{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:03:28Z","timestamp":1771661008431,"version":"3.50.1"},"reference-count":31,"publisher":"Zhejiang University Press","issue":"9","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501042"],"award-info":[{"award-number":["61501042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Fundamental Research Funds for the Central Universities, China","award":["2018PTB-00-03"],"award-info":[{"award-number":["2018PTB-00-03"]}]}],"content-domain":{"domain":["springerlink.com","jzus.zju.edu.cn"],"crossmark-restriction":true},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1631\/fitee.1700698","type":"journal-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T06:54:34Z","timestamp":1542351274000},"page":"1135-1150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A novel forwarding and routing mechanism design in SDN-based NDN architecture"],"prefix":"10.1631","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2022-1674","authenticated-orcid":false,"given":"Jia","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ren-chao","family":"Xie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tao","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"635","published-online":{"date-parts":[[2018,11,16]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2012.6231276"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2002.804323"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.06.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/netsoft.2015.7116130"},{"key":"ref5","author":"Chanda","year":"2013","journal-title":"ContentFlow: mapping con-tent to flows in software defined networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491193"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icufn.2015.7182521"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/isdea.2012.444"},{"key":"ref10","article-title":"Genetic Algorithms in Search, Opti-mization, and Machine Learning","author":"Goldberg","year":"1989","journal-title":"Addison-Wesley, Co., Reading, Mass"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/icmlc.2008.4620619"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0783"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1658978.1658980"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1853079.1853096"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/wict.2011.6141348"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ipom.2002.1045774"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ic-nc.2010.19"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.031"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/hpsr.2001.923666"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/icoin.2016.7427118"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ewsdn.2012.20"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1500321"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/icii.2001.983623"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.c1300177"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/bf00175354"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2013.070813.00063"},{"issue":"22","key":"ref28","first-page":"129","article-title":"Routing protocol for wireless sensor networks based on least hop","volume":"34","author":"Yang","year":"2008","journal-title":"Comput Eng"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.5.9.1322-1334"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/emeit.2011.6023990"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1700698.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1700698\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1700698.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:10:46Z","timestamp":1771657846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1700698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":31,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["1293"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1700698","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]},"assertion":[{"value":"http:\/\/orcid.org\/0000-0002-2022-1674","URL":"http","order":0,"name":"name","label":"Jia LI","group":{"name":"orcid","label":"ORCID"}},{"value":"doi:10.1631\/jzus.C1300177","URL":"http:\/\/www.jzus.zju.edu.cn\/article.php?doi=10.1631\/jzus.C1300177","order":0,"name":"name","label":"A two-stage heuristic method for...","group":{"name":"name","label":"Similar articles"}},{"value":"2017-10-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-10","order":2,"name":"crosschecked","label":"Crosschecked","group":{"name":"publication_history","label":"Publication History"}},{"value":"Article","order":0,"name":"content_type","group":{"name":"content_type","label":"Content Type"}},{"value":"\u00a9 Zhejiang University and Springer-Verlag GmbH Germany, part of Springer Nature 2018","order":0,"name":"copyright","group":{"name":"copyright","label":"Copyright"}}]}}