{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T05:57:04Z","timestamp":1778824624270,"version":"3.51.4"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/tr.2017.2712667","type":"journal-article","created":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T18:25:27Z","timestamp":1498847127000},"page":"26-40","source":"Crossref","is-referenced-by-count":32,"title":["Evaluating Reliability\/Survivability of Capacitated Wireless Networks"],"prefix":"10.1109","volume":"67","author":[{"given":"Ozgur","family":"Kabadurmus","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8808-0663","authenticated-orcid":false,"given":"Alice E.","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2003.08.007"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00110-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676966"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1980.1675654"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/26.35372"},{"key":"ref30","author":"harms","year":"1995","journal-title":"Network Reliability Experiments with a Symbolic Algebra Environment"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.07.015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/24.257817"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.12.010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IPDS.1995.395818"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2009.5355141"},{"key":"ref27","first-page":"602","article-title":"Wireless mesh network planning: A multi-objective optimization approach","author":"benyamina","year":"2009","journal-title":"Proc IEEE 5th Int Conf Broadband Commun Netw Syst"},{"key":"ref29","author":"grover","year":"2004","journal-title":"Mesh-Based Survivable Networks Options and Strategies for Optical MPLS SONET and ATM Networking"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.08.013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.08.006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.10.063"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2452580"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.05.031"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.044"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2016.06.010"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comgeo.2010.11.002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.01.004"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(98)00036-5"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/24.589921"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref54","author":"dr\u00e9o","year":"2006","journal-title":"Metaheuristics for hard optimization"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015059928466"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/07408179808966573"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2014.09.029"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2015.1022890"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.833315"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2440239"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2006.04.010"},{"key":"ref14","first-page":"9","article-title":"Resilience the challenge of the unstable","author":"hollnagel","year":"2006","journal-title":"Resilience Engineering Concepts and Precepts"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.03.013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/48\/48\/485101"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1142\/S0217984916500494"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/49\/19\/195101"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.060710.00062"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.11.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2521761"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.901049"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.02.020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.313398"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2004588"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1007\/s00224-009-9215-5","article-title":"Simple and improved parameterized algorithms for multiterminal cuts","volume":"46","author":"xiao","year":"2010","journal-title":"Theory Comput Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S0217979214501495"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2001.990778"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230120406"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2570552"},{"key":"ref47","first-page":"3201","article-title":"Split multipath routing with maximally disjoint paths in ad hoc networks","volume":"10","author":"lee","year":"2001","journal-title":"Proc IEEE Int Conf Commun"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.17.11.712"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2499962"},{"key":"ref44","first-page":"971","article-title":"An O( $kn^2$) algorithm for $k$ shortest simple paths in an undirected graph with nonnegative arc length","volume":"61","author":"katoh","year":"1978","journal-title":"Trans Inst Electron Commun Eng Jpn Sec E"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795290477"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8305671\/07964780.pdf?arnumber=7964780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:21:58Z","timestamp":1642004518000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7964780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":55,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2017.2712667","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3]]}}}