{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:28:38Z","timestamp":1725812918327},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319133256"},{"type":"electronic","value":"9783319133263"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13326-3_5","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T14:20:19Z","timestamp":1417443619000},"page":"43-53","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Heuristic Algorithm for Virtual Network Mapping Problem"],"prefix":"10.1007","author":[{"given":"Huynh Thi Thanh","family":"Binh","sequence":"first","affiliation":[]},{"given":"Bach Hoang","family":"Vinh","sequence":"additional","affiliation":[]},{"given":"Nguyen Hong","family":"Nhat","sequence":"additional","affiliation":[]},{"given":"Le Hoang","family":"Linh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,26]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Raihan Rahman, M., Aib, I., Boutaba, R.: Survivable Virtual Network Embedding. In: 9th International IFIP TC 6 Networking Conference Networking 2010, pp. 40\u201352 (2010)","DOI":"10.1007\/978-3-642-12963-6_4"},{"key":"5_CR2","unstructured":"Tran, H.V., Ngo, S.H.: An enhanced greedy node mapping algorithm for resource allocation in network virtualization, Journal of Science and Technology, 72\u201377 (2012)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Tran, H.V., Ngo, S.H.: Improved Heuristics for Online Node and Link Mapping Problem in Network Virtualization. In: The 13th International Conference on Computational Science and Applications (ICCSA 2013), pp. 154\u2013165 (June 2013)","DOI":"10.1007\/978-3-642-39640-3_11"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Yu, M., Yi, Y., Rexford, J., Chiang, M.: Rethinking virtual network embedding: substrate support for path splitting and migration. SIGCOMM Comput. Commun. Rev. 38(2), pp. 17\u201329 (2008)","DOI":"10.1145\/1355734.1355737"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Razzaq, A., Hidell, M., Sjodin, P.: Virtual Network Embedding: A Hybrid Vertex Mapping Solution for Dynamic Resource Allocation. Journal of Electrical and Computer Engineering, 1\u201317 (2012)","DOI":"10.1155\/2012\/358647"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Lischka, J., Karl, H.: A virtual network mapping algorithm based on subgraph isomorphism detection. In: The 1st ACM Workshop on Virtualized, Infrastructure Systems and Architectures, VISA 2009, pp. 81\u201388 (2009)","DOI":"10.1145\/1592648.1592662"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Chowdhury, N., Rahman, M.R., Boutaba, R.: Virtual network embedding with coordinated node and link mapping. In: IEEE INFOCOM 2009, pp. 783\u2013791 (April 2009)","DOI":"10.1109\/INFCOM.2009.5061987"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Testbeds and Research Infrastructure: Development of Networks and Communities"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13326-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T16:43:06Z","timestamp":1676911386000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13326-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319133256","9783319133263"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13326-3_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}