{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:43:17Z","timestamp":1730320997706,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Government of Russian Federation","award":["08-08"]},{"DOI":"10.13039\/501100002261","name":"Russian Foundation for Basic Research","doi-asserted-by":"publisher","award":["16-29-09482, 18-07-01369, 18-07-01488, 18-37-20047, 18-29-22034, 18-37-20047, 19-07-00953, 19-07-01246"],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005442","name":"Budget Division","doi-asserted-by":"publisher","award":["0073-2019-0002"],"id":[{"id":"10.13039\/100005442","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,13]]},"DOI":"10.1145\/3319619.3326853","type":"proceedings-article","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T08:10:59Z","timestamp":1562746259000},"page":"1643-1650","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures"],"prefix":"10.1145","author":[{"given":"Igor","family":"Saenko","sequence":"first","affiliation":[{"name":"ITMO University, Kronverkskiy prospekt, St.Petersburg, Russia"}]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[{"name":"Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Liniya, Russia and ITMO University, Kronverkskiy prospekt, St.Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2019,7,13]]},"reference":[{"volume-title":"Proceedings of the 2010 international conference on Applied computing conference (ACC'10)","author":"Gomez-Romero Mario E.","key":"e_1_3_2_1_1_1","unstructured":"Mario E. Gomez-Romero , Mario Reyes-Ayala , Edgar A. Andrade-Gonz\u00e1lez , and Jose A . Tirado-Mendez. 2010. Design and implementation of a VLAN . In Proceedings of the 2010 international conference on Applied computing conference (ACC'10) . Wisconsin, USA, 87--90. Mario E. Gomez-Romero, Mario Reyes-Ayala, Edgar A. Andrade-Gonz\u00e1lez, and Jose A. Tirado-Mendez. 2010. Design and implementation of a VLAN. In Proceedings of the 2010 international conference on Applied computing conference (ACC'10). Wisconsin, USA, 87--90."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2535468"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2012.31"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2015.069291"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10422-5_11"},{"key":"e_1_3_2_1_6_1","first-page":"86","article-title":"Design of virtual local area network scheme based on genetic optimization and visual analysis","volume":"5","author":"Saenko Igor","year":"2014","unstructured":"Igor Saenko and Igor Kotenko . 2014 . Design of virtual local area network scheme based on genetic optimization and visual analysis . Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 5 , 4 (2014), 86 -- 102 . Igor Saenko and Igor Kotenko. 2014. Design of virtual local area network scheme based on genetic optimization and visual analysis. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 5, 4 (2014), 86--102.","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507841"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601437"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2026369.2026411"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Workshop on Data Mining using Matrices and Tensors (DMMT'08)","author":"Snasel Vaclav","year":"2008","unstructured":"Vaclav Snasel , Jan Platos , Pavel Kr\u00f6mer , Dusan Husek , Roman Neruda , and Alexander Frolov . 2008 . Investigating Boolean Matrix Factorization . In Proceedings of the Workshop on Data Mining using Matrices and Tensors (DMMT'08) . Las Vegas, USA. Vaclav Snasel, Jan Platos, Pavel Kr\u00f6mer, Dusan Husek, Roman Neruda, and Alexander Frolov. 2008. Investigating Boolean Matrix Factorization. In Proceedings of the Workshop on Data Mining using Matrices and Tensors (DMMT'08). Las Vegas, USA."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2008.317"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12031"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWISE.2018.8633293"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.07.148"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1885194.1885214"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2012.6167478"},{"volume-title":"Proceedings of the 29th conference on Information communications (INFOCOM'10)","author":"Sun Xin","key":"e_1_3_2_1_17_1","unstructured":"Xin Sun , Yu-Wei E. Sung , Sunil D. Krothapalli , and Sanjay G. Rao . 2010. A systematic approach for evolving VLAN designs . In Proceedings of the 29th conference on Information communications (INFOCOM'10) . IEEE Press, Piscataway, NJ, USA, 1451--1459. Xin Sun, Yu-Wei E. Sung, Sunil D. Krothapalli, and Sanjay G. Rao. 2010. A systematic approach for evolving VLAN designs. In Proceedings of the 29th conference on Information communications (INFOCOM'10). IEEE Press, Piscataway, NJ, USA, 1451--1459."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.42"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497438"}],"event":{"name":"GECCO '19: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Prague Czech Republic","acronym":"GECCO '19"},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319619.3326853","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319619.3326853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T20:48:48Z","timestamp":1673038128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319619.3326853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,13]]},"references-count":19,"alternative-id":["10.1145\/3319619.3326853","10.1145\/3319619"],"URL":"https:\/\/doi.org\/10.1145\/3319619.3326853","relation":{},"subject":[],"published":{"date-parts":[[2019,7,13]]},"assertion":[{"value":"2019-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}