{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:34:02Z","timestamp":1759336442130},"reference-count":26,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[1998,4,1]],"date-time":"1998-04-01T00:00:00Z","timestamp":891388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Operational Research"],"published-print":{"date-parts":[[1998,4]]},"DOI":"10.1016\/s0377-2217(97)00279-8","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T23:55:41Z","timestamp":1052783741000},"page":"357-372","source":"Crossref","is-referenced-by-count":24,"title":["A Tabu Search algorithm for the optimisation of telecommunication networks"],"prefix":"10.1016","volume":"106","author":[{"given":"Eugenio","family":"Costamagna","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"Fanni","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/S0377-2217(97)00279-8_BIB1","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1287\/opre.43.1.58","article-title":"A decomposition algorithm for local access telecommunications network expansion planning","volume":"43","author":"Balakrishnan","year":"1995","journal-title":"Operation Research"},{"issue":"1","key":"10.1016\/S0377-2217(97)00279-8_BIB2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/TCOM.1977.1093708","article-title":"Large scale network topological optimisation","volume":"25","author":"Boorstin","year":"1977","journal-title":"IEEE Trans. Communications"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB3","series-title":"Proceedings of IEEE International Conference on Systems, Man, and Cybernetics","first-page":"1227","article-title":"Genetic algorithm for telecommunication network optimisation","author":"Celli","year":"1995"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB4","first-page":"1","article-title":"Limited column generation for local access telecommunication network design. Formulations, algorithms, and implementation","author":"Cho","year":"1995"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB5","first-page":"826","article-title":"Topology and survivability of future transport networks","volume":"vol. 2","author":"Conlisk","year":"1989"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB6","series-title":"Proceedings of AIRO'90","first-page":"377","article-title":"Ottimizzazione di reti di comunicazione a larga banda con tecniche euristiche e di branch and bound: confronto delle prestazioni","author":"Costamagna","year":"1990"},{"issue":"No. 3","key":"10.1016\/S0377-2217(97)00279-8_BIB7","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1002\/ett.4460080312","article-title":"Heuristic algorithms for reliable multiplexed network design","volume":"vol. 8","author":"Costamagna","year":"1997","journal-title":"European Transactions on Telecommunications"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB8","series-title":"Proceedings of International Symposium on Signals, Systems and Electronics","first-page":"405","article-title":"A simulated annealing algorithm for the optimisation of communication network","author":"Costamagna","year":"1995"},{"issue":"6","key":"10.1016\/S0377-2217(97)00279-8_BIB9","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1002\/ett.4460040622","article-title":"Connectivity and reliability of telecommunication networks","volume":"4","author":"Costamagna","year":"1993","journal-title":"European Transactions on Telecommunications"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB10","series-title":"Proceedings of International Conference on Energy","first-page":"599","article-title":"An efficient method for solving operation and planning problems in distribution systems","author":"Fanni","year":"1989"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB11","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF02288320","article-title":"Shortest path algorithms","volume":"13","author":"Gallo","year":"1988","journal-title":"Annals of Operation Research"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB12","series-title":"Computers and Intractability \u2014 A Guide to the Theory of NP-Completeness","author":"Garey","year":"1979"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB13","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/0377-2217(92)90204-M","article-title":"Topological design of computer communication networks \u2014 The overall design problem","volume":"58","author":"Gavish","year":"1992","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"10.1016\/S0377-2217(97)00279-8_BIB14","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TCOM.1977.1093709","article-title":"On the topological design of distributed computer networks","volume":"25","author":"Gerla","year":"1977","journal-title":"IEEE Trans. Communications"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB15","series-title":"Memorandum to friends and colleagues exploring tabu search","author":"Glover","year":"1991"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB16","series-title":"Interfaces in Computer Science and Operations Research","article-title":"Tabu search and adaptive memory programming \u2014 Advances, applications and challenges","author":"Glover","year":"1996"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB17","series-title":"Tabu search fundamentals and uses","author":"Glover","year":"1994"},{"issue":"3","key":"10.1016\/S0377-2217(97)00279-8_BIB18","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1287\/ijoc.1.3.190","article-title":"Tabu search \u2014 Part I","volume":"1","author":"Glover","year":"1989","journal-title":"ORSA Journal on Computing"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB19","series-title":"Modern Heuristic Techniques for Combinatorial Problems","first-page":"70","article-title":"Tabu search","author":"Glover","year":"1993"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB20","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF02078647","article-title":"A user's guide to tabu search","volume":"41","author":"Glover","year":"1993","journal-title":"Annals of Operation Research"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB21","series-title":"A guide to implementing tabu search","author":"Laguna","year":"1993"},{"issue":"4","key":"10.1016\/S0377-2217(97)00279-8_BIB22","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1287\/mnsc.39.4.492","article-title":"Bandwidth packing: A tabu search approach","volume":"39","author":"Laguna","year":"1993","journal-title":"Management Science"},{"key":"10.1016\/S0377-2217(97)00279-8_BIB23","first-page":"808","article-title":"Considerations and concerns for survivability of the Chicago MSA fibre optic network","volume":"vol. 2","author":"Luby","year":"1989"},{"issue":"1","key":"10.1016\/S0377-2217(97)00279-8_BIB24","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TCOM.1977.1093710","article-title":"Network design: An algorithm for the access facility location problem","volume":"25","author":"McGregor","year":"1977","journal-title":"IEEE Trans. Communications"},{"issue":"8","key":"10.1016\/S0377-2217(97)00279-8_BIB25","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1109\/49.35566","article-title":"Impact of emerging switching-transmission cost trade-off on future telecommunications network architectures","volume":"7","author":"Moondra","year":"1989","journal-title":"IEEE J. Select Areas Commun."},{"key":"10.1016\/S0377-2217(97)00279-8_BIB26","first-page":"1231","article-title":"The evolution of telecommunications technology","volume":"74","author":"Vickers","year":"1986"}],"container-title":["European Journal of Operational Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221797002798?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221797002798?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T20:58:24Z","timestamp":1556657904000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0377221797002798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,4]]},"references-count":26,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[1998,4]]}},"alternative-id":["S0377221797002798"],"URL":"https:\/\/doi.org\/10.1016\/s0377-2217(97)00279-8","relation":{},"ISSN":["0377-2217"],"issn-type":[{"value":"0377-2217","type":"print"}],"subject":[],"published":{"date-parts":[[1998,4]]}}}