{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:50:55Z","timestamp":1776441055199,"version":"3.51.2"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003816","name":"Huawei Technologies","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003816","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/tcomm.2019.2954410","type":"journal-article","created":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T20:48:57Z","timestamp":1574196537000},"page":"1025-1043","source":"Crossref","is-referenced-by-count":26,"title":["Virtual Network Embedding With Guaranteed Connectivity Under Multiple Substrate Link Failures"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1101-6716","authenticated-orcid":false,"given":"Nashid","family":"Shahriar","sequence":"first","affiliation":[]},{"given":"Reaz","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6232-2027","authenticated-orcid":false,"given":"Shihabur Rahman","family":"Chowdhury","sequence":"additional","affiliation":[]},{"given":"Md Mashrur Alam","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7936-6862","authenticated-orcid":false,"given":"Raouf","family":"Boutaba","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4568-2589","authenticated-orcid":false,"given":"Jeebak","family":"Mitra","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2016.7470851"},{"key":"ref38","article-title":"A hybrid reliable heuristic mapping method based on survivable virtual networks for network virtualization","volume":"2015","author":"zhu","year":"2014","journal-title":"Discrete Dyn Nature Soc"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6212047"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2574239"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140313"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962604"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1851399.1851407"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2693404"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440669"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838253"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.013013.00155"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.5120\/9391-3813"},{"key":"ref63","first-page":"276","article-title":"SNDlib 1.0&#x2014;Survivable network design library","volume":"55","author":"orlowski","year":"2010","journal-title":"Netw -Netw Optim"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815430"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2558598"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683951"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600951"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600940"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.1003045"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC-OCN.2007.020605"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497249"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.100"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963301"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1137\/120868360"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2018.8696604"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/49.265708"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"ref57","year":"2018","journal-title":"Menger's theorem"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/14.1.38"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30422-4_14"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070610"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842220"},{"key":"ref52","first-page":"37","article-title":"Lightpath routing and capacity assignment for survivable IP-over-WDM networks","author":"kan","year":"2009","journal-title":"Proc IEEE DRC"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2098418"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317617"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2091426"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.6.000190"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498338"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.osn.2010.05.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2639362"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2016.2637352"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2004.79"},{"key":"ref18","article-title":"Approximation algorithms for disjoint paths problems","author":"kleinberg","year":"1996"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(93)90050-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.322"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2013.013013.110202"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.5.000023"},{"key":"ref8","first-page":"99","article-title":"Survey on survivable virtual network embedding problem and solutions","author":"herker","year":"2013","journal-title":"Proc ICNS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354653"},{"key":"ref49","first-page":"265","article-title":"On linear programming relaxations for unsplittable flow in trees","volume":"40","author":"friggstad","year":"2015","journal-title":"Leibniz International Proceedings in Informatics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/49.887914"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070606"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.023805"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973402.3"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1975.21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2010.5432016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.7.000540"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579324"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2007.6182874"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/8999755\/08906179.pdf?arnumber=8906179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T13:47:24Z","timestamp":1651067244000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8906179\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":64,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2019.2954410","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"value":"0090-6778","type":"print"},{"value":"1558-0857","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2]]}}}