{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T05:13:10Z","timestamp":1648703590767},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Lett."],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/lcomm.2014.011714.132622","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T18:02:10Z","timestamp":1397066530000},"page":"515-518","source":"Crossref","is-referenced-by-count":4,"title":["How to Make Network Nodes Adaptive?"],"prefix":"10.1109","volume":"18","author":[{"given":"Guozhen","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Hongchang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shuqiao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hongchao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Yi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11081-007-9001-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0898-1221(91)90158-Z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018467"},{"key":"ref15","year":"0"},{"key":"ref16","first-page":"1","article-title":"New graphiton model: a computational discrete space, self-encoded as a trivalent graph","volume":"5","author":"aschheim","year":"2012","journal-title":"J Inf Computat Sci"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.316"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.27"},{"key":"ref6","first-page":"138","article-title":"A system for constructing configurable high-level protocols","author":"bhatti","year":"0","journal-title":"Proceedings of SIGCOMM 1995"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774765"},{"key":"ref8","author":"holland","year":"1995","journal-title":"HIDDEN ORDER HOW ADAPTION BUILDS COMPLEXITY"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2010.5680254"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.850224"},{"key":"ref1","article-title":"Overcoming the Internet impasse through virtualization","author":"shenker","year":"2004","journal-title":"Proc ACM HotNets-III"},{"key":"ref9","first-page":"1","article-title":"Composing software defined networks","author":"monsanto","year":"0","journal-title":"Proceedings of NSDA 2013"}],"container-title":["IEEE Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4234\/6784524\/06784560.pdf?arnumber=6784560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:32:04Z","timestamp":1638217924000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6784560\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":16,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/lcomm.2014.011714.132622","relation":{},"ISSN":["1089-7798"],"issn-type":[{"value":"1089-7798","type":"print"}],"subject":[],"published":{"date-parts":[[2014,3]]}}}