{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T05:27:03Z","timestamp":1654147623961},"reference-count":28,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T00:00:00Z","timestamp":1064966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2003,10]]},"DOI":"10.1016\/s1389-1286(03)00259-7","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T23:54:49Z","timestamp":1052783689000},"page":"195-209","source":"Crossref","is-referenced-by-count":6,"title":["Placement of network resources in communication networks"],"prefix":"10.1016","volume":"43","author":[{"given":"Ran","family":"Giladi","sequence":"first","affiliation":[]},{"given":"Ephraim","family":"Korach","sequence":"additional","affiliation":[]},{"given":"Rony","family":"Ohayon","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(03)00259-7_BIB1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/35.707822","article-title":"Broadband traffic modeling: simple solutions to hard problems","volume":"36","author":"Addie","year":"1998","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB2","doi-asserted-by":"crossref","unstructured":"R.G. Addie, M. Zukerman, and T. Neame, Fractal traffic: measurements, modeling and performance evaluation, Proc. IEEE INFOCOM 1995, pp. 977\u2013984","DOI":"10.1109\/INFCOM.1995.515973"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB3","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1016\/S1389-1286(00)00115-8","article-title":"Placement of network servers in a wide-area network","volume":"34","author":"Al-Fawzan","year":"2000","journal-title":"Computer Networks"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB4","first-page":"170","article-title":"An overview of genetic algorithms","volume":"15","author":"Beasley","year":"1993","journal-title":"University Computing"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB5","series-title":"Data Networks","author":"Bertsekas","year":"1992"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB6","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/49.700910","article-title":"The M\/G\/1 queue with heavy-tailed service time distribution","volume":"16","author":"Boxma","year":"1998","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB7","doi-asserted-by":"crossref","unstructured":"N. Brownlee, C. Mills, G. Ruth, Traffic Flow Measurements: Architecture. IETF, Internet RFC No. 2063, 1997","DOI":"10.17487\/rfc2063"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB8","series-title":"Networks and Algorithms: An Introductory Approach","author":"Dolan","year":"1993"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB9","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/90.541324","article-title":"Topological design of local area networks using genetic algorithms","volume":"4","author":"Elbaum","year":"1996","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB10","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1109\/90.491008","article-title":"Experimental queuing analysis with long-range dependent packet traffic","volume":"4","author":"Erramilli","year":"1997","journal-title":"IEEE\/ACM Transactions on Network Computing"},{"issue":"8","key":"10.1016\/S1389-1286(03)00259-7_BIB11","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1109\/49.245906","article-title":"Topological design of interconnected LAN\/MAN networks","volume":"11","author":"Ersoy","year":"1993","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB12","doi-asserted-by":"crossref","first-page":"1400","DOI":"10.1016\/S0140-3664(01)00297-3","article-title":"Multifractal modeling of counting processes of long-range dependent network traffic","volume":"24","author":"Gao","year":"2001","journal-title":"Computer Communications"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB13","series-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"Garey","year":"1979"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB14","series-title":"Graphs and Algorithms","author":"Gondran","year":"1984"},{"issue":"7","key":"10.1016\/S1389-1286(03)00259-7_BIB15","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/49.103545","article-title":"Equivalent capacity and its application to bandwidth allocation in high Speed networks","volume":"9","author":"Guerin","year":"1991","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB16","series-title":"Location in Networks: Theory and Algorithms","author":"Handler","year":"1979"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB17","series-title":"Telecommunications Networks Design Algorithms","author":"Kershenbaum","year":"1993"},{"issue":"4598","key":"10.1016\/S1389-1286(03)00259-7_BIB18","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"Kirkpatrick","year":"1983","journal-title":"Science"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB19","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1051\/ro:2001107","article-title":"Solving the simple plant location problem by genetic algorithm","volume":"35","author":"Kratica","year":"2001","journal-title":"RAIRO Operations Research"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/90.282603","article-title":"On the self-similar nature of Ethernet traffic","volume":"2","author":"Leland","year":"1994","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB21","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0140-3664(99)00166-8","article-title":"A Pareto-modulated Poisson process (PMPP) model for long-range dependent traffic","volume":"23","author":"Le-Ngoc","year":"2000","journal-title":"Computer Communications"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB22","series-title":"Designing the Total Area Network","author":"Norris","year":"2000"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB23","series-title":"Self-similar Network Traffic and Performance Evaluation","author":"Park","year":"2000"},{"issue":"2","key":"10.1016\/S1389-1286(03)00259-7_BIB24","first-page":"181","article-title":"Performance analysis of interconnected CSMA\/CD local area networks","volume":"139","author":"Sykas","year":"1992","journal-title":"IEEE Proceedings-I"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB25","series-title":"Simulated Annealing: Theory and Applications","author":"Van Laarhoven","year":"1987"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB26","doi-asserted-by":"crossref","unstructured":"S. Waldbusser, Remote Network Monitoring Management Information Base. IETF, Internet RFC No. 1757, 1995","DOI":"10.17487\/rfc1757"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB27","doi-asserted-by":"crossref","unstructured":"S. Waldbusser, Remote Network Monitoring Management Information Base Version 2 using SMIv2. IETF, Internet RFC No. 2021, 1997","DOI":"10.17487\/rfc2021"},{"key":"10.1016\/S1389-1286(03)00259-7_BIB28","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/90.554723","article-title":"Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level","volume":"5","author":"Willinger","year":"1997","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603002597?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603002597?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T12:54:06Z","timestamp":1584622446000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128603002597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,10]]}},"alternative-id":["S1389128603002597"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(03)00259-7","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2003,10]]}}}