{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:13:20Z","timestamp":1730232800699,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iccais.2018.8570657","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T01:32:27Z","timestamp":1544664747000},"page":"194-199","source":"Crossref","is-referenced-by-count":0,"title":["Operational Network Topology Reeonfiguration Based on Foeus of Guarantee"],"prefix":"10.1109","author":[{"given":"Jianfeng","family":"Hou","sequence":"first","affiliation":[]},{"given":"Ruicheng","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Ye","family":"He","sequence":"additional","affiliation":[]},{"given":"Wangqi","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Xucfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dongsheng","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Proceedings of the 3rd In-ternational Conference on Bio-Inspired Models of Net-work Information and Computing Systems (Bionetics2008) Hyogo","year":"2008","author":"wang","key":"ref4"},{"journal-title":"Proceedings of the 2nd Inter-national Workshop on Self-Organizing System (IWSOS 2007) The Lake District","year":"2007","author":"sekiyama","key":"ref3"},{"key":"ref10","first-page":"123","article-title":"Network capacity based on complex network theory [J]","volume":"35","author":"dongchao","year":"2011","journal-title":"Journal of Beijing Jiao Tong University"},{"journal-title":"KSII T In-temet Info 6 1333","year":"2012","author":"li","key":"ref6"},{"key":"ref11","first-page":"108","author":"fuli","year":"2013","journal-title":"Research on Supernetwork based Modeling and Analysis for Military Communication Network Reconfiguration [D]"},{"journal-title":"Delft","year":"2009","author":"martinez","key":"ref5"},{"key":"ref8","first-page":"319","article-title":"An Optimized Topology Reconfiguratione Bidirectional Searching Fault-tolerant Algorithm for Remesh Network-on-Chip","author":"fangfa","year":"2017","journal-title":"Proceedings of 12th International Conference on ASIC"},{"journal-title":"Designing a ForceNet information topolopy[D]","year":"2004","author":"krajacich","key":"ref7"},{"key":"ref2","volume":"42","author":"zhao","year":"2009","journal-title":"Phys A Math Theor"},{"key":"ref9","first-page":"7","article-title":"Energy-efficient Topology Reconfiguration in Green Fiber-Wireless(FiWi) Access Network","author":"yejun","year":"2013","journal-title":"Proc 22nd Wireless Opt Commun Conf"},{"key":"ref1","first-page":"357","article-title":"Rish I","author":"beygelzimer","year":"2005","journal-title":"Physica A"}],"event":{"name":"2018 International Conference on Control, Automation and Information Sciences (ICCAIS)","start":{"date-parts":[[2018,10,24]]},"location":"Hangzhou","end":{"date-parts":[[2018,10,27]]}},"container-title":["2018 International Conference on Control, Automation and Information Sciences (ICCAIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8555973\/8570318\/08570657.pdf?arnumber=8570657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T06:06:18Z","timestamp":1598249178000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8570657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iccais.2018.8570657","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}