{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:02:55Z","timestamp":1762430575483},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/tr.2011.2170250","type":"journal-article","created":{"date-parts":[[2011,10,24]],"date-time":"2011-10-24T19:34:03Z","timestamp":1319484843000},"page":"845-851","source":"Crossref","is-referenced-by-count":18,"title":["Polynomial-Time Topological Reductions That Preserve the Diameter Constrained Reliability of a Communication Network"],"prefix":"10.1109","volume":"60","author":[{"given":"H\u00e9ctor","family":"Cancela","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"El Khadiri","sequence":"additional","affiliation":[]},{"given":"Louis A.","family":"Petingi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230150204"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/0201010"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5772\/6098"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230130107"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1986.4335431"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/24.87131"},{"key":"ref11","article-title":"Revisiting the TTL-based controlled flooding search: Optimality and randomization","author":"chang","year":"0","journal-title":"Proc 10th Annu Int Conf Mobile Comput Netw MobiCom"},{"key":"ref12","author":"coll","year":"2005","journal-title":"Evaluation and optimization of the Diameter Constrained Reliability"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2460"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"ref15","author":"el khadiri","year":"1992","journal-title":"Direct evaluation and by simulation of communication network reliability parameters Sequential and memory distributed parallel algorithms (in French)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-5726-x"},{"key":"ref17","author":"kirk","year":"2003","journal-title":"Gnutella Protocol Development Standard Message Architecture"},{"key":"ref18","author":"knuth","year":"1997","journal-title":"The art of computer programming"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2007.4419868"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.21236\/ADA116276","author":"satyanarayana","year":"1982","journal-title":"Polygon-to-chain reductions and network reliability"},{"key":"ref4","first-page":"76","article-title":"Source-terminal reliability maximization with path length constraints","author":"burgos","year":"2003","journal-title":"International Conference on Industrial Logistics (ICIL'03)"},{"key":"ref27","article-title":"Mapping the Gnutella network: Properties of large-scale peer-to-peer systems and implications for system design","volume":"6","author":"ripeanu","year":"2002","journal-title":"IEEE Internet Comput"},{"key":"ref3","article-title":"Availability aware IP-over-WDM networks under the overlay model","author":"beghelli","year":"2010","journal-title":"NOC\/OC&I 2010 15th European Conf on Networks and Optical Communications 5th Conf on Optical Cabling and Infrastructure"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2003.809653"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1137\/0214057"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/24.722281"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/S016117120430623X"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9780470745403.ch7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1986.4335422"},{"key":"ref9","author":"carlier","year":"1991","journal-title":"Defense Decision Making"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2008.2011854"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2009.5341008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.1958.6372698"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.07.029"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/24.3752"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1364\/OE.9.000400"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/24.9862"},{"key":"ref25","first-page":"117","article-title":"Reliability of networks with delay constraints","volume":"152","author":"petingi","year":"2001","journal-title":"Congressus Numerantium"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/24\/6087327\/06058637.pdf?arnumber=6058637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:47:24Z","timestamp":1633909644000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6058637\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":34,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2011.2170250","relation":{},"ISSN":["0018-9529"],"issn-type":[{"value":"0018-9529","type":"print"}],"subject":[],"published":{"date-parts":[[2011,12]]}}}