{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:27:19Z","timestamp":1774538839660,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB2904204"],"award-info":[{"award-number":["2023YFB2904204"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132022"],"award-info":[{"award-number":["62132022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CAE Advisory Project","award":["2023-ZCQ-12"],"award-info":[{"award-number":["2023-ZCQ-12"]}]},{"name":"Young Elite Scientist Sponsorship Program by CAST and China-CIC","award":["YESS20200287"],"award-info":[{"award-number":["YESS20200287"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/tccn.2024.3362469","type":"journal-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T18:46:23Z","timestamp":1707158783000},"page":"1481-1495","source":"Crossref","is-referenced-by-count":21,"title":["Deterministic Cognition: Cross-Domain Flow Scheduling for Time-Sensitive Networks"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6687-2691","authenticated-orcid":false,"given":"Guoyu","family":"Peng","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8313-7933","authenticated-orcid":false,"given":"Zongquan","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3545-1122","authenticated-orcid":false,"given":"Tao","family":"Huang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Chaowei","family":"Yuan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980916"},{"key":"ref2","volume-title":"Requirements for scaling deterministic networks","author":"Liu","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2869350"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2016.7553415"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2016.7553415"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8655"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.10.016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155434"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3198171"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3216958"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9839201"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking52078.2021.9472798"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2101073"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2100865"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1364\/ACPC.2021.T4A.137"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/OFC49934.2023.10116344"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/info14020109"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869280"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074802"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651955"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9697-9_45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2997465.2997470"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3206815"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3264583"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HotICN53262.2021.9680843"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484627"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2953793"},{"key":"ref28","article-title":"TSN algorithms for large scale networks: A survey and conceptual comparison","author":"Nasrallah","year":"2019","journal-title":"arXiv:1905.08478"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8578"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BF00365407"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.25080\/TCWV9851","article-title":"Exploring network structure, dynamics, and function using NetworkX","author":"Hagberg","year":"2008"},{"key":"ref32","volume-title":"IIC results white paper: Time sensitive networks for flexible manufacturing Testbed-description of converged traffic types","author":"Ademaj","year":"2018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.29007\/w71t"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2010.2091622"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687307\/10629642\/10422798.pdf?arnumber=10422798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T13:40:57Z","timestamp":1731246057000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10422798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":34,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tccn.2024.3362469","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}