{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:23:34Z","timestamp":1755221014523,"version":"3.43.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1-4","license":[{"start":{"date-parts":[[2000,8,1]],"date-time":"2000-08-01T00:00:00Z","timestamp":965088000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,8,1]],"date-time":"2000-08-01T00:00:00Z","timestamp":965088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommunication Systems"],"published-print":{"date-parts":[[2000,8]]},"DOI":"10.1023\/a:1019149602643","type":"journal-article","created":{"date-parts":[[2003,2,19]],"date-time":"2003-02-19T18:30:27Z","timestamp":1045679427000},"page":"243-267","source":"Crossref","is-referenced-by-count":5,"title":["Preplanned rerouting optimization and dynamic path rerouting for ATM VP restoration"],"prefix":"10.1007","volume":"14","author":[{"given":"Heesang","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hae\u2010Goo","family":"Song","sequence":"additional","affiliation":[]},{"given":"Ji\u2010Bok","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Sung\u2010Jin","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"329809_CR1","volume-title":"Network Flows: Theory, Algorithms and Applications","author":"R.K. Ahuja","year":"1992","unstructured":"R.K. Ahuja, T.L. Magnanti and J.B. Orlin, Network Flows: Theory, Algorithms and Applications (Prentice-Hall, Englewood Cliffs, NJ, 1992)."},{"issue":"1","key":"329809_CR2","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/49.265712","volume":"12","author":"J. Anderson","year":"1994","unstructured":"J. Anderson, B.T. Doshi, S. Dravida and P. Harshavardhana, Fast restoration of ATM networks, IEEE Journal on Selected Areas in Communications 12(1) (1994) 128\u2013138.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"329809_CR3","unstructured":"Annals of Information and Telecommunications 1996 (Seoul Electronics News Press, Seoul, Korea, 1996)."},{"key":"329809_CR4","doi-asserted-by":"crossref","unstructured":"C. Barnhart, C.A. Hane and P.H. Vance, Integer multicommodity flow problem, NSF DDM-9058074, NSF DMI-9502502 (1996).","DOI":"10.1007\/3-540-61310-2_5"},{"issue":"1","key":"329809_CR5","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/49.265714","volume":"12","author":"H. Fujii","year":"1994","unstructured":"H. Fujii and N. Yoshikai, Restoration message transfer mechanism and restoration characteristics of double-search self-healing ATM network, IEEE Journal on Selected Areas in Communications 12(1) (1994) 149\u2013158.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"329809_CR6","unstructured":"Y. Fujita, T-H. Wu and H. Fowler, ATM VP protection switching and applications, in: Proc. of ISS\u2019 95, Berlin, Germany (1995) pp. 30.1\u201330.5."},{"issue":"6","key":"329809_CR7","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/90.556344","volume":"4","author":"O. Gerstel","year":"1996","unstructured":"O. Gerstel and I. Cidion, The layout of virtual paths in ATM networks, IEEE\/ACM Transactions on Networking 4(6) (1996) 873\u2013883.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"1","key":"329809_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/49.265711","volume":"12","author":"R. Kawamura","year":"1994","unstructured":"R. Kawamura, K.I. Sato and I. Tokizawa, Self-healing ATM networks based on virtual path concept, IEEE Journal on Selected Areas in Communications 12(1) (1994) 120\u2013127.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"329809_CR9","doi-asserted-by":"crossref","unstructured":"R. Kawamura and I. Tokizawa, Self healing virtual path architecture in ATM networks, IEEE Communications Magazine (September 1995) 72\u201379.","DOI":"10.1109\/35.408428"},{"key":"329809_CR10","first-page":"1","volume":"P2","author":"R. Kawamura","year":"1998","unstructured":"R. Kawamura, T. Yahara and H. Uematsu, Self-healing ATM network architecture and their field deployment, in: Proc. of 1st Internat. Workshop on the Design of Reliable Communication Networks (1998) P2 pp. 1\u20136.","journal-title":"Proc. of 1st Internat. Workshop on the Design of Reliable Communication Networks"},{"key":"329809_CR11","unstructured":"N.D. Lin, A. Zolfaghari and B. Lusignan, ATM virtual path self-healing based on a new path restoration protocol, in: Proc. of GLOBECOM\u2019 94 (1994) pp. 794\u2013798."},{"key":"329809_CR12","unstructured":"Y.D. Lin, W.J. Su and C.C. Lo, Virtual path management in ATM networks, in: Proc. of IEEE ICC\u2019 96 (1996) pp. 642\u2013646."},{"issue":"10","key":"329809_CR13","doi-asserted-by":"publisher","first-page":"2630","DOI":"10.1109\/26.469436","volume":"43","author":"M. Logothetis","year":"1995","unstructured":"M. Logothetis and S. Shioda, Medium-term centralized virtual-path bandwidth control based on traffic measurements, IEEE Transactions on Communications 43(10) (1995) 2630\u20132640.","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"329809_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/90.503759","volume":"4","author":"K. Murakami","year":"1996","unstructured":"K. Murakami and H.S. Kim, Virtual path routing for survivable ATM networks, IEEE\/ACM Transactions on Networking 4(1) (1996) 22\u201339.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"329809_CR15","doi-asserted-by":"crossref","unstructured":"L. Nederlof, K. Struyve, C. O'hea, H. Misser, Y. Du and B. Tamayo, End-to-end survivable broadband networks, IEEE Communications Magazine (September 1995) 63\u201370.","DOI":"10.1109\/35.408427"},{"key":"329809_CR16","doi-asserted-by":"crossref","DOI":"10.1002\/9781118627372","volume-title":"Integer and Combinatorial Optimization","author":"G.L. Nemhauser","year":"1988","unstructured":"G.L. Nemhauser and Wolsey, Integer and Combinatorial Optimization (Wiley, New York, 1988)."},{"issue":"9","key":"329809_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/35.408429","volume":"33","author":"E. Oki","year":"1995","unstructured":"E. Oki, N. Yamanaka and F. Pitcho, Multiple-availability-level ATM network architecture, IEEE Communications Magazine 33(9) (1995) 80\u201388.","journal-title":"IEEE Communications Magazine"},{"issue":"8","key":"329809_CR18","doi-asserted-by":"publisher","first-page":"1212","DOI":"10.1109\/26.58754","volume":"38","author":"K. Sato","year":"1990","unstructured":"K. Sato, S. Ohta and I. Tokizawa, Broad-band ATM network architecture based on virtual paths, IEEE Transactions on Communications 38(8) (1990) 1212\u20131222.","journal-title":"IEEE Transactions on Communications"},{"key":"329809_CR19","doi-asserted-by":"crossref","unstructured":"P. Veitch, I. Hawker and G. Smith, Administration of restorable virtual path mesh networks, IEEE Communications Magazine (December 1996) 96\u2013101.","DOI":"10.1109\/35.556492"},{"key":"329809_CR20","volume-title":"Fiber Network Service Survivability","author":"T.H. Wu","year":"1992","unstructured":"T.H. Wu, Fiber Network Service Survivability (Artech House, Northwood, 1992)."},{"issue":"1","key":"329809_CR21","first-page":"73","volume":"8","author":"J. Yamada","year":"1996","unstructured":"J. Yamada, I. Ide and J. Matsuda, Real-time network management technologies for B-ISDN, NTT Review 8(1) (1996) 73\u201378.","journal-title":"NTT Review"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019149602643.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1019149602643\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019149602643.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T06:28:51Z","timestamp":1754634531000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1019149602643"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,8]]},"references-count":21,"journal-issue":{"issue":"1-4","published-print":{"date-parts":[[2000,8]]}},"alternative-id":["329809"],"URL":"https:\/\/doi.org\/10.1023\/a:1019149602643","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2000,8]]}}}