{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:28:21Z","timestamp":1767374901902,"version":"3.40.5"},"reference-count":28,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2023,1,2]]},"DOI":"10.1080\/24751839.2022.2117125","type":"journal-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T16:45:17Z","timestamp":1663260317000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Game theory-based dynamic resource allocations scheme in virtual networks"],"prefix":"10.1080","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3836-1859","authenticated-orcid":false,"given":"Vianney","family":"Kengne Tchendji","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Dschang, Dschang, Cameroon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6002-9719","authenticated-orcid":false,"given":"Yannick Florian","family":"Yankam","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Dschang, Dschang, Cameroon"}]},{"given":"Ines Carole","family":"Kombou Sihomnou","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Dschang, Dschang, Cameroon"}]}],"member":"301","published-online":{"date-parts":[[2022,9,15]]},"reference":[{"key":"CIT0001","unstructured":"Bays, L. R., Oliveira, R. R., Buriol, L. S., Barcellos, M. P. & Gaspary, L. P. (2012). Security-aware optimal resource allocation for virtual network embedding. In 8th international conference on network and service management (CNSM) and workshop on systems virtualization management (SVM) (pp. 378\u2013384). IEEE."},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.09.005"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03819-8_6"},{"key":"CIT0004","first-page":"75","volume":"5","author":"Dautry R.","year":"1989","journal-title":"FLUX Cahiers Scientifiques Internationaux R\u00e9seaux Et Saraydars"},{"key":"CIT0005","unstructured":"Haider, A., Potter, R. & Nakao, A. (2009). Challenges in resource allocation in network virtualization. In 20th ITC specialist seminar. ITC."},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544027"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2012.74"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2007.4394198"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2011.6097256"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2013.092813.130397"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2017.8251218"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32162-2"},{"key":"CIT0013","unstructured":"Padala, P., Zhu, X., Wang, Z., Singhal, S. & Shin, K. G. (2007). Performance evaluation of virtualization technologies for server consolidation. HP Labs Technical Report 137 (pp. 1\u201314). Citeseer."},{"key":"CIT0014","unstructured":"Seddiki, M. S. (2015). Allocation dynamique des ressources et gestion de la qualit\u00e9 de service dans la virtualisation des r\u00e9seaux (Theses, Universit\u00e9 de Lorraine). https:\/\/hal.inria.fr\/tel-01751485."},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/NETWKS.2012.6381684"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289214"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6755042"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6013597"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.08.002"},{"key":"CIT0020","first-page":"23","volume":"31","author":"Tchendji V. K.","year":"2019","journal-title":"ARIMA Journal"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-020-00852-z"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.11.2581"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2010.5601426"},{"issue":"4","key":"CIT0024","first-page":"589","volume":"66","author":"Willig R. D.","year":"1976","journal-title":"The American Economic Review"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986662"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355737"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063177"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684331"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2022.2117125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T20:07:11Z","timestamp":1676405231000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2022.2117125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,15]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1,2]]}},"alternative-id":["10.1080\/24751839.2022.2117125"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2022.2117125","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"type":"print","value":"2475-1839"},{"type":"electronic","value":"2475-1847"}],"subject":[],"published":{"date-parts":[[2022,9,15]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-09-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}