-by":"crossref","unstructured":"An, Y., Da\u00a0Ros, F., & Peucheret, C. (2013). All-optical network coding for dpsk signals. In: National Fiber Optic Engineers Conference, pp. JW2A\u201360. Optical Society of America","DOI":"10.1364\/NFOEC.2013.JW2A.60"},{"issue":"6","key":"159_CR20","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1109\/JQE.2004.828261","volume":"40","author":"Q Wang","year":"2004","unstructured":"Wang, Q., Zhu, G., Chen, H., Jaques, J., Leuthold, J., Piccirilli, A. B., et al. (2004). Study of all-optical xor using mach-zehnder interferometer and differential scheme. IEEE Journal of Quantum Electronics, 40(6), 703\u2013710.","journal-title":"IEEE Journal of Quantum Electronics"},{"issue":"7","key":"159_CR21","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1002\/dac.2781","volume":"28","author":"J Wang","year":"2015","unstructured":"Wang, J., Chi, K., Yang, Y., & Wang, X. (2015). Network coding based on hyper-edge decomposition for wireless network with link failures. International Journal of Communication Systems, 28(7), 1387\u20131399.","journal-title":"International Journal of Communication Systems"},{"issue":"11","key":"159_CR22","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1002\/dac.1316","volume":"25","author":"S Chen","year":"2012","unstructured":"Chen, S., Wu, M., & Lu, W. (2012). Compressed error and erasure correcting codes via rank-metric codes in random network coding. International Journal of Communication Systems, 25(11), 1398\u20131414.","journal-title":"International Journal of Communication Systems"},{"issue":"3","key":"159_CR23","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TNET.2010.2091424","volume":"19","author":"S Rouayheb El","year":"2011","unstructured":"El Rouayheb, S., Sprintson, A., & Georghiades, C. (2011). Robust network codes for unicast connections: A case study. IEEE\/ACM Transactions on Networking (TON), 19(3), 644\u2013656.","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"159_CR24","unstructured":"Alessandro, S. (2003) Steiner tree NP-completeness proof. Technical report, University of Trento. Retrieved March 1, 2016 from http:\/\/profs.sci.univr.it\/~rrizzi\/classes\/Complexity\/provette\/Santuari\/steiner ."},{"key":"159_CR25","unstructured":"Japan photonic network model. Retrieved March 3, 2016 from http:\/\/www.ieice.org\/~pn\/jpn\/JPNM\/ ."},{"key":"159_CR26","unstructured":"Arakawa, S.S.T., & Tsukishima, Y. (2013). Topological characteristic of japan photonic network model. IEICE technical report, 113(91), 7\u201312."},{"issue":"6","key":"159_CR27","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1364\/JOCN.4.000480","volume":"4","author":"BC Chatterjee","year":"2012","unstructured":"Chatterjee, B. C., Sarma, N., & Sahu, P. P. (2012). Priority based routing and wavelength assignment with traffic grooming for optical networks. Journal of Optical Communications and Networking, IEEE\/OSA, 4(6), 480\u2013489.","journal-title":"Journal of Optical Communications and Networking, IEEE\/OSA"},{"key":"159_CR28","unstructured":"Mahony, M. (1996). Results from the cost 239 project. ultra-high capacity optical transmission networks. In: ECOC\u201996. 22nd European Conference on Optical Communication 1996, vol.\u00a02, pp. 11\u201318. IEEE"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0159-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-016-0159-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0159-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0159-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T08:40:40Z","timestamp":1567759240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-016-0159-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,5]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["159"],"URL":"https:\/\/doi.org\/10.1007\/s11235-016-0159-1","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,5]]}}}