{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:57:21Z","timestamp":1729648641581,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icumt.2009.5345592","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T15:43:49Z","timestamp":1260459829000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Optimization of survivable networks with simultaneous unicast and anycast flows"],"prefix":"10.1109","author":[{"given":"Jakub","family":"Gladysz","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Walkowiak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73986-9_32"},{"key":"17","article-title":"Peer-to-Peer Systems and Applications","volume":"3485","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Network Recovery Protection and Restoration of Optical SONET-SDH IP and MPLS","year":"2004","author":"vasseur","key":"18"},{"journal-title":"Routing Flow and Capacity Design in Communication and Computer Networks","year":"2004","author":"pioro","key":"15"},{"journal-title":"Framework for MPLS-Based Recovery","year":"2003","author":"sharma","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.244"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/0470016361"},{"key":"11","article-title":"Branch-and-cut methods for combinatorial optimization problems","author":"mitchell","year":"2002","journal-title":"Handbook of Applied Optimization"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e88-b.10.3941"},{"journal-title":"Theoretical and Algorithmic Aspects of Sensor Ad Hoc Wireless and Peer-to-Peer Networks","year":"0","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080127"},{"key":"1","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1007\/3-540-45061-0_88","article-title":"anycasting in adversarial systems: routing and admission control","volume":"2719","author":"awerbuch","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1287\/opre.49.3.363.11211"},{"journal-title":"Content Networking Architecture Protocols and Practice","year":"2005","author":"hofmann","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s101070050077","article-title":"Branch-and-Cut Algorithm for Capacitated Network Design Problems","volume":"86","author":"gunluk","year":"1999","journal-title":"Math Programming"},{"journal-title":"Mesh-Based Survivable Networks Options and Strategies for Optical MPLS SONET and ATM Networking","year":"2004","author":"grover","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/LINDI.2009.5258759"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"Workshops (ICUMT)","start":{"date-parts":[[2009,10,12]]},"location":"St. Petersburg, Russia","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 International Conference on Ultra Modern Telecommunications &amp; Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340227\/5345316\/05345592.pdf?arnumber=5345592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T02:40:31Z","timestamp":1497840031000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5345592\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icumt.2009.5345592","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}