{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:12Z","timestamp":1738777212629,"version":"3.37.0"},"reference-count":16,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.6.1248-1254","type":"journal-article","created":{"date-parts":[[2013,6,17]],"date-time":"2013-06-17T16:04:37Z","timestamp":1371485077000},"source":"Crossref","is-referenced-by-count":5,"title":["Node Importance of Data Center Network Based on Contribution Matrix of Information Entropy"],"prefix":"10.4304","volume":"8","author":[{"given":"Kai","family":"Peng","sequence":"first","affiliation":[]},{"given":"Rongheng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Binbin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Fangchun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,6,15]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496100"},{"key":"ref2","first-page":"666","article-title":"Cloud model for service selection","volume-title":"Proc The 30th IEEE Conference on Computer Communications Workshops on Cloud Computing","author":"Shangguang","year":"2011","unstructured":"[2] Shangguang W, Zheng Z, Qibo S, Hua Z, Fangchun Y. \"Cloud model for service selection,\" in Proc. The 30th IEEE Conference on Computer Communications Workshops on Cloud Computing, Shanghai, China. p. 666-671, 2011."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.03.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6377(82)90020-7"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1109\/ICCCAS.2005.1495340","volume-title":"Finding the most vital node by node contraction in communication networks","author":"Jun","year":"2005","unstructured":"[6] W. Jun and T. Yue-jin, \"Finding the most vital node by node contraction in communication networks,\" Communications, Circuits and Systems, 2005."},{"key":"ref7","first-page":"1076","article-title":"Finding most vital node by node importance contribution matrix in communication networks","volume":"35","author":"Zhao","year":"2009","unstructured":"[7] Y. Zhao, Z. Wang, J. Zheng, and X. Guo, \"Finding most vital node by node importance contribution matrix in communication networks,\" Journal of Beijing University of Aeronautics and Astronautics, vol.35, pp. 1076-1079, 2009.","journal-title":"Journal of Beijing University of Aeronautics and Astronautics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1985.6312192"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592576"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402968"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592577"},{"key":"ref12","first-page":"2276","article-title":"FiConn: Using backup port for server interconnection in data centers","volume-title":"28th IEEE International Conference on Computer Communications (INFOCOM)","author":"Li","year":"2009","unstructured":"[12] D. Li et al. \"FiConn: Using backup port for server interconnection in data centers,\" in proc.28th IEEE International Conference on Computer Communications (INFOCOM), pp. 2276-2285, 2009."},{"key":"ref13","first-page":"525","article-title":"Primary studies on urban ecosystem health assessment","volume":"22","author":"Guo","year":"2002","unstructured":"[13] X.-R. Guo et al. \"Primary studies on urban ecosystem health assessment,\" China Environmental Science, vol. 22, pp. 525-529, 2002.","journal-title":"China Environ Sci","ISSN":"https:\/\/id.crossref.org\/issn\/1003-1189","issn-type":"print"},{"issue":"8","key":"ref14","first-page":"10","article-title":"Resource allocation algorithms in the reconfigurable network based on network centrality and topology potential.","volume":"33","author":"Wang","year":"2012","unstructured":"[14] Z.-H. Wang, Y.-N. Han, T. Lin, Y.-M. Xu et al. \"Resource allocation algorithms in the reconfigurable network based on network centrality and topology potential. Journal of China Institute of Communications,\" 33(8):10-20, 2012.","journal-title":"Journal of China Institute of Communications"},{"key":"ref15","first-page":"723","article-title":"Above the trust and security in cloud computing: a notion towards innovation","volume-title":"8th International Conference on Embedded and Ubiquitous Computing (EUC)","author":"Ahmed","year":"2010","unstructured":"[16] M. Ahmed, Y. Xiang, and S. Ali, \"Above the trust and security in cloud computing: a notion towards innovation,\" in proc.8th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 723-730, 2010."},{"key":"ref15","unstructured":"[15] C.-H DING, X.-W DONG, M.-L GUI, \"To evaluate the Using entropy method of network node of region correspondence net,\" Computer Programming Skills & Maintenance, (S1):pp.117-118, 2009"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:02:01Z","timestamp":1738774921000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,15]]},"references-count":16,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2013,6,15]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.6.1248-1254","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,6,15]]}}}