{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T00:02:06Z","timestamp":1758931326937,"version":"3.44.0"},"reference-count":29,"publisher":"Elsevier BV","issue":"17","license":[{"start":{"date-parts":[[1998,11,1]],"date-time":"1998-11-01T00:00:00Z","timestamp":909878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[1998,11,1]],"date-time":"1998-11-01T00:00:00Z","timestamp":909878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[1999,1,11]],"date-time":"1999-01-11T00:00:00Z","timestamp":916012800000},"content-version":"vor","delay-in-days":71,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1998,11]]},"DOI":"10.1016\/s0140-3664(98)00223-0","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T08:08:03Z","timestamp":1027584483000},"page":"1571-1584","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"title":["Fuzzy multiobjective routing model in B-ISDN"],"prefix":"10.1016","volume":"21","author":[{"given":"Emad","family":"Aboelela","sequence":"first","affiliation":[]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(98)00223-0_BIB1","unstructured":"D. Bertsekas, R. Gallager, Data Networks, Prentice-Hall, Englewood Cliffs, NJ, 1987."},{"issue":"1","key":"10.1016\/S0140-3664(98)00223-0_BIB2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1002\/net.3230140109","article-title":"Algorithms for finding paths with multiple constraints","volume":"14","author":"Jaffe","year":"1984","journal-title":"Networks"},{"issue":"7","key":"10.1016\/S0140-3664(98)00223-0_BIB3","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1109\/49.536364","article-title":"Quality-of-service routing for supporting multimedia applications","volume":"14","author":"Wang","year":"1996","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"8","key":"10.1016\/S0140-3664(98)00223-0_BIB4","first-page":"999","article-title":"ATM routing algorithms with multiple QoS requirements for multimedia internetworking","volume":"E79B","author":"Iwata","year":"1996","journal-title":"IEICE Transactions on Communications"},{"issue":"7","key":"10.1016\/S0140-3664(98)00223-0_BIB5","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1109\/49.536365","article-title":"QoS-based routing of multimedia streams in computer networks","volume":"14","author":"Vogel","year":"1996","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB6","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Information and Control"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB7","doi-asserted-by":"crossref","unstructured":"S. Chanas, Fuzzy optimization in networks, in: Optimization Models Using Fuzzy Sets and Possibility Theory, D. Reidel Publishing Company, The Netherlands, 1987, pp. 303\u2013327.","DOI":"10.1007\/978-94-009-3869-4_21"},{"issue":"7","key":"10.1016\/S0140-3664(98)00223-0_BIB8","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/35.391441","article-title":"A fuzzy control approach for adaptive traffic routing","volume":"33","author":"Chemouil","year":"1995","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB9","doi-asserted-by":"crossref","unstructured":"M. Sakawa, Fuzzy Sets and Interactive Multiobjective Optimization, Plenum Press, New York, 1993.","DOI":"10.1007\/978-1-4899-1633-4"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB10","doi-asserted-by":"crossref","unstructured":"H.J. Zimmermann, Fuzzy Sets, Decision Making, and Expert Systems, Kluwer Academic Publishers, Boston, MA, 1987.","DOI":"10.1007\/978-94-009-3249-4"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB11","doi-asserted-by":"crossref","unstructured":"R.O. Onvural, I. Nikolaidis, Routing in ATM networks, in: H. Perros (Ed.), High-Speed Communication Networks, Plenum Press, New York, 1992, pp. 139\u2013150.","DOI":"10.1007\/978-1-4615-3450-1_10"},{"issue":"2","key":"10.1016\/S0140-3664(98)00223-0_BIB12","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1006\/jpdc.1996.0099","article-title":"Load-balancing in multistage interconnection networks under multiple-pass routing","volume":"36","author":"Wang","year":"1996","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"10","key":"10.1016\/S0140-3664(98)00223-0_BIB13","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1109\/TCOM.1983.1095752","article-title":"An algorithm for optimal route selection in SNA networks","volume":"COM31","author":"Gavish","year":"1983","journal-title":"IEEE Transactions on Communications"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB14","unstructured":"D. Dykeman, M. Goguen, PNNI Draft Specification, ATM Forum 94-0471R14, 1995."},{"issue":"4","key":"10.1016\/S0140-3664(98)00223-0_BIB15","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/65.397043","article-title":"Routing subject to quality of service constraints in integrated communication networks","volume":"9","author":"Lee","year":"1995","journal-title":"IEEE Network"},{"issue":"4","key":"10.1016\/S0140-3664(98)00223-0_BIB16","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1109\/26.20116","article-title":"A system for routing and capacity assignment in computer communication networks","volume":"37","author":"Gavish","year":"1989","journal-title":"IEEE Transactions on Communications"},{"issue":"4","key":"10.1016\/S0140-3664(98)00223-0_BIB17","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1287\/mnsc.17.4.B141","article-title":"Decision-making in a fuzzy environment","volume":"17","author":"Bellman","year":"1970","journal-title":"Management Science"},{"issue":"8","key":"10.1016\/S0140-3664(98)00223-0_BIB18","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/49.35570","article-title":"Topology design and bandwidth allocation in ATM nets","volume":"7","author":"Gerla","year":"1989","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"10.1016\/S0140-3664(98)00223-0_BIB19","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/49.76630","article-title":"Modeling and performance comparison of policing mechnisms for ATM networks","volume":"9","author":"Rathgeb","year":"1991","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB20","doi-asserted-by":"crossref","unstructured":"P. Casteli, A. Forcina, A. Tonieti, Dimensioning criteria for policing functions in ATM networks, in: IEEE INFOCOM 1992 (Florence, Italy), vol. 2, 1992, pp. 759\u2013766.","DOI":"10.1109\/INFCOM.1992.263503"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB21","doi-asserted-by":"crossref","unstructured":"F. Guillemin, P. Boyer, A. Dupuis, L. Romoeuf, Peak rate enforcement in ATM networks, in: IEEE INFOCOM 1992 (Florence, Italy), vol. 2, 1992, pp. 753\u2013758.","DOI":"10.1109\/INFCOM.1992.263502"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB22","unstructured":"M. Schwartz, Telecommunication Networks: Protocols, Modeling and Analysis, Addison-Wesley, Reading, MA, 1987."},{"issue":"3","key":"10.1016\/S0140-3664(98)00223-0_BIB23","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/5.364485","article-title":"Fuzzy logic systems for engineering: a tutorial","volume":"83","author":"Mendel","year":"1995","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"10.1016\/S0140-3664(98)00223-0_BIB24","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1002\/net.3230030202","article-title":"The flow deviation method: an approach to store-and-forward communication network design","volume":"3","author":"Fratta","year":"1973","journal-title":"Networks"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB25","unstructured":"G. Sommer, M.A. Pollastschek, A fuzzy programming approach to an air pollution regulation problem, in: R. Trappl, G.J. Klir, L. Ricciardi (Eds.), Progress in Cybernetics and Systems Research, 1978, pp. 303\u2013323."},{"key":"10.1016\/S0140-3664(98)00223-0_BIB26","doi-asserted-by":"crossref","unstructured":"Q. Ma, P. Steenkiste, H. Zhang, Routing high-bandwidth traffic in max\u2013min fair share networks, in: ACM SIGCOMM'96 (California, USA), 1996, pp. 206\u2013217.","DOI":"10.1145\/248156.248175"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB27","unstructured":"J.R. Evans, E. Minieka, Optimization Algorithms For Networks and Graphs, Marcel Dekker, Inc., New York, 1992."},{"issue":"3","key":"10.1016\/S0140-3664(98)00223-0_BIB28","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1002\/net.3230090303","article-title":"On algorithms for finding the k-shortest paths in a network","volume":"9","author":"Shier","year":"1979","journal-title":"Networks"},{"key":"10.1016\/S0140-3664(98)00223-0_BIB29","unstructured":"D. Zappala, D. Estrin, S. Shenker, Alternative path routing and pinning for interdomain multicast routing, USC Computer Science Technical Report #97-655, USC, 1997."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498002230?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498002230?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:17:10Z","timestamp":1758842230000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366498002230"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,11]]},"references-count":29,"journal-issue":{"issue":"17","published-print":{"date-parts":[[1998,11]]}},"alternative-id":["S0140366498002230"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(98)00223-0","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[1998,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Fuzzy multiobjective routing model in B-ISDN","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S0140-3664(98)00223-0","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 1998 Elsevier Science B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}