{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:02:38Z","timestamp":1725771758441},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/drcn.2016.7470840","type":"proceedings-article","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T07:51:13Z","timestamp":1463730673000},"page":"95-102","source":"Crossref","is-referenced-by-count":12,"title":["Detection of spatially-close fiber segments in optical networks"],"prefix":"10.1109","author":[{"given":"Farabi","family":"Iqbal","sequence":"first","affiliation":[]},{"given":"Stojan","family":"Trajanovski","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Kuipers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2015.02.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.017"},{"journal-title":"Availability-based path selection and network vulnerability assessment","year":"2015","author":"yang","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1137\/0202001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/322077.322090"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/362342.362367"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.06.015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ONDM.2015.7127306"},{"year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5402\/2012\/932456"},{"year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"year":"0","key":"ref5"},{"article-title":"Five balltree construction algorithms","year":"1989","author":"omohundro","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007608"},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BF02760024"},{"key":"ref22","article-title":"Analysis of geometric disaster evaluation model for physical networks","author":"saito","year":"2014","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.10.026"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2014.2334713"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2309253"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2012.2232281"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6917401"}],"event":{"name":"2016 12th International Conference on the Design of Reliable Communication Networks (DRCN)","start":{"date-parts":[[2016,3,15]]},"location":"Paris, France","end":{"date-parts":[[2016,3,17]]}},"container-title":["2016 12th International Conference on the Design of Reliable Communication Networks (DRCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7467375\/7470820\/07470840.pdf?arnumber=7470840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T17:02:23Z","timestamp":1475168543000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7470840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/drcn.2016.7470840","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}