{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:32:40Z","timestamp":1773801160471,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/netsoft.2015.7116120","type":"proceedings-article","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T19:33:14Z","timestamp":1433964794000},"page":"1-9","source":"Crossref","is-referenced-by-count":241,"title":["Design and evaluation of algorithms for mapping and scheduling of virtual network functions"],"prefix":"10.1109","author":[{"given":"Rashid","family":"Mijumbi","sequence":"first","affiliation":[]},{"given":"Joan","family":"Serrat","sequence":"additional","affiliation":[]},{"given":"Juan-Luis","family":"Gorricho","sequence":"additional","affiliation":[]},{"given":"Niels","family":"Bouten","sequence":"additional","affiliation":[]},{"given":"Filip","family":"De Turck","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Davy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2159308"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(86)90048-1"},{"key":"ref12","author":"michiels","year":"2007","journal-title":"Theoretical Aspects of Local Search (Monographs in Theoretical Computer Science An EATCS Series)"},{"key":"ref13","article-title":"Self-managed resources in network virtualisation environments","author":"mijumbi","year":"2014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.170"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/32.48943"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/71.372795"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/71.80146"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02836-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2013.827806"},{"key":"ref4","article-title":"Service Function Chaining (SFC) Use Cases. Internet-Draft draft-liu-sfc-use-cases-05","author":"liu","year":"2014","journal-title":"Active Internet-Draft IETF Secretariat Tech Rep"},{"key":"ref3","article-title":"Problem Statement of Network Functions Virtualization Model. Internet-Draft, draft-xjz-nfv-model-problem-statement-00","author":"xu","year":"2013","journal-title":"IETF Secretariat Tech Rep"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014205"},{"key":"ref5","article-title":"Service Function Chaining: Framework and Architecture. Internet - Draft draft-boucadairsfc-framework-02","author":"boucadair","year":"2014","journal-title":"Active Internet-Draft IETF Secretariat Tech Rep"},{"key":"ref8","first-page":"177","article-title":"On tackling virtual data center embedding problem","author":"rabbani","year":"2013","journal-title":"IFIP\/IEEE International Symposium on Integrated Network Management (1M 2013)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-6089-0"},{"key":"ref2","article-title":"Network Functions Virtualisation: An Introduction, Benefits, Enablers, Challenges and Call for Action. Introductory white paper","author":"guerzoni","year":"2012","journal-title":"SDN and OpenFlow World Congress"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.013013.00155"},{"key":"ref1","article-title":"Network Functions Virtualization - Everything Old Is New Again. Techinical White Paper","author":"yue","year":"2014","journal-title":"Tech Rep"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1109\/ICAL.2008.4636161","article-title":"On-line job shop scheduling with transfer time in supply chain","author":"chang","year":"2008","journal-title":"Automation and Logistics 2008 ICAL 2008 IEEE International Conference on"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6786610"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838412"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2014.6882687"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014204"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2014.6968961"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SaCoNeT.2014.6867768"}],"event":{"name":"2015 IEEE Conference on Network Softwarization (NetSoft)","location":"London, United Kingdom","start":{"date-parts":[[2015,4,13]]},"end":{"date-parts":[[2015,4,17]]}},"container-title":["Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7111753\/7116113\/07116120.pdf?arnumber=7116120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,12]],"date-time":"2022-05-12T05:24:53Z","timestamp":1652333093000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7116120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2015.7116120","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}