{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:32:27Z","timestamp":1767677547018,"version":"3.48.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"2023 Industrial Internet Innovation and Development Project - \u201c5G+ Industrial Internet\u201d","award":["A14B06C02-202401D1"],"award-info":[{"award-number":["A14B06C02-202401D1"]}]},{"name":"National Key Research and Development Project","award":["2022YFB2901604"],"award-info":[{"award-number":["2022YFB2901604"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnsm.2025.3608200","type":"journal-article","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T17:46:34Z","timestamp":1757526394000},"page":"166-182","source":"Crossref","is-referenced-by-count":1,"title":["Efficient SRv6-Based Multi-Path Transmission Strategy for Resilient Communication in Deterministic Computing Power Network"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0274-0970","authenticated-orcid":false,"given":"Meihui","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6661-5329","authenticated-orcid":false,"given":"Fangmin","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2431-009X","authenticated-orcid":false,"given":"Shihui","family":"Duan","sequence":"additional","affiliation":[{"name":"Institute of Technology and Standards Research, China Academy of Information and Communications Technology, Beijing, China"}]},{"given":"Jinyu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Institute of Technology and Standards Research, China Academy of Information and Communications Technology, Beijing, China"}]},{"given":"Wenlong","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3209-5334","authenticated-orcid":false,"given":"Ruoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4270-5717","authenticated-orcid":false,"given":"Chenglin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"volume-title":"Computing 2030","year":"2023","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.17487\/rfc8578"},{"issue":"7","key":"ref3","first-page":"55","article-title":"Convergence of telco cloud and bearer network based computing power network orchestration","volume":"36","author":"Cao","year":"2020","journal-title":"Telecommun. Sci."},{"issue":"4","key":"ref4","first-page":"55","article-title":"CPN: A joint optimization solution of computing\/network resources","volume":"2","author":"Lei","year":"2020","journal-title":"Front. Data Comput."},{"issue":"4","key":"ref5","first-page":"16","article-title":"Analysis of computation network architecture and according scenarios","volume":"14","author":"Huang","year":"2020","journal-title":"Inf. Commun. Technol."},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1080\/05695557508975429"},{"issue":"10","key":"ref7","first-page":"55","article-title":"Research on deterministic computing power network","volume":"43","author":"Jia","year":"2022","journal-title":"J. Commun."},{"issue":"4","key":"ref8","first-page":"47","article-title":"Research on the application of ultra-high deterministic networks in CPN","volume":"31","author":"Li","year":"2024","journal-title":"Radio Telev. Netw."},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.23919\/JCC.ja.2021-0776"},{"volume-title":"Compute first networking (CFN) scenarios and requirements","year":"2019","author":"Geng","key":"ref10"},{"volume-title":"Framework of compute first networking (CFN)","year":"2019","author":"Li","key":"ref11"},{"volume-title":"Computing Power Network\u2014Framework and Architecture-for Consent","year":"2021","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.23919\/JCC.2021.02.011"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/WCNCW49093.2021.9420028"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/CEI60616.2023.10528046"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.3390\/s24041086"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TNSE.2022.3225292"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/MNET.2023.3326239"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICCC56324.2022.10065638"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/JLT.2022.3232840"},{"key":"ref21","article-title":"Deterministic computing power networking: Architecture, technologies and prospects","author":"Jia","year":"2024","journal-title":"arXiv:2401.17812"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3603165.3607396"},{"issue":"2","key":"ref23","first-page":"9","article-title":"Deterministic scheduling and routing joint intelligent optimization scheme in computing first network","volume":"46","author":"Sun","year":"2023","journal-title":"J. Beijing Univ. Posts Telecommun."},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/INFOTEH48170.2020.9066291"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/UKRCON.2019.8879965"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TNSM.2018.2876251"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TNSM.2023.3300151"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TNET.2020.2987866"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TNET.2021.3105959"},{"issue":"10","key":"ref30","first-page":"49","article-title":"Research on data center network load balancing based on SRv6","volume":"24","author":"Luo","year":"2024","journal-title":"Netw. Secur. Technol. Appl."},{"year":"2022","author":"Zhuo","article-title":"Research on deterministic delay control method based on SRv6 technology","key":"ref31"},{"issue":"3","key":"ref32","first-page":"23","article-title":"Computing power network resources based on SRv6 and its service arrangement and scheduling","volume":"27","author":"Huang","year":"2021","journal-title":"ZTE Technol. J."},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.23919\/ITUK56368.2022.10003051"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1155\/2012\/743728"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TNSM.2023.3273396"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.3390\/app12020544"},{"issue":"1","key":"ref37","article-title":"Energy-aware multipath routing scheme based on particle swarm optimization (EMPSO)","volume":"5","author":"Khan","year":"2018","journal-title":"Int. Res. J. Eng. Technol."},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/JSEN.2017.2739188"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/ACCESS.2019.2932422"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/NoF50125.2020.9249170"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/ieeestd.2017.8091139"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/ICTON62926.2024.10647863"},{"volume-title":"Fault-Tolerant Systems","year":"2020","author":"Koren","key":"ref43"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/JIOT.2023.3337941"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.22266\/ijies2017.0630.18"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.3390\/electronics13050933"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/ICCC62479.2024.10681965"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1155\/2021\/3418483"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11319294\/11157751.pdf?arnumber=11157751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:28:28Z","timestamp":1767677308000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11157751\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3608200","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2026]]}}}