{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:49:56Z","timestamp":1730285396095,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/noms47738.2020.9110440","type":"proceedings-article","created":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T22:06:15Z","timestamp":1591653975000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Network Service Embedding with Multiple Resource Dimensions"],"prefix":"10.1109","author":[{"given":"Angelos","family":"Pentelas","sequence":"first","affiliation":[]},{"given":"George","family":"Papathanail","sequence":"additional","affiliation":[]},{"given":"Ioakeim","family":"Fotoglou","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Papadimitriou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242618"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2654681"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2016.7439948"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2019.8768602"},{"article-title":"Stratos: Virtual middleboxes as first-class entities","year":"2012","author":"gember","key":"ref13"},{"key":"ref14","article-title":"Challenges in resource allocation in network virtualization","volume":"18","author":"haider","year":"2009","journal-title":"Proceedings of 20th ITC Specialist Seminar"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.013013.00155"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2159308"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486022"},{"key":"ref18","article-title":"Heuristics for vector bin packing","author":"panigrahy","year":"2011","journal-title":"Research microsoft com"},{"article-title":"Approximation algorithms springer-verlag","year":"2001","author":"vazirani","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1867"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598420"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038924"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113226"},{"key":"ref29","first-page":"24","article-title":"Dominant resource fairness: Fair allocation of multiple resource types","volume":"11","author":"ghodsi","year":"2011","journal-title":"NSDI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113223"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2018.8697029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2017.7945385"},{"year":"0","key":"ref2","article-title":"OPNFV"},{"article-title":"Meson: Facilitating cross-slice communications for enhanced service delivery at the edge","year":"2019","author":"katsaros","key":"ref9"},{"year":"0","key":"ref1","article-title":"ETSI Network Function Virtualization"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-008-0449-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09873-9_26"},{"key":"ref21","first-page":"1","article-title":"Validating heuristics for virtual machines consolidation","author":"lee","year":"2011","journal-title":"Microsoft Research MSR-TR-2011-9"},{"year":"2019","key":"ref24","article-title":"Gurobi optimizer reference manual"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.283"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685437"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2874257"}],"event":{"name":"NOMS 2020-2020 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2020,4,20]]},"location":"Budapest, Hungary","end":{"date-parts":[[2020,4,24]]}},"container-title":["NOMS 2020 - 2020 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9107308\/9110252\/09110440.pdf?arnumber=9110440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:52Z","timestamp":1656453412000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9110440\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/noms47738.2020.9110440","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}