{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T12:57:15Z","timestamp":1773406635123,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/infcom.2004.1354524","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T09:34:02Z","timestamp":1103794442000},"page":"524-535","source":"Crossref","is-referenced-by-count":33,"title":["On disjoint path pairs with wavelength continuity constraint in WDM networks"],"prefix":"10.1109","volume":"1","author":[{"given":"R.","family":"Andersen","sequence":"first","affiliation":[]},{"family":"Fan Chung","sequence":"additional","affiliation":[]},{"family":"Arunabha Sen","sequence":"additional","affiliation":[]},{"family":"Guoliang Xue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/90.803380"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00219-4"},{"key":"18","first-page":"272","article-title":"A novel approach to automatic protection switching using trees","author":"me?dard","year":"0","journal-title":"IEEE ICC'1997"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00260-2"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/50.511623"},{"key":"16","first-page":"2093","article-title":"Successive survivable routing for node failures","author":"liu","year":"0","journal-title":"GLOBECOM2001"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-6247-7"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916720"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808405"},{"key":"12","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TCOMM.2003.809779","article-title":"Diverse routing in optical mesh networks","volume":"51","author":"hu","year":"2003","journal-title":"IEEE Transactions on Communications"},{"key":"21","author":"mukherjee","year":"1997","journal-title":"Optical Communication Networks"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/90.986592"},{"key":"22","first-page":"302","article-title":"Distributed partial information management (DPIM) schemes for survivable networks - Part I","author":"qiao","year":"0","journal-title":"INFOCOM 2002"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751461"},{"key":"24","first-page":"2023","article-title":"Survivable WDM mesh networks. II. Restoration","author":"ramamurthy","year":"0","journal-title":"ICC 1999"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/12.936240"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/49.974659"},{"key":"27","first-page":"303","article-title":"Survivability of lightwave networks - Path lengths in WDM protection scheme","volume":"10","author":"sen","year":"2001","journal-title":"Journal of High Speed Networks"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230040204"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230140209"},{"key":"3","author":"bhandari","year":"1999","journal-title":"Survivable Networks Algorithms for Diverse Routing"},{"key":"2","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1117\/12.327081","article-title":"Fault-tolerant routing scheme for all optical networks","author":"bandyopadhyay","year":"1998","journal-title":"Proc SPIE All Optical Networking Conf Architecture Control and Management Issues"},{"key":"10","article-title":"Channel provisioning for higher layer protocols in WDM networks","author":"ghani","year":"1999","journal-title":"Proc SPIE All Optical Networking Conf Architecture Control and Management Issues"},{"key":"1","first-page":"198","article-title":"Dynamic establishment of protection paths in WDM networks","author":"anand","year":"0","journal-title":"ICCCN2000"},{"key":"30","first-page":"719","article-title":"Partial path protection for WDM networks: End-to-end recovery using local failure infonnation","author":"wang","year":"0","journal-title":"IEEE ISCC '02"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751459"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/49.265708"},{"key":"32","first-page":"1332","article-title":"Quality of service and quality of protection issues in preplanned recovery schemes using redundant trees","volume":"21","author":"xue","year":"2003","journal-title":"IEEE JSAC Optical Communications and Networking Series"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2147"},{"key":"31","first-page":"2691","article-title":"Delay reduction in redundant trees for pre-planned protection against singlelink\/node failure in 2-connected graphs","author":"xue","year":"0","journal-title":"IEEE GLOBECOM 2002"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/26.153361"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/35.825644"},{"key":"8","author":"garey","year":"1978","journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness"}],"event":{"name":"IEEE INFOCOM 2004","location":"Hong Kong, PR China","acronym":"INFCOM-04"},"container-title":["IEEE INFOCOM 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9369\/29751\/01354524.pdf?arnumber=1354524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T13:42:55Z","timestamp":1497620575000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1354524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/infcom.2004.1354524","relation":{},"subject":[]}}