{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:46:58Z","timestamp":1764305218537},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/tnet.2010.2091426","type":"journal-article","created":{"date-parts":[[2010,12,9]],"date-time":"2010-12-09T14:54:01Z","timestamp":1291906441000},"page":"1000-1013","source":"Crossref","is-referenced-by-count":50,"title":["Cross-Layer Survivability in WDM-Based Networks"],"prefix":"10.1109","volume":"19","author":[{"given":"Kayi","family":"Lee","sequence":"first","affiliation":[]},{"given":"Eytan","family":"Modiano","sequence":"additional","affiliation":[]},{"given":"Hyang-Won","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.810321"},{"key":"ref10","article-title":"Survivable IP over WDM: A mathematical programming problem formulation","author":"deng","year":"2002","journal-title":"Proc 40th Allerton Conf Commun Control Comput"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070606"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(02)00252-9"},{"key":"ref13","first-page":"726","article-title":"Survivable routing in WDM networks","author":"sen","year":"2002","journal-title":"Proc 7th IEEE ISCC"},{"key":"ref14","first-page":"183","article-title":"Minimum cost ring survivability in WDM networks","author":"sen","year":"2003","journal-title":"Proc IEEE Workshop High Performance Switching and Routing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2004.81"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.810313"},{"key":"ref17","article-title":"Survivable routing in IP-over-WDM networks in the presence of multiple failures","author":"kurant","year":"2006","journal-title":"Proc 2nd EuroNGI Workshop on Traffic Engineering Protection and Restoration for NGI"},{"key":"ref18","author":"ahuja","year":"1993","journal-title":"Network Flows Theory Algorithms and Applications"},{"key":"ref19","author":"bertsimas","year":"1997","journal-title":"Introduction to Linear Optimization"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579324"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.10.013"},{"key":"ref27","author":"lee","year":"2010","journal-title":"Cross-layer survivability in WDM-based networks"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TCOMM.2003.809779","article-title":"Diverse routing in optical mesh networks","volume":"51","author":"hu","year":"2003","journal-title":"IEEE Trans Commun"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354524"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/49.510913"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1109\/TNET.2005.863451","article-title":"On the complexity of and algorithms for finding the shortest path with a disjoint counterpart","volume":"14","author":"xu","year":"2006","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1997.635136"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.1003045"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/26.153361"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/49.725186"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/90.532864"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(75)90058-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/185675.306789"},{"key":"ref21","author":"garey","year":"1979","journal-title":"Computers and Intractibility A Guide to the Theory of NP-Completeness"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF02392825"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(80)90046-X"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007355"},{"key":"ref25","author":"kan","year":"2003","journal-title":"Design of survivable ip-over-wdm networks Providing protection and restoration at the electronic layer"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/90\/5985586\/05643973.pdf?arnumber=5643973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:47:54Z","timestamp":1633909674000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5643973\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2010.2091426","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8]]}}}