{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T22:35:56Z","timestamp":1649198156392},"reference-count":8,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,6,1]]},"DOI":"10.1587\/transinf.2019edl8113","type":"journal-article","created":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T22:09:41Z","timestamp":1590962981000},"page":"1414-1418","source":"Crossref","is-referenced-by-count":0,"title":["Survivable Virtual Network Topology Protection Method Based on Particle Swarm Optimization"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Guangyuan","family":"LIU","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Shijiazhuang Tiedao University"},{"name":"Department of Computer Science and Technology, Tsinghua University"}]},{"given":"Daokun","family":"CHEN","sequence":"additional","affiliation":[{"name":"Institute of Software Chinese Academy of Sciences"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] N.M.M.K. Chowdhury and R. Boutaba, \u201cA survey of network virtualization,\u201d Computer Networks, vol.54, no.5, pp.862-876, 2010. 10.1016\/j.comnet.2009.10.017","DOI":"10.1016\/j.comnet.2009.10.017"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] A. Fischer, J.F. Botero, M.T. Beck, H. de Meer, and X. Hesselbach, \u201cVirtual network embedding: A survey,\u201d IEEE Communications Surveys &amp; Tutorials, vol.15, no.4, pp.1888-1906, 2013. 10.1109\/surv.2013.013013.00155","DOI":"10.1109\/SURV.2013.013013.00155"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] M. Yu, Y. Yi, J. Rexford, and M. Chiang, \u201cRethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration,\u201d ACM SIGCOMM Computer Communication Review, vol.38, no.2, pp.17-29, 2008. 10.1145\/1355734.1355737","DOI":"10.1145\/1355734.1355737"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M. Rahman, I. Aib, and R. Boutaba, \u201cSVNE: Survivable virtual network embedding algorithms for network virtualization,\u201d IEEE Transactions on Network and Service Management, vol.10, no.2, pp.105-118, 2013.","DOI":"10.1109\/TNSM.2013.013013.110202"},{"key":"5","unstructured":"[5] S. Herker, A. Khan, X. An et al., \u201cSurvey on survivable virtual network embedding problem and solutions,\u201d Proc. ICNS, 2013."},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] N. Shahriar, R. Ahmed, S.R. Chowdhury, M.M.A. Khan, R. Boutaba, J. Mitra, and F. Zeng, \u201cConnectivity-aware virtual network embedding,\u201d IFIP Networking Conference (IFIP Networking) and Workshops, 2016, IEEE, pp.46-54, 2016. 10.1109\/ifipnetworking.2016.7497249","DOI":"10.1109\/IFIPNetworking.2016.7497249"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] A. Todimala and B. Ramamurthy, \u201cA scalable approach for survivable virtual topology routing in optical WDM networks,\u201d IEEE J. Sel. Areas Commun., vol.25, no.6, pp.63-69, 2007. 10.1109\/jsac-ocn.2007.020605","DOI":"10.1109\/JSAC-OCN.2007.020605"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] X. Cheng, S. Su, Z. Zhang, H. Wang, F. Yang, Y. Luo, and J. Wang, \u201cVirtual network embedding through topology-aware node ranking,\u201d ACM SIGCOMM Computer Communication Review, vol.41, no.2, pp.38-47, 2011. 10.1145\/1971162.1971168","DOI":"10.1145\/1971162.1971168"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/6\/E103.D_2019EDL8113\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T03:25:10Z","timestamp":1591413910000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/6\/E103.D_2019EDL8113\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,1]]},"references-count":8,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edl8113","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,1]]}}}