{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:37:08Z","timestamp":1725687428150},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,12]]},"DOI":"10.1145\/1280940.1281077","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"641-646","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A service location problem with QoS constraints"],"prefix":"10.1145","author":[{"given":"Zille Huma","family":"Kamal","sequence":"first","affiliation":[{"name":"Western Michigan University"}]},{"given":"Ala","family":"Al-Fuqaha","sequence":"additional","affiliation":[{"name":"Western Michigan University"}]},{"given":"Ajay","family":"Gupta","sequence":"additional","affiliation":[{"name":"Western Michigan University"}]}],"member":"320","published-online":{"date-parts":[[2007,8,12]]},"reference":[{"volume-title":"Proceedings of ACM-SIAM symposium on Discrete algorithms (SODA'04)","year":"2004","author":"Shmoys D. B.","key":"e_1_3_2_1_1_1","unstructured":"Shmoys , D. B. , Swamy , C. , and Levi , R . Facility Location with Service Installation Costs . In Proceedings of ACM-SIAM symposium on Discrete algorithms (SODA'04) (New Orleans, LA , Jan. 11-13, 2004 ). SIAM, Philadelphia, PA, 2004, 1088--1097. Shmoys, D. B., Swamy, C., and Levi, R. Facility Location with Service Installation Costs. In Proceedings of ACM-SIAM symposium on Discrete algorithms (SODA'04) (New Orleans, LA, Jan. 11-13, 2004). SIAM, Philadelphia, PA, 2004, 1088--1097."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.881606"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.838599"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060823"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11944874_17"},{"volume-title":"Covering partially directed graphs with directed paths. Discrete Mathematics (July 06), 306, 13","year":"2006","author":"Rizzi R.","key":"e_1_3_2_1_6_1","unstructured":"Rizzi , R. , and Rospocher , M . Covering partially directed graphs with directed paths. Discrete Mathematics (July 06), 306, 13 , Elsevier B.V. , Amsterdam , 2006 , 1390--1404. Rizzi, R., and Rospocher, M. Covering partially directed graphs with directed paths. Discrete Mathematics (July 06), 306, 13, Elsevier B.V., Amsterdam, 2006, 1390--1404."},{"key":"e_1_3_2_1_7_1","unstructured":"Cisco Systems Inc. 2006. \"Introducing Cisco Application--Oriented Networking--A CIO Brief \" Online http:\/\/www.cisco.com\/application\/pdf\/en\/us\/guest\/products\/ps6438\/c1031\/cdccont_0900aecd803fa77d.pdf Cisco Systems Inc. 2006. \"Introducing Cisco Application--Oriented Networking--A CIO Brief \" Online http:\/\/www.cisco.com\/application\/pdf\/en\/us\/guest\/products\/ps6438\/c1031\/cdccont_0900aecd803fa77d.pdf"},{"volume-title":"Opportunistic Networks: The Concept and Research Challenges in Privacy and Security","year":"2007","author":"Lilien L.","key":"e_1_3_2_1_8_1","unstructured":"Lilien , L. , Kamal , Z. H. , Bhuse , V. , and Gupta , A . Opportunistic Networks: The Concept and Research Challenges in Privacy and Security . Chapter in: Mobile and Wireless Network Security and Privacy ed. by K. Makki et al., Springer Science +Business Media, Norwell, MA, 2007 . Lilien, L., Kamal, Z. H., Bhuse, V., and Gupta, A. Opportunistic Networks: The Concept and Research Challenges in Privacy and Security. Chapter in: Mobile and Wireless Network Security and Privacy ed. by K. Makki et al., Springer Science+Business Media, Norwell, MA, 2007."},{"key":"e_1_3_2_1_9_1","unstructured":"Berkelaar M. Eikland K. and Notebaert P. lp_solve 5.5.0.10. Online http:\/\/lpsolve.sourceforge.net\/5.5\/ Berkelaar M. Eikland K. and Notebaert P. lp_solve 5.5.0.10. Online http:\/\/lpsolve.sourceforge.net\/5.5\/"},{"volume-title":"last accessed","year":"2007","author":"Zhu K.","key":"e_1_3_2_1_10_1","unstructured":"Zhu , K. Research . Online , last accessed April 17, 2007 : http:\/\/networks.cs.ucdavis.edu\/~zhuk\/toplogies.html Zhu, K. Research. Online, last accessed April 17, 2007: http:\/\/networks.cs.ucdavis.edu\/~zhuk\/toplogies.html"}],"event":{"name":"IWCMC07: International Wireless Communications and Mobile Computing Conference","sponsor":["SIGDOC ACM Special Interest Group on Systems Documentation","ACM Association for Computing Machinery","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAPP ACM Special Interest Group on Applied Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Honolulu Hawaii USA","acronym":"IWCMC07"},"container-title":["Proceedings of the 2007 international conference on Wireless communications and mobile computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1280940.1281077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T19:14:03Z","timestamp":1673291643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280940.1281077"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,12]]},"references-count":10,"alternative-id":["10.1145\/1280940.1281077","10.1145\/1280940"],"URL":"https:\/\/doi.org\/10.1145\/1280940.1281077","relation":{},"subject":[],"published":{"date-parts":[[2007,8,12]]},"assertion":[{"value":"2007-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}