{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:46:03Z","timestamp":1730285163273,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/netsoft.2015.7116122","type":"proceedings-article","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T15:33:14Z","timestamp":1433950394000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["LawNFO: A decision framework for optimal location-aware network function outsourcing"],"prefix":"10.1109","author":[{"given":"Kalika","family":"Suksomboon","sequence":"first","affiliation":[]},{"given":"Masaki","family":"Fukushima","sequence":"additional","affiliation":[]},{"given":"Michiaki","family":"Hayashi","sequence":"additional","affiliation":[]},{"given":"Rathachai","family":"Chawuthai","sequence":"additional","affiliation":[]},{"given":"Hideaki","family":"Takeda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/234533.234534"},{"key":"ref11","article-title":"Enterprise data topology","volume":"2","year":"0","journal-title":"Server farm security in the business ready data center architecture"},{"journal-title":"Amazon EC 2","year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"journal-title":"Ethernet Private Line Access (EPL Access) (formerly Ethernet Private Line U S Access)","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592575"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096551"},{"key":"ref18","article-title":"Stratos: a network-aware orchestration layer for virtual middleboxes in clouds","author":"gember","year":"2013","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038924"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2627585.2627592"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2013.47"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342457"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655111"},{"article-title":"Computers and intractability: a guide to the theory of NP-completeness","year":"1979","author":"garey","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2014.69"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2535828.2535831"},{"journal-title":"ETSI","article-title":"NFV Whitepaper","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626313"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390233"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702557"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461196"},{"year":"0","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879143"}],"event":{"name":"2015 IEEE Conference on Network Softwarization (NetSoft)","start":{"date-parts":[[2015,4,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,4,17]]}},"container-title":["Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7111753\/7116113\/07116122.pdf?arnumber=7116122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T15:45:53Z","timestamp":1490370353000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7116122\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2015.7116122","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}