{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:39Z","timestamp":1750308099925,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,25]],"date-time":"2005-06-25T00:00:00Z","timestamp":1119657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6,25]]},"DOI":"10.1145\/1068009.1068217","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"1279-1285","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Designing resilient networks using a hybrid genetic algorithm approach"],"prefix":"10.1145","author":[{"given":"Abdullah","family":"Konak","sequence":"first","affiliation":[{"name":"Penn State Berks, Reading, PA"}]},{"given":"Alice E.","family":"Smith","sequence":"additional","affiliation":[{"name":"Auburn University, AL"}]}],"member":"320","published-online":{"date-parts":[[2005,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:HEUR.0000012447.32370.fd"},{"issue":"6","key":"e_1_3_2_1_2_1","first-page":"869","article-title":"Resilience in a multi-layer network","volume":"26","author":"Autenrieth A.","year":"1998","unstructured":"Autenrieth , A. , Brianza , C. , Clemente , R. , Demeester , P. , Gryseels , M. , Harada , Y. , Jajszczyk , A. , Janukowicz , D. , Kalbe , G. , Ohta , S. , Ravera , M. , Rhissa , A.G. , Signorelli , G. , and Van Doorselaere , K . Resilience in a multi-layer network . CSELT Technical Reports , 26 ( 6 ) ( 1998 ), 869 -- 882 . Autenrieth, A., Brianza, C., Clemente, R., Demeester, P., Gryseels, M., Harada, Y., Jajszczyk, A., Janukowicz, D., Kalbe, G., Ohta, S., Ravera, M., Rhissa, A.G., Signorelli, G., and Van Doorselaere, K. Resilience in a multi-layer network. CSELT Technical Reports, 26(6) (1998), 869--882.","journal-title":"CSELT Technical Reports"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.46.1.116"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230100206"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/07408179808966573"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.589921"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.661548"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(02)00058-8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1046992"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.338109"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(93)90093-X"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.210272"},{"key":"e_1_3_2_1_13_1","volume-title":"The 10th International Conference on Telecommunication Systems. (October","author":"Konak A.","year":"2002","unstructured":"Konak , A. and Smith , A.E . Multiobjective optimization of survivable networks considering reliability . In The 10th International Conference on Telecommunication Systems. (October , 2002 ). Naval Postgraduate School, Monterey, CA. Konak, A. and Smith, A.E. Multiobjective optimization of survivable networks considering reliability. In The 10th International Conference on Telecommunication Systems. (October, 2002). Naval Postgraduate School, Monterey, CA."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.37.4.531"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.45203"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.837522"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.620519"}],"event":{"name":"GECCO05: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"GECCO05"},"container-title":["Proceedings of the 7th annual conference on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068217","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1068009.1068217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:01Z","timestamp":1750262881000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068217"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6,25]]},"references-count":17,"alternative-id":["10.1145\/1068009.1068217","10.1145\/1068009"],"URL":"https:\/\/doi.org\/10.1145\/1068009.1068217","relation":{},"subject":[],"published":{"date-parts":[[2005,6,25]]},"assertion":[{"value":"2005-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}