{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,18]],"date-time":"2024-08-18T09:10:09Z","timestamp":1723972209663},"reference-count":10,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,12,1]]},"DOI":"10.1587\/transinf.2020edl8050","type":"journal-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T22:19:35Z","timestamp":1606774775000},"page":"2713-2716","source":"Crossref","is-referenced-by-count":0,"title":["DVNR: A Distributed Method for Virtual Network Recovery"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Guangyuan","family":"LIU","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Shijiazhuang Tiedao University"}]},{"given":"Daokun","family":"CHEN","sequence":"additional","affiliation":[{"name":"Institute of Software Chinese Academy of Sciences"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] N.M.M.K. Chowdhury and R. Boutaba, \u201cA survey of network virtualization,\u201d Computer Networks, vol.54, no.5, pp.862-876, 2010. 10.1016\/j.comnet.2009.10.017","DOI":"10.1016\/j.comnet.2009.10.017"},{"key":"2","unstructured":"[2] NSF Research: \u2018GENI,\u2019 http:\/\/www.geni.net\/"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] A. Fischer, J.F. Botero, M.T. Beck, H. de Meer, and X. Hesselbach, \u201cVirtual network embedding: A survey,\u201d Commun. Surveys Tuts., vol.15, no.4, pp.1888-1906, 2013. 10.1109\/surv.2013.013013.00155","DOI":"10.1109\/SURV.2013.013013.00155"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] S. Colman-Meixner, C. Develder, M. Tornatore, and B. Mukherjee,\u201cA survey on resiliency techniques in cloud computing infrastructures and applications,\u201d Commun. Surveys Tuts., vol.18, no.3, pp.2244-2281, 2016. 10.1109\/comst.2016.2531104","DOI":"10.1109\/COMST.2016.2531104"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] P. Zhang, H. Yao, M. Li, and Y. Liu, \u201cVirtual network embedding based on modified genetic algorithm,\u201d Peer-to-Peer Networking and Applications, vol.12, no.2, pp.481-492, 2019. 10.1007\/s12083-017-0609-x","DOI":"10.1007\/s12083-017-0609-x"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] X. Siya, L. Peng, G. Shaoyong, and X. Qiu, \u201cFiber-wireless network virtual resource embedding method based on load balancing and priority,\u201d IEEE Access, vol.6, pp.33201-33215, 2018. 10.1109\/access.2018.2848919","DOI":"10.1109\/ACCESS.2018.2848919"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] N. Ogino, T. Kitahara, S. Arakawa, and M. Murata, \u201cVirtual network embedding with multiple priority classes sharing substrate resources,\u201d Computer networks, vol.112(C), pp.52-66, 2017. 10.1016\/j.comnet.2016.10.007","DOI":"10.1016\/j.comnet.2016.10.007"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] M. Chowdhury, M.R. Riaihan, and R. Boutaba, \u201cViNEYard: Virtual network embedding algorithm with coordinated node and link mapping,\u201d IEEE\/ACM Trans. Netw., vol.20, no.1, pp.206-219, 2012. 10.1109\/tnet.2011.2159308","DOI":"10.1109\/TNET.2011.2159308"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] E.W. Zegura, K.L. Calvert, and S. Bhattacharjee, \u201cHow to model an internetwork,\u201d Proc. IEEE INFOCOM, San Francisco, March 2010:594-","DOI":"10.1109\/INFCOM.1996.493353"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] X. Cheng, S. Su, Z. Zhang, H. Wang, F. Yang, Y. Luo, and J. Wang, \u201cVirtual network embedding through topology-aware node ranking,\u201d ACM SIGCOMM Computer Communication Review, vol.41, no.2, pp.39-47, 2011. 602. 10.1145\/1971162.1971168","DOI":"10.1145\/1971162.1971168"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/12\/E103.D_2020EDL8050\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,18]],"date-time":"2024-08-18T08:50:22Z","timestamp":1723971022000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/12\/E103.D_2020EDL8050\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,1]]},"references-count":10,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2020edl8050","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2020,12,1]]}}}