{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:46:25Z","timestamp":1725795985827},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438619"},{"type":"electronic","value":"9783662438626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43862-6_5","type":"book-chapter","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T23:51:34Z","timestamp":1403653894000},"page":"47-51","source":"Crossref","is-referenced-by-count":8,"title":["Contributions to Efficient Resource Management in Virtual Networks"],"prefix":"10.1007","author":[{"given":"Rashid","family":"Mijumbi","sequence":"first","affiliation":[]},{"given":"Juan-Luis","family":"Gorricho","sequence":"additional","affiliation":[]},{"given":"Joan","family":"Serrat","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Fischer, A., Botero, J., Beck, M., De Meer, H., Hesselbach, X.: Virtual Network Embedding: A survey. IEEE Communications Surveys Tutorials, 1\u201319 (2013)","DOI":"10.1109\/SURV.2013.013013.00155"},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TNET.2011.2159308","volume":"20","author":"M. Chowdhury","year":"2012","unstructured":"Chowdhury, M., Rahman, M., Boutaba, R.: ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping. IEEE\/ACM Transactions on Networking\u00a020(1), 206\u2013219 (2012)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Houidi, I., Louati, W., Zeghlache, D.: A Distributed Virtual Network Mapping Algorithm. In: IEEE International Conference on Communications, pp. 5634\u20135640 (2008)","DOI":"10.1109\/ICC.2008.1056"},{"issue":"2","key":"5_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1355734.1355737","volume":"38","author":"M. Yu","year":"2008","unstructured":"Yu, M., Yi, Y., Rexford, J., Chiang, M.: Rethinking virtual network embedding: Substrate support for path splitting and migration. ACM\/SIGCOMM Computer Communication Review\u00a038(2), 17\u201329 (2008)","journal-title":"ACM\/SIGCOMM Computer Communication Review"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Ammar, M.: Algorithms for Assigning Substrate Network Resources to Virtual Network Components. In: Proceedings of IEEE INFOCOM, pp. 1\u201312 (2006)","DOI":"10.1109\/INFOCOM.2006.322"},{"key":"5_CR6","unstructured":"Bradley, H., Magnanti: Applied Mathematical Programming. Addison-Wesley, (1977)"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1287\/opre.46.3.316","volume":"46","author":"C. Barnhart","year":"1998","unstructured":"Barnhart, C., Johnson, E.L., Nemhauser, G.L., Savelsbergh, M.W., Vance, P.H.: Branch-and-price: Column generation for solving huge integer programs. Operations Research\u00a046, 316\u2013329 (1998)","journal-title":"Operations Research"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Fan, J., Ammar, M.: Dynamic topology configuration in service overlay networks, A study of reconfiguration policies. In: Proc. IEEE INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.139"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Rahman, M.R., Boutaba, R.: SVNE: Survivable Virtual Network Embedding Algorithms for Network Virtualisation. IEEE Transactions on Network and Service Management\u00a010(2) (2013)","DOI":"10.1109\/TNSM.2013.013013.110202"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Fajjari, I., Aitsaadi, N., Pujolle, G., Zimmermann, H.: VNR algorithm: A greedy approach for virtual networks reconfigurations. In: IEEE Global Telecommunications Conference, pp. 1\u20135 (2011)","DOI":"10.1109\/GLOCOM.2011.6134006"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1016\/j.future.2012.08.002","volume":"29","author":"S. Gang","year":"2013","unstructured":"Gang, S., Yu, H., Vishal, A., Lemin, L.: A cost efficient framework and algorithm for embedding dynamic virtual network requests. Future Generation Computer Systems\u00a029, 1265\u20131277 (2013)","journal-title":"Future Generation Computer Systems"},{"key":"5_CR12","volume-title":"Artificial Intelligence: A Modern Approach","author":"S.J. Russell","year":"2010","unstructured":"Russell, S.J., Norvig, P.: Artificial Intelligence: A Modern Approach, 3rd edn. Prentice Hall, Englewood Cliffs (2010)","edition":"3"},{"key":"5_CR13","volume-title":"Reinforcement Learning: An Introduction","author":"S. Sutton","year":"1998","unstructured":"Sutton, S., Barto, G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (1998)"},{"key":"5_CR14","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"2009","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. MIT Press, Cambridge (2009)","edition":"3"},{"key":"5_CR15","unstructured":"Mijumbi, R., Serrat, J., Gorricho, J.L., Boutaba, R.: Path Generation-based Virtual Network Embedding. IEEE\/ACM Transactions on Networking (Submitted) (under peer review)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Mijumbi, R., Gorricho, J.L., Serrat, J., Claeys, M., De Turck, F., Latr\u00e9, S.: Design and Evaluation of Learning Algorithms for Dynamic Resource Management in Virtual Networks. In: IEEE\/IFIP Network Operations and Management Symposium (NOMS), Krakow, Poland (2014) (accepted November 2013)","DOI":"10.1109\/NOMS.2014.6838258"},{"key":"5_CR17","unstructured":"IBM ILOG CPLEX Optimizer (2014), \n \n http:\/\/www-01.ibm.com\/software\/integration\/optimization\/cplex-optimizer\/about\/\n \n \n (visited January 08, 2014)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Bellifemine, F., Bergenti, F., Caire, G., Poggi, A.: Jade \u2013 A Java Agent Development Framework. In: Multi-Agent Programming. Multiagent Systems, Artificial Societies, and Simulated Organizations, vol.\u00a015, pp. 125\u2013147. Springer US (2005)","DOI":"10.1007\/0-387-26350-0_5"}],"container-title":["Lecture Notes in Computer Science","Monitoring and Securing Virtualized Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43862-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T00:39:21Z","timestamp":1558917561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43862-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438619","9783662438626"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43862-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}