{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:50:04Z","timestamp":1761648604576,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/wcsp.2018.8555889","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T00:04:40Z","timestamp":1544659480000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A Method of Network Slicing Mapping Supporting Random Route Mutation"],"prefix":"10.1109","author":[{"given":"Hang","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Hongbo","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"You","sequence":"additional","affiliation":[]},{"given":"Keyun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7527328"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2360191"},{"key":"ref10","article-title":"A new improvement for a K shortest paths algorithm","volume":"21","author":"queir","year":"2001","journal-title":"APDIO - Associa&#x00E7;&#x00E3;o Portuguesa de Investiga&#x00E7;&#x00E3;o Operacional"},{"key":"ref6","first-page":"127","article-title":"Secure and Reliable Multi-Path Routing Protocol for Multi-Hop Wireless Networks","volume":"36","author":"salwa","year":"2017","journal-title":"Adhoc & Sensor Wireless Networks"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883785"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1996.493353"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1000"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TMC.2010.36","article-title":"Secure data collection in wireless sensor networks using randomized dispersive routes","volume":"9","author":"shu","year":"2010","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.013013.00155"},{"key":"ref9","first-page":"13","article-title":"SDN-based ECMP algorithm for data center networks","author":"zhang","year":"2015","journal-title":"Computing Communications and IT Applications Conference"},{"journal-title":"NGMN Alliance 5G White Paper","year":"2015","key":"ref1"}],"event":{"name":"2018 10th International Conference on Wireless Communications and Signal Processing (WCSP)","start":{"date-parts":[[2018,10,18]]},"location":"Hangzhou, China","end":{"date-parts":[[2018,10,20]]}},"container-title":["2018 10th International Conference on Wireless Communications and Signal Processing (WCSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8520598\/8555523\/08555889.pdf?arnumber=8555889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T23:44:42Z","timestamp":1636587882000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8555889\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/wcsp.2018.8555889","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}