{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:02:14Z","timestamp":1729674134614,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/depcos-relcomex.2006.52","type":"proceedings-article","created":{"date-parts":[[2006,12,18]],"date-time":"2006-12-18T15:07:04Z","timestamp":1166454424000},"page":"110-118","source":"Crossref","is-referenced-by-count":6,"title":["Survey of Recovery Schemes in MPLS Networks"],"prefix":"10.1109","author":[{"given":"Luisa","family":"Jorge","sequence":"first","affiliation":[]},{"given":"Teresa","family":"Gomes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3469"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2002.1021784"},{"year":"0","key":"17"},{"key":"23","first-page":"75","article-title":"An efficient recovery mechanism for MPLS-based protection LSP","author":"yoon","year":"2001","journal-title":"Joint 4th IEEE International Conference on ATM (ICATM 2001)"},{"key":"18","first-page":"302","article-title":"Distributed partial information management (DPIM) schemes for survivable networks - part I","author":"qiao","year":"2002","journal-title":"Proceedings of IEEE INFOCOM 2002"},{"article-title":"End-to-end protection switching mechanisms for MPLS networks","year":"2004","author":"menth","key":"15"},{"journal-title":"Fast Reroute Extensions to RSVP-TE for LSP Tunnels","year":"2005","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1007411"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2003.1274432"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/dac.590"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916720"},{"key":"21","doi-asserted-by":"crossref","first-page":"1320","DOI":"10.1109\/JSAC.2003.816624","article-title":"Novel algorithms for shared segment protection","volume":"21","author":"xu","year":"2003","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3209"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/49.887914"},{"year":"0","key":"2"},{"journal-title":"IETF Draft","article-title":"Extensions to RSVP-TE for point to multipoint TE LSPs","year":"2005","key":"1"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1998.682929"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2003.1209120"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2205"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.936285"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/35.989769"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2004.1317656"}],"event":{"name":"2006 International Conference on Dependability of Computer Systems","start":{"date-parts":[[2006,5,25]]},"location":"Szklarska Poreba","end":{"date-parts":[[2006,5,27]]}},"container-title":["2006 International Conference on Dependability of Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4024017\/4024018\/04024039.pdf?arnumber=4024039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T08:21:53Z","timestamp":1497687713000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4024039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/depcos-relcomex.2006.52","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}