{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:09:25Z","timestamp":1730236165240,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/iccnc.2013.6504115","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T17:30:11Z","timestamp":1366997411000},"page":"390-394","source":"Crossref","is-referenced-by-count":0,"title":["On the efficacy of WDM virtual topology design strategies"],"prefix":"10.1109","author":[{"family":"Xuezhou Ma","sequence":"first","affiliation":[]},{"given":"K.","family":"Harfoush","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"National LambdaRail Network","year":"2009","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/49.974667"},{"key":"10","first-page":"36","article-title":"Towards realistic physical topology models for internet backbone networks","author":"ma","year":"0","journal-title":"Proceedings of 6th IEEE International Symposium on High-Capacity Optical Networks and Enabling Technologies (HONET) 2009"},{"journal-title":"Optical WDM Networks Springer Science","year":"2006","author":"mukherjee","key":"1"},{"key":"7","first-page":"327","article-title":"A two-stage simulated annealing logical topology reconfiguration in ip over wdm networks","author":"xu","year":"2004","journal-title":"Proceedings 11th IEEE International Conference on Telecommunications Network Strategy and Planning Symposium"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893158"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/90.917075"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11107-005-4531-4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/0470855304"},{"key":"8","volume":"30","author":"skorin-kapov","year":"2008","journal-title":"Greedy Algorithms InTech"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.851794"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2004.1276606"}],"event":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC 2013)","start":{"date-parts":[[2013,1,28]]},"location":"San Diego, CA","end":{"date-parts":[[2013,1,31]]}},"container-title":["2013 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6495637\/6504039\/06504115.pdf?arnumber=6504115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:51:07Z","timestamp":1490223067000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6504115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2013.6504115","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}