{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:33:15Z","timestamp":1766136795352,"version":"3.41.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,12,24]],"date-time":"2016-12-24T00:00:00Z","timestamp":1482537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012164","name":"863 Program","doi-asserted-by":"crossref","award":["2015AA016102","2015AA015602"],"award-info":[{"award-number":["2015AA016102","2015AA015602"]}],"id":[{"id":"10.13039\/501100012164","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Zhejiang Province Science and technology project","award":["2014C01051"],"award-info":[{"award-number":["2014C01051"]}]},{"name":"Zhejiang Province Key scientific and technological innovation team","award":["2013TD20"],"award-info":[{"award-number":["2013TD20"]}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61379118"],"award-info":[{"award-number":["61379118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-016-3933-1","type":"journal-article","created":{"date-parts":[[2016,12,25]],"date-time":"2016-12-25T00:35:54Z","timestamp":1482626154000},"page":"2033-2048","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Hop-Limit Path Mapping Algorithm for Virtual Network Embedding"],"prefix":"10.1007","volume":"95","author":[{"given":"Min","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xijie","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,24]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Carapinha, J., & Jim\u00e9nez J.: \u2018Network virtualization: a view from the bottom. In Proceedings of the 1st ACM workshop on virtualized infrastructure systems and architectures, Barcelona, Spain, August 2009, pp. 73\u201380.","key":"3933_CR1","DOI":"10.1145\/1592648.1592660"},{"key":"3933_CR2","volume-title":"A survey of network virtualization","author":"N Chowdhury","year":"2008","unstructured":"Chowdhury, N., & Boutaba, R. (2008). A survey of network virtualization. Waterloo: David R. Cheriton School of Computer Science University of Waterloo."},{"doi-asserted-by":"crossref","unstructured":"Houidi, I., Louati, W., Zeghlache, D., & Baucke, S. (2009). Virtual resource description and clustering for virtual network discovery. In Proceedings of ICC. IEEE, Dresden, Germany, pp. 1\u20136.","key":"3933_CR3","DOI":"10.1109\/ICCW.2009.5207979"},{"doi-asserted-by":"crossref","unstructured":"Zhu, Y., & Ammar M. (2006). Algorithms for assigning substrate network resources to virtual network components. In Proceedings of IEEE INFOCOM, Barcelona, Catalunya, Spain, April 2006.","key":"3933_CR4","DOI":"10.1109\/INFOCOM.2006.322"},{"doi-asserted-by":"crossref","unstructured":"Szeto, W., Iraqi, Y., & Boutaba R. (2003). A multi-commodity flow based approach to virtual network resource allocation. In Proceedings of IEEE GLOBECOM, pp. 3004\u20133008.","key":"3933_CR5","DOI":"10.1109\/GLOCOM.2003.1258787"},{"issue":"2","key":"3933_CR6","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1355734.1355737","volume":"38","author":"M Yu","year":"2008","unstructured":"Yu, M., Yi, Y., Rexford, J., & Chiang, M. (2008). Rethinking virtual network embedding: Substrate support for path splitting and migration. ACM SIGCOMM Computer Communication Review, 38(2), 17\u201329.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"doi-asserted-by":"crossref","unstructured":"Chowdhury, N., Rahman, M., & Boutaba, R. (2009). Virtual network embedding with coordinated node and link mapping. In Proceedings of IEEE INFOCOM, pp. 783\u2013791.","key":"3933_CR7","DOI":"10.1109\/INFCOM.2009.5061987"},{"doi-asserted-by":"crossref","unstructured":"Lischka J., & Karl, H. (2009). A virtual network mapping algorithm based on subgraph isomorphism detection. In Proceedings of the 1st ACM workshop on virtualized infrastructure systems and architectures, Barcelona, Spain, August 2009, pp. 81\u201388.","key":"3933_CR8","DOI":"10.1145\/1592648.1592662"},{"issue":"2","key":"3933_CR9","doi-asserted-by":"crossref","first-page":"382","DOI":"10.23919\/CJE.2014.10851887","volume":"23","author":"L Wang","year":"2014","unstructured":"Wang, L., Qu, H., & Zhao, J. (2014). Virtual network embedding algorithm for load balance with various requests. Chinese Journal of Electronics, 23(2), 382\u2013387.","journal-title":"Chinese Journal of Electronics"},{"issue":"1","key":"3933_CR10","doi-asserted-by":"crossref","first-page":"61","DOI":"10.23919\/CJE.2014.10847954","volume":"23","author":"D Zhang","year":"2014","unstructured":"Zhang, D., & Gao, L. (2014). Virtual network mapping through locality-aware topological potential and influence node ranking. Chinese Journal of Electronics, 23(1), 61\u201364.","journal-title":"Chinese Journal of Electronics"},{"issue":"8","key":"3933_CR11","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1002\/dac.1399","volume":"26","author":"ZB Zhang","year":"2013","unstructured":"Zhang, Z. B., Cheng, X., Su, S., et al. (2013). A unified enhanced particle swarm optimization-based virtual network embedding algorithm. International Journal of Communication Systems, 26(8), 1054\u20131073.","journal-title":"International Journal of Communication Systems"},{"doi-asserted-by":"crossref","unstructured":"Hu, Q., Wang, Y., & Cao, X. (2013). Resolve the virtual network embedding problem: A column generation approach. In Proceedings of IEEE INFOCOM, 2013.","key":"3933_CR12","DOI":"10.1109\/INFCOM.2013.6566805"},{"issue":"3","key":"3933_CR13","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1109\/TNET.2014.2312928","volume":"23","author":"Abdallah Jarray","year":"2015","unstructured":"Jarray, Abdallah, & Karmouch, Ahmed. (2015). Decomposition approaches for virtual network embedding with one-shot node and link mapping. IEEE\/ACM Transactions on Networking, 23(3), 1012\u20131025.","journal-title":"IEEE\/ACM Transactions on Networking"},{"doi-asserted-by":"crossref","unstructured":"Inf\u00fchr, J., & Raidl, G. R. (2011). Introducing the virtual network mapping problem with delay, routing and location constraints. Network optimization, volume 6701 of the series\u00a0lecture notes in computer science, pp. 105\u2013117.","key":"3933_CR14","DOI":"10.1007\/978-3-642-21527-8_14"},{"issue":"5","key":"3933_CR15","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1109\/TNET.2013.2286156","volume":"22","author":"S Su","year":"2014","unstructured":"Su, S., Zhang, Z., Liu, A. X., Cheng, X., Wang, Y., & Zhao, X. (2014). Energy-aware virtual network embedding. IEEE\/ACM Transactions on Networking, 22(5), 1607\u20131620.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"C","key":"3933_CR16","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.comnet.2015.08.011","volume":"91","author":"M Melo","year":"2015","unstructured":"Melo, M., Sargento, S., Killat, U., Timm-Giel, A., & Carapinha, J. (2015). Optimal virtual network embedding: Energy aware formulation. Computer Networks, 91(C), 184\u2013195.","journal-title":"Computer Networks"},{"issue":"3","key":"3933_CR17","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/TPDS.2013.64","volume":"25","author":"S Zhang","year":"2014","unstructured":"Zhang, S., Qian, Z., Wu, J., Lu, S., & Epstein, L. (2014). Virtual network embedding with opportunistic resource sharing. IEEE Transactions on Parallel and Distributed Systems, 25(3), 816\u2013827.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"C","key":"3933_CR18","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.comnet.2015.08.014","volume":"91","author":"S Liu","year":"2015","unstructured":"Liu, S., Cai, Z., Xu, H., & Xu, M. (2015). Towards security-aware virtual network embedding. Computer Networks, 91(C), 151\u2013163.","journal-title":"Computer Networks"},{"key":"3933_CR19","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/0377-2217(95)00090-9","volume":"95","author":"L Gouveia","year":"1996","unstructured":"Gouveia, L. (1996). Multicommodity flow models for spanning trees with hop constraints. European Journal of Operational Research, 95, 178\u2013190.","journal-title":"European Journal of Operational Research"},{"doi-asserted-by":"crossref","unstructured":"Garg, N., & K\u00f6nemann, J. (1998). Faster and simpler algorithms for multicommodity flow and other fractional packing problems. In Proceedings IEEE Symposium on Foundations of Computer Science, pp. 300\u2013309.","key":"3933_CR20","DOI":"10.1109\/SFCS.1998.743463"},{"key":"3933_CR21","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1287\/moor.20.2.257","volume":"20","author":"SA Plotkin","year":"1995","unstructured":"Plotkin, S. A., Shmoys, D., & Tardos, E. (1995). Fast approximation algorithms for fractional packing and covering problems. Mathematics of Operations Research, 20, 257\u2013301.","journal-title":"Mathematics of Operations Research"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3933-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3933-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3933-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T21:42:54Z","timestamp":1749850974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3933-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,24]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["3933"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3933-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2016,12,24]]}}}