{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:46:46Z","timestamp":1730285206662,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/netsoft.2018.8460097","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T21:43:41Z","timestamp":1536875021000},"page":"114-122","source":"Crossref","is-referenced-by-count":11,"title":["Virtual Function Placement and Traffic Steering over 5G Multi-Technology Networks"],"prefix":"10.1109","author":[{"given":"Nabeel","family":"Akhtar","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Matta","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Raza","sequence":"additional","affiliation":[]},{"given":"Leonardo","family":"Goratti","sequence":"additional","affiliation":[]},{"given":"Torsten","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Flavio","family":"Esposito","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Specifying and placing chains of virtual network functions","author":"mehraghdam","year":"2014","journal-title":"IEEE Cloudnet"},{"key":"ref11","first-page":"13","article-title":"Making middleboxes someone else's problem: network processing as a cloud service","author":"sherry","year":"2012","journal-title":"SIGCOMM'12"},{"key":"ref12","article-title":"FlowTags: Enforcing Network-wide Policies in the Presence of Dynamic Middlebox Actions","author":"fayazbakhsh","year":"2013","journal-title":"Proc ACM SIGCOMM HotSDN"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/2534169.2486022","article-title":"SIMPLE-fying Middlebox Policy Enforcement Using SDN","author":"qazi","year":"2013","journal-title":"ACM SIGCOMM"},{"key":"ref14","article-title":"StEERING: A software-defined networking for inline service chaining","author":"zhang","year":"2013","journal-title":"IEEE ICNP"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45471-3_35"},{"key":"ref16","article-title":"Virtual network functions placement and routing optimization","author":"addis","year":"2015","journal-title":"IEEE Cloudnet"},{"journal-title":"Theory of Linear and Integer Programming","year":"1986","author":"schrijver","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/231863"},{"key":"ref19","article-title":"Brite: An approach to universal topology generation","author":"medina","year":"2001","journal-title":"MASCOTS '01"},{"journal-title":"Minimum Requirements Related to Technical Performance for IMT-2020 Radio Interface(s)","year":"2017","key":"ref4"},{"key":"ref3","article-title":"Mobile edge computing: A key technology towards 5G","volume":"11","author":"hu","year":"2015","journal-title":"ETSI W Paper"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0942-z"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.118"},{"key":"ref8","first-page":"177","article-title":"On tackling virtual data center embedding problem","author":"rabbani","year":"0","journal-title":"IFIP\/IEEE im 2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.013013.00155"},{"journal-title":"Augmented and Virtual Reality The First Wave of 5G Killer Apps","year":"2017","key":"ref2"},{"journal-title":"Enabling mobile augmented and virtual reality with 5G networks","year":"2017","key":"ref1"},{"key":"ref9","article-title":"Dynamic Service Function Chaining in SDN-enabled networks with middleboxes","author":"guo","year":"2016","journal-title":"IEEE ICNP"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/49.12889"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2008.927604"},{"key":"ref21","article-title":"28 GHz propagation measurements for outdoor cellular communications using steerable beam antennas in New York city","author":"azar","year":"2013","journal-title":"IEEE ICC"},{"key":"ref24","article-title":"Tractable model for rate in self-backhauled millimeter wave cellular networks","volume":"33","author":"singh","year":"2015","journal-title":"IEEE JSAC"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2299397"}],"event":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","start":{"date-parts":[[2018,6,25]]},"location":"Montreal, QC","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8429968\/8458492\/08460097.pdf?arnumber=8460097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:33:24Z","timestamp":1643189604000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8460097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2018.8460097","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}