{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T23:56:42Z","timestamp":1648857402714},"reference-count":24,"publisher":"Zhejiang University Press","issue":"11","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61309020","61521003"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["springerlink.com","jzus.zju.edu.cn"],"crossmark-restriction":true},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1631\/fitee.1601404","type":"journal-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T10:52:36Z","timestamp":1516272756000},"page":"1854-1866","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A forwarding graph embedding algorithm exploiting regional topology information"],"prefix":"10.1631","volume":"18","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9770-6610","authenticated-orcid":false,"given":"Hong-chao","family":"Hu","sequence":"first","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yu-xing","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Zhen-peng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2018,1,18]]},"reference":[{"issue":"3","key":"1184_CR1","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.comnet.2015.09.034","volume":"93","author":"P. Bellavista","year":"2015","unstructured":"Bellavista, P., Callegati, F., Cerroni, W., et al., 2015. Virtual network function embedding in real cloud environments. Comput. Netw., 93(3): 506\u2013517. https:\/\/doi.org\/10.1016\/j.comnet.2015.09.034","journal-title":"Comput. Netw."},{"key":"1184_CR2","volume-title":"Hosting Virtual Networks on Commodity Hardware","author":"S. Bhatia","year":"2008","unstructured":"Bhatia, S., Motiwala, M., Muhlbauer, W., et al., 2008. Hosting Virtual Networks on Commodity Hardware. Technical Report, No. GT-CS-07-10. Georgia Institute of Tech-nology, PA."},{"issue":"4","key":"1184_CR3","doi-asserted-by":"publisher","first-page":"1777","DOI":"10.1016\/j.physa.2011.09.017","volume":"391","author":"D. Chen","year":"2012","unstructured":"Chen, D., Lu, L., Shang, M., et al., 2012. Identifying influen-tial nodes in complex networks. Phys. A., 391(4): 1777\u20131787. https:\/\/doi.org\/10.1016\/j.physa.2011.09.017","journal-title":"Phys. A."},{"issue":"2","key":"1184_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/1971162.1971168","volume":"41","author":"X. Cheng","year":"2011","unstructured":"Cheng, X., Su, S., Zhang, Z., et al., 2011. Virtual network embedding through topology-aware node ranking. ACM SIGCOMM Comput. Commun. Rev., 41(2): 38\u201347. https:\/\/doi.org\/10.1145\/1971162.1971168","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"1184_CR5","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TNET.2011.2159308","volume":"20","author":"M. Chowdhury","year":"2009","unstructured":"Chowdhury, M., Rahman, M., Boutaba, R., et al., 2009. Vineyard: virtual network embedding algorithms with coordinated node and link mapping. IEEE\/ACM Trans. Netw., 20(1): 206\u2013219. https:\/\/doi.org\/10.1109\/TNET.2011.2159308","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"2","key":"1184_CR6","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1137\/S0097539795290477","volume":"28","author":"D. Eppstein","year":"1998","unstructured":"Eppstein, D., 1998. Finding the K shortest paths. SIAM J. Comput., 28(2): 652\u2013673. https:\/\/doi.org\/10.1137\/S0097539795290477","journal-title":"SIAM J. Comput."},{"key":"1184_CR7","volume-title":"Network Functions Virtual-ization, White Paper","author":"ETSI NFVISG European Telecommunications Standards Institute Network Functions Virtualization Industry Specification Group","year":"2013","unstructured":"ETSI NFVISG (European Telecommunications Standards Institute Network Functions Virtualization Industry Specification Group), 2013. Network Functions Virtual-ization, White Paper. http:\/\/www.esti.org\/technologiescluster\/technologies\/nfv [Accessed on Nov. 2, 2016]."},{"issue":"2","key":"1184_CR8","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1103\/PhysRevE.76.026107","volume":"76","author":"G. Fagiolo","year":"2007","unstructured":"Fagiolo, G., 2007. Clustering in complex directed networks. Phys. Rev. E, 76(2): 12\u201323. https:\/\/doi.org\/10.1103\/PhysRevE.76.026107","journal-title":"Phys. Rev. E"},{"key":"1184_CR9","first-page":"21","volume-title":"Proc. 25th IEEE Int. Conf. on Computer Com-munications","author":"J. Fan","year":"2006","unstructured":"Fan, J., Ammar, M., 2006. Dynamic topology configuration in service overlay networks: a study of reconfiguration policies. Proc. 25th IEEE Int. Conf. on Computer Com-munications, p.21\u201332. https:\/\/doi.org\/10.1109\/INFOCOM.2006.139"},{"key":"1184_CR10","first-page":"216","volume-title":"Addison-Wesley Profes-sional, USA","author":"D. Goldberg","year":"2009","unstructured":"Goldberg, D., 2009. Genetic Algorithms in Search, Optimiza-tion and Machine Learning. Addison-Wesley Profes-sional, USA, p.216\u2013236."},{"key":"1184_CR11","first-page":"1","volume-title":"Proc. IEEE Int. Conf. on Computer Communi-cations","author":"L. Gong","year":"2014","unstructured":"Gong, L., Wen, Y., Zhu, Z., et al., 2014. Toward profit-seeking virtual network embedding algorithm via global resource capacity. Proc. IEEE Int. Conf. on Computer Communi-cations, p.1\u20139. https:\/\/doi.org\/10.1109\/INFOCOM.2014.6847918"},{"key":"1184_CR12","first-page":"200","volume-title":"Proc. IEEE Int. Symp. on Performance Analysis of Sys-tems & Software","author":"Y. Koh","year":"2007","unstructured":"Koh, Y., Knauerhase, R., Brett, P., et al., 2007. An analysis of performance interference effects in virtual environments. Proc. IEEE Int. Symp. on Performance Analysis of Sys-tems & Software, p.200\u2013209. https:\/\/doi.org\/10.1109\/ISPASS.2007.363750"},{"key":"1184_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/1592648.1592662","volume-title":"Proc. 1st ACM Workshop on Virtualized Infrastructure Systems and Architectures","author":"J. Lischka","year":"2009","unstructured":"Lischka, J., Karl, H., 2009. A virtual network mapping algo-rithm based on subgraph isomorphism detection. Proc. 1st ACM Workshop on Virtualized Infrastructure Systems and Architectures, p.81\u201388. https:\/\/doi.org\/10.1145\/1592648.1592662"},{"key":"1184_CR14","volume-title":"Efficient Mapping of Virtual Networks onto a Shared Substrate","author":"J. Lu","year":"2006","unstructured":"Lu, J., Turner, J., 2006. Efficient Mapping of Virtual Networks onto a Shared Substrate. Technical Report No. WUCSE- 2006-35, Washington University in St Louis, Washington."},{"key":"1184_CR15","first-page":"7","volume-title":"Proc. 3rd IEEE Int. Conf. on Cloud Networking","author":"S. Mehraghdam","year":"2014","unstructured":"Mehraghdam, S., Keller, M., Karl, H., et al., 2014. Specifying and placing chains of virtual network functions. Proc. 3rd IEEE Int. Conf. on Cloud Networking, p.7\u201313. https:\/\/doi.org\/10.1109\/CloudNet.2014.6968961"},{"issue":"1","key":"1184_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TSC.2011.36","volume":"6","author":"Y. Mei","year":"2013","unstructured":"Mei, Y., Liu, L., Pu, X., et al., 2013. Performance analysis of network I\/O workloads in virtualized data centers. IEEE Trans. Serv. Comput., 6(1): 48\u201363. https:\/\/doi.org\/10.1109\/TSC.2011.36","journal-title":"IEEE Trans. Serv. Comput."},{"key":"1184_CR17","first-page":"51","volume-title":"Proc. 3rd IEEE Int. Conf. on Cloud Com-puting","author":"X. Pu","year":"2010","unstructured":"Pu, X., Liu, L., Mei, Y., et al., 2010. Understanding perfor-mance interference of I\/O workload in virtualized cloud environment. Proc. 3rd IEEE Int. Conf. on Cloud Com-puting, p.51\u201358. https:\/\/doi.org\/10.1109\/CLOUD.2010.65"},{"key":"1184_CR18","first-page":"68","volume-title":"Proc. 2nd Int. Conf. on Evolving Internet","author":"A. Razzaq","year":"2010","unstructured":"Razzaq, A., Siraj Rathore, M., 2010. An approach towards resource efficient virtual network embedding. Proc. 2nd Int. Conf. on Evolving Internet, p.68\u201373. https:\/\/doi.org\/10.1109\/INTERNET.2010.21"},{"key":"1184_CR19","first-page":"1285","volume-title":"Proc. IEEE Int. Conf. on Computer Communications","author":"R. Shea","year":"2014","unstructured":"Shea, R., Wang, F., Wang, H., et al., 2014. A deep investiga-tion into network performance in virtual machine based cloud environments. Proc. IEEE Int. Conf. on Computer Communications, p.1285\u20131293. https:\/\/doi.org\/10.1109\/INFOCOM.2014.6848061"},{"key":"1184_CR20","first-page":"127","volume-title":"Proc. IEEE Int. Conf. on Computer Communications Workshops","author":"S. Su","year":"2012","unstructured":"Su, S., Zhang, Z., Cheng, X., et al., 2012. Energy-aware virtual network embedding through consolidation. Proc. IEEE Int. Conf. on Computer Communications Workshops, p.127\u2013132. https:\/\/doi.org\/10.1109\/INFCOMW.2012.6193473"},{"issue":"2","key":"1184_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/CC.2014.6821735","volume":"11","author":"Z. Wang","year":"2014","unstructured":"Wang, Z., Wu, J., Wang, Y., et al., 2014. Survivable virtual network mapping using optimal backup topology in vir-tualized SDN. China Commun., 11(2): 26\u201337. https:\/\/doi.org\/10.1109\/CC.2014.6821735","journal-title":"China Commun."},{"key":"1184_CR22","first-page":"1","volume-title":"Proc. European Conf. on Optical Communication","author":"S. Xia","year":"2014","unstructured":"Xia, S., Zhang, Y., Green, H., et al., 2014. Network function placement for NFV chaining in packet\/optical data cen-ters. Proc. European Conf. on Optical Communication, p.1\u20133. https:\/\/doi.org\/10.1109\/ECOC.2014.6963925"},{"issue":"2","key":"1184_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1355734.1355737","volume":"32","author":"M. Yu","year":"2008","unstructured":"Yu, M., Yi, Y., Rexford, J., et al., 2008. Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Comput. Commun. Rev., 32(2): 17\u201329. https:\/\/doi.org\/10.1145\/1355734.1355737","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"1184_CR24","first-page":"2408","volume-title":"Proc. IEEE Int. Conf. on Computer Communications","author":"S. Zhang","year":"2012","unstructured":"Zhang, S., Qian, Z., Wu, J., et al., 2012. An opportunistic resource sharing and topology-aware mapping framework for virtual networks. Proc. IEEE Int. Conf. on Computer Communications, p.2408\u20132416. https:\/\/doi.org\/10.1109\/INFCOM.2012.6195630"}],"container-title":["Frontiers of Information Technology & Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1601404\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1601404.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1601404.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T09:34:20Z","timestamp":1590572060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1601404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":24,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["1184"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1601404","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11]]},"assertion":[{"value":"http:\/\/orcid.org\/0000-0002-9770-6610","URL":"http","order":0,"name":"name","label":"Hong-chao HU","group":{"name":"orcid","label":"ORCID"}},{"value":"2016-07-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-11-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-11-24","order":2,"name":"crosschecked","label":"Crosschecked","group":{"name":"publication_history","label":"Publication History"}},{"value":"Article","order":0,"name":"content_type","group":{"name":"content_type","label":"Content Type"}},{"value":"\u00a9 Zhejiang University and Springer-Verlag GmbH Germany 2017","order":0,"name":"copyright","group":{"name":"copyright","label":"Copyright"}}]}}