{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:38:42Z","timestamp":1729633122425,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icumt.2010.5676591","type":"proceedings-article","created":{"date-parts":[[2011,1,3]],"date-time":"2011-01-03T15:50:24Z","timestamp":1294069824000},"page":"497-503","source":"Crossref","is-referenced-by-count":2,"title":["Survivability of anycast and unicast flows under attacks on networks"],"prefix":"10.1109","author":[{"given":"Jacek","family":"Rak","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Walkowiak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.823426"},{"journal-title":"Optical WDM Networks","year":"2006","author":"mukherjee","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.04.091597"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"journal-title":"P2P Networking and Applications","year":"2009","author":"buford","key":"ref4"},{"journal-title":"Content Networking Architecture Protocols and Practice","year":"2005","author":"hofmann","key":"ref3"},{"key":"ref6","first-page":"1153","article-title":"Anycasting in adversaria1 systems: routing and admission control","volume":"2719","author":"awerbuch","year":"2003","journal-title":"LNCS"},{"journal-title":"ILOG AMPL\/CPLEX Software","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73986-9_32"},{"key":"ref7","first-page":"373","article-title":"Heuristic Algorithms for the generalized routing and wavelength assignment problem","author":"hyytia","year":"2004","journal-title":"Proceedings of the Seventeenth Nordic Teletraffic Seminar NTS-17"},{"key":"ref2","first-page":"70","article-title":"Shared protection in mesh WDM networks","volume":"42","author":"ho","year":"2004"},{"journal-title":"Network Recovery","year":"2004","author":"vasseur","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"barabasi","year":"1999","journal-title":"Science"}],"event":{"name":"2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2010)","start":{"date-parts":[[2010,10,18]]},"location":"Moscow, Russia","end":{"date-parts":[[2010,10,20]]}},"container-title":["International Congress on Ultra Modern Telecommunications and Control Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5655222\/5676472\/05676591.pdf?arnumber=5676591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T13:57:39Z","timestamp":1497880659000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5676591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icumt.2010.5676591","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}