{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:03Z","timestamp":1750307463914,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,12,16]],"date-time":"2009-12-16T00:00:00Z","timestamp":1260921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,12,16]]},"DOI":"10.1145\/1838002.1838013","type":"proceedings-article","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:15:36Z","timestamp":1280754936000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["QoS-based MPLS multicast tree selection algorithms"],"prefix":"10.1145","author":[{"given":"Farrah","family":"Farooq","sequence":"first","affiliation":[{"name":"Punjab University College of Information Technology (PUCIT), University of the Punjab, Anarkali, Lahore, Pakistan"}]},{"given":"Sidra","family":"Aslam","sequence":"additional","affiliation":[{"name":"Punjab University College of Information Technology (PUCIT), University of the Punjab, Anarkali, Lahore, Pakistan"}]},{"given":"Shahzad","family":"Sarwar","sequence":"additional","affiliation":[{"name":"Punjab University College of Information Technology (PUCIT), University of the Punjab, Anarkali, Lahore, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2009,12,16]]},"reference":[{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1584"},{"key":"e_1_3_2_1_5_1","volume-title":"RFC-2189 Core Based Trees (CBT version 2) Multicast Routing. IETF","author":"Ballardie A.","year":"1997","unstructured":"A. Ballardie . RFC-2189 Core Based Trees (CBT version 2) Multicast Routing. IETF , 1997 . A. Ballardie. RFC-2189 Core Based Trees (CBT version 2) Multicast Routing. IETF, 1997."},{"key":"e_1_3_2_1_6_1","volume-title":"IETF","author":"Bates T.","year":"1998","unstructured":"T. Bates , and R. Chandra . RFC-2283 Multi-protocol Extensions for BGP-4 . IETF , 1998 . T. Bates, and R. Chandra. RFC-2283 Multi-protocol Extensions for BGP-4. IETF, 1998."},{"key":"e_1_3_2_1_7_1","volume-title":"RFC-3913 Border Gateway Multicast Protocol (BGMP). IETF","author":"Thaler D.","year":"2004","unstructured":"D. Thaler . RFC-3913 Border Gateway Multicast Protocol (BGMP). IETF , 2004 . D. Thaler. RFC-3913 Border Gateway Multicast Protocol (BGMP). IETF, 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-2001-2_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.819168"},{"key":"e_1_3_2_1_10_1","volume-title":"et al. Genetic Algorithms and its Application. People's Soft and Telecomm","author":"Guoliang C.","year":"1996","unstructured":"C. Guoliang , W. Xufa , and Z. Zhanquan , et al. Genetic Algorithms and its Application. People's Soft and Telecomm . Press , 1996 . C. Guoliang, W. Xufa, and Z. Zhanquan, et al. Genetic Algorithms and its Application. People's Soft and Telecomm. Press, 1996."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.662766"},{"key":"e_1_3_2_1_12_1","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"1997","unstructured":"T. H. Cormen , C. E. Leirson , and R. L. Rivest . Introduction to Algorithms . MIT Press , 1997 . T. H. Cormen, C. E. Leirson, and R. L. Rivest. Introduction to Algorithms. MIT Press, 1997."},{"key":"e_1_3_2_1_13_1","author":"Kou L.","year":"1981","unstructured":"L. Kou , G. Markowsky , and L. Berman . A Fast Algorithm for Steiner Trees. Acta Informatica, 141--45 , 1981 . L. Kou, G. Markowsky, and L. Berman. A Fast Algorithm for Steiner Trees. Acta Informatica, 141--45, 1981.","journal-title":"A Fast Algorithm for Steiner Trees. Acta Informatica, 141--45"},{"key":"e_1_3_2_1_14_1","volume-title":"Steiner Tree Problems. Networks, 55--89","author":"Hwang F. K.","year":"1992","unstructured":"F. K. Hwang . Steiner Tree Problems. Networks, 55--89 , 1992 . F. K. Hwang. Steiner Tree Problems. Networks, 55--89, 1992."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.819168"},{"key":"e_1_3_2_1_16_1","first-page":"573","volume":"24","author":"Takahashi H.","year":"1980","unstructured":"H. Takahashi and A. Matsuyama . An Approximate Algorithm for Steiner Tree Problem in Graphs. Math. Japanica , 24 : 573 -- 577 , 1980 . H. Takahashi and A. Matsuyama. An Approximate Algorithm for Steiner Tree Problem in Graphs. Math. Japanica, 24: 573--77, 1980.","journal-title":"Math. Japanica"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.564134"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of Int. Conf. on Genetic Algorithms, 231--236","author":"Hesser J.","year":"1989","unstructured":"J. Hesser , R. Manner , and O. Stucky . Optimization of Steiner trees Using Genetic Algorithms . In Proc. of Int. Conf. on Genetic Algorithms, 231--236 , 1989 . J. Hesser, R. Manner, and O. Stucky. Optimization of Steiner trees Using Genetic Algorithms. In Proc. of Int. Conf. on Genetic Algorithms, 231--236, 1989."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/645513.657584"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.738982"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00113-9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00273-5"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30189-9_12"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.234851"},{"key":"e_1_3_2_1_25_1","first-page":"377","volume":"1","author":"Zhu Q.","year":"1995","unstructured":"Q. Zhu , M. Parsa , and J. Garcia . A Source-Based Algorithm for Delay-Constrained Minimum-Cost Multicasting. IEEE INFOCOM , 1 : 377 -- 384 , 1995 . Q. Zhu, M. Parsa, and J. Garcia. A Source-Based Algorithm for Delay-Constrained Minimum-Cost Multicasting. IEEE INFOCOM, 1: 377--84, 1995.","journal-title":"A Source-Based Algorithm for Delay-Constrained Minimum-Cost Multicasting. IEEE INFOCOM"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585892"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/788015.788558"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11802372_36"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(01)00402-9"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.05.044"},{"key":"e_1_3_2_1_32_1","volume-title":"INRIA Research Report","author":"Ben Ali N.","year":"2008","unstructured":"N. Ben Ali , M. Molnar , and A. Belghith . Multi-Constrained QoS Multicast Routing Optimization . INRIA Research Report , 2008 . N. Ben Ali, M. Molnar, and A. Belghith. Multi-Constrained QoS Multicast Routing Optimization. INRIA Research Report, 2008."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2000.856676"},{"key":"e_1_3_2_1_34_1","volume-title":"IETF","author":"Awduche O.","year":"2001","unstructured":"O. Awduche , L. Berger , D. Gan , T. Li , V. Srinivasan , and G. Swallow . RFC-3209 Extensions to RSVP for LSP Tunnels . IETF , 2001 . O. Awduche, L. Berger, D. Gan, T. Li, V. Srinivasan, and G. Swallow. RFC-3209 Extensions to RSVP for LSP Tunnels. IETF, 2001."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1345530.1345540"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(03)00212-3"},{"key":"e_1_3_2_1_37_1","volume-title":"IETF","author":"Ooms D.","year":"2002","unstructured":"D. Ooms , B. Sales , W. Livens , A. Acharya , F. Griffoul , and F. Ansari . RFC-3353 Overview of IP Multicast in MPLS Environment . IETF , 2002 . D. Ooms, B. Sales, W. Livens, A. Acharya, F. Griffoul, and F. Ansari. RFC-3353 Overview of IP Multicast in MPLS Environment. IETF, 2002."},{"key":"e_1_3_2_1_38_1","volume-title":"IETF","author":"Aggarwal R.","year":"2007","unstructured":"R. Aggarwal , D. Papadimitriou , and S. Yasukawa . RFC-4875 Extensions to Resource Reservation Protocol-Traffic Engineering (RSVP-TE) for Point-to-Multipoint TE Label Switched Paths (LSPs) . IETF , 2007 . R. Aggarwal, D. Papadimitriou, and S. Yasukawa. RFC-4875 Extensions to Resource Reservation Protocol-Traffic Engineering (RSVP-TE) for Point-to-Multipoint TE Label Switched Paths (LSPs). IETF, 2007."},{"key":"e_1_3_2_1_39_1","volume-title":"IETF","author":"Eckert T.","year":"2008","unstructured":"T. Eckert , E. Rosen , R. Aggarwal and Y. Rekhter . RFC 5332 - MPLS Multicast Encapsulations . IETF , 2008 . T. Eckert, E. Rosen, R. Aggarwal and Y. Rekhter. RFC 5332 - MPLS Multicast Encapsulations. IETF, 2008."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832263"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.1997.644603"},{"key":"e_1_3_2_1_42_1","volume-title":"IEEE ISCC","author":"Seok Y.","year":"2002","unstructured":"Y. Seok , Y. Lee , Y. Choi , and C. Kim . Explicit Multicast Routing Algorithm for Constrained Traffic Engineering . IEEE ISCC , 2002 . Y. Seok, Y. Lee, Y. Choi, and C. Kim. Explicit Multicast Routing Algorithm for Constrained Traffic Engineering. IEEE ISCC, 2002."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.815302"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. of ACM\/SIAM Symp., Discrete Algorithms, 192--200","author":"Charikar M.","year":"1998","unstructured":"M. Charikar , C. Chekuri , T. Cheung , Z. Dai , A. Goel , S. Guha , and M. Li . Approximation Algorithms for Directed Steiner Problems . In Proc. of ACM\/SIAM Symp., Discrete Algorithms, 192--200 , 1998 . M. Charikar, C. Chekuri, T. Cheung, Z. Dai, A. Goel, S. Guha, and M. Li. Approximation Algorithms for Directed Steiner Problems. In Proc. of ACM\/SIAM Symp., Discrete Algorithms, 192--200, 1998."},{"key":"e_1_3_2_1_45_1","volume-title":"Network Flows: Theory, Algorithms, and Applications","author":"Ahuja R. K.","year":"1993","unstructured":"R. K. Ahuja , T. L. Magnanti , and J. B. Orlin . Network Flows: Theory, Algorithms, and Applications . Englewood Cliffs, NJ : Prentice-Hall , 1993 . R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. Network Flows: Theory, Algorithms, and Applications. Englewood Cliffs, NJ: Prentice-Hall, 1993."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2008.34"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.484436"},{"key":"e_1_3_2_1_48_1","first-page":"17","article-title":"Prediction-Based Decentralized Routing Algorithm. Electronic Communications","author":"Turky A. A.","year":"2009","unstructured":"A. A. Turky and A. M. Thiel . Prediction-Based Decentralized Routing Algorithm. Electronic Communications , EASST , 17 , 2009 . A. A. Turky and A. M. Thiel. Prediction-Based Decentralized Routing Algorithm. Electronic Communications, EASST, 17, 2009.","journal-title":"EASST"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70587-1_10"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.72"},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. of Int. Conf., EngOpt","author":"Andrade A. V.","year":"2008","unstructured":"A. V. Andrade , L. Errico , A. L. L. Aquino , L. P. Assis , and C. H. N. R. Barbosa . Analysis of Selection and Crossover Methods used by genetic Algorithm-based Heuristic to solve the LSP Allocation Problem in MPLS Networks under Capacity Constraints . In Proc. of Int. Conf., EngOpt , 2008 . A. V. Andrade, L. Errico, A. L. L. Aquino, L. P. Assis, and C. H. N. R. Barbosa. Analysis of Selection and Crossover Methods used by genetic Algorithm-based Heuristic to solve the LSP Allocation Problem in MPLS Networks under Capacity Constraints. In Proc. of Int. Conf., EngOpt, 2008."}],"event":{"name":"FIT '09: 7th International Conference on Frontiers of Information Technology","sponsor":["COMSATS Institute of Information Technology","SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"Abbottabad Pakistan","acronym":"FIT '09"},"container-title":["Proceedings of the 7th International Conference on Frontiers of Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1838002.1838013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1838002.1838013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:28Z","timestamp":1750248508000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1838002.1838013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,16]]},"references-count":47,"alternative-id":["10.1145\/1838002.1838013","10.1145\/1838002"],"URL":"https:\/\/doi.org\/10.1145\/1838002.1838013","relation":{},"subject":[],"published":{"date-parts":[[2009,12,16]]},"assertion":[{"value":"2009-12-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}