{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:25:17Z","timestamp":1725776717323},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/inm.2015.7140345","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T17:19:27Z","timestamp":1436203167000},"page":"612-618","source":"Crossref","is-referenced-by-count":6,"title":["Control-plane slicing methods in multi-tenant software defined networks"],"prefix":"10.1109","author":[{"given":"C.","family":"Argyropoulos","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Mastorakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K.","family":"Giotis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G.","family":"Androulidakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D.","family":"Kalogeras","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V.","family":"Maglaris","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"(Informational)","article-title":"A Path Computation Element (PCE)-Based Architecture","year":"0","key":"ref32"},{"journal-title":"Tcpdump\/Libpcap","year":"0","key":"ref31"},{"key":"ref30","first-page":"492","article-title":"The Art of Computer Programming, Volume 3: Sorting and Searching","author":"knuth","year":"1997"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355737"},{"year":"0","key":"ref11","article-title":"Flowspace Firewall"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2159308"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.31"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1921151.1921162"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620741"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2012.19"},{"key":"ref17","first-page":"1122","article-title":"Progressive virtual topology embedding in OpenFlow networks","author":"riggio","year":"2013","journal-title":"Integrated Network Management (IM 2013) IFIP\/IEEE International Symposium on Integrated Network Management"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.144"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"year":"0","key":"ref28","article-title":"The Internet Topology Zoo project"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"year":"0","key":"ref27","article-title":"FlowSpace Policy Rule Engine"},{"journal-title":"ONF White Paper","article-title":"Open Networking Foundation, Software-Defined Networking: The New Norm for Networks","year":"0","key":"ref3"},{"year":"0","key":"ref6","article-title":"NTT Communications' Enterprise Cloud Goes Global"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.1997.616037"},{"key":"ref5","first-page":"351","article-title":"Onix: A Distributed Control Platform for Large-scale Production Networks","author":"koponen","year":"2010","journal-title":"Proceedings of USENIX OSDI"},{"year":"0","key":"ref8","article-title":"GEANT Topology 2012"},{"year":"0","key":"ref7","article-title":"Internet2 Open Science, Scholarship and Services Exchange"},{"journal-title":"Internet draft","article-title":"NVGRE: Network Virtualization using Generic Routing Encapsulation","year":"0","key":"ref2"},{"key":"ref9","article-title":"Can the production network be the testbed?","author":"sherwood","year":"2010","journal-title":"Proceedings of USENIX OSDI"},{"journal-title":"RFC 7348 (Informational)","article-title":"VXLAN: A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342444"},{"journal-title":"RFC 3460 (Proposed Standard)","article-title":"Policy Core Information Model (PCIM) Extensions","year":"0","key":"ref22"},{"journal-title":"RFC 3198 (Informational)","article-title":"Terminology for Policy-Based Management","year":"0","key":"ref21"},{"article-title":"Policy-based Network Management: Solutions for the Next Generation","year":"2003","author":"strassner","key":"ref24"},{"year":"0","key":"ref23","article-title":"DMTF, Distributed Management Task Force"},{"year":"0","key":"ref26","article-title":"OpenFlow Protocol version 1.4.0 specification"},{"article-title":"Network Management Know It All","year":"2011","author":"farrel","key":"ref25"}],"event":{"name":"2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","start":{"date-parts":[[2015,5,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2015,5,15]]}},"container-title":["2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7121095\/7140257\/07140345.pdf?arnumber=7140345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:30:40Z","timestamp":1490365840000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7140345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/inm.2015.7140345","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}