{"id":"https://openalex.org/W2111725442","doi":"https://doi.org/10.1109/icumt.2012.6459757","title":"Heuristic methods for shared backup path protection planning","display_name":"Heuristic methods for shared backup path protection planning","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2111725442","doi":"https://doi.org/10.1109/icumt.2012.6459757","mag":"2111725442"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt.2012.6459757","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085760806","display_name":"J\u00f8rgen Thorlund Haahr","orcid":null},"institutions":[{"id":"https://openalex.org/I124055696","display_name":"University of Copenhagen","ror":"https://ror.org/035b05819","country_code":"DK","type":"education","lineage":["https://openalex.org/I124055696"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Jorgen Thorlund Haahr","raw_affiliation_strings":["Department of Computer Science, University of Copenhagen, DK-2100, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Copenhagen, DK-2100, Denmark","institution_ids":["https://openalex.org/I124055696"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020661288","display_name":"Thomas Stidsen","orcid":"https://orcid.org/0000-0001-6905-5454"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Thomas Stidsen","raw_affiliation_strings":["DTU Management Engineering, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark"],"affiliations":[{"raw_affiliation_string":"DTU Management Engineering, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057902603","display_name":"Martin Zachariasen","orcid":"https://orcid.org/0000-0002-2329-3606"},"institutions":[{"id":"https://openalex.org/I124055696","display_name":"University of Copenhagen","ror":"https://ror.org/035b05819","country_code":"DK","type":"education","lineage":["https://openalex.org/I124055696"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Martin Zachariasen","raw_affiliation_strings":["Department of Computer Science, University of Copenhagen, DK-2100, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Copenhagen, DK-2100, Denmark","institution_ids":["https://openalex.org/I124055696"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.346,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":8,"citation_normalized_percentile":{"value":0.556111,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":null,"issue":null,"first_page":"712","last_page":"718"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9958,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.72018415}],"concepts":[{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.93036675},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.75224566},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7435679},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.72018415},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.6091405},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5647449},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48661098},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.37176186},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33580184},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3321657},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13720939},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07908934},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07275885},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt.2012.6459757","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":26,"referenced_works":["https://openalex.org/W111740604","https://openalex.org/W1531977215","https://openalex.org/W1554727768","https://openalex.org/W1559215823","https://openalex.org/W1797155250","https://openalex.org/W1798824245","https://openalex.org/W1965276575","https://openalex.org/W1995131613","https://openalex.org/W2047900282","https://openalex.org/W2059476984","https://openalex.org/W2101346233","https://openalex.org/W2107223112","https://openalex.org/W2119433111","https://openalex.org/W2140252921","https://openalex.org/W2155061423","https://openalex.org/W2161066687","https://openalex.org/W2164057590","https://openalex.org/W2164878175","https://openalex.org/W2172061951","https://openalex.org/W2176703625","https://openalex.org/W2613070411","https://openalex.org/W2781894692","https://openalex.org/W4210463984","https://openalex.org/W4236423514","https://openalex.org/W4238780727","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4241986464","https://openalex.org/W2993266126","https://openalex.org/W2955195711","https://openalex.org/W2939925694","https://openalex.org/W2829881200","https://openalex.org/W2392283887","https://openalex.org/W2354454611","https://openalex.org/W2351388597","https://openalex.org/W2184647741","https://openalex.org/W1974217798"],"abstract_inverted_index":{"Protecting":[0],"communication":[1,35],"networks":[2,84],"against":[3],"failures":[4,20,106],"is":[5,26,71,113,124],"becoming":[6],"increasingly":[7],"important":[8],"as":[9,57],"they":[10],"have":[11],"become":[12],"an":[13,114],"integrated":[14],"part":[15],"of":[16,167,177,184],"our":[17],"society.":[18],"Cable":[19],"are":[21,46,93,155],"fairly":[22],"common,":[23],"but":[24,74],"it":[25,123],"unacceptable":[27],"for":[28,36,97,143,173,188],"a":[29,39,72,182],"single":[30],"cable":[31],"failure":[32,66,99],"to":[33,50,103,126,157],"disconnect":[34],"more":[37,174],"than":[38,169,175,186],"few":[40],"seconds":[41],"-":[42],"hence":[43],"protection":[44,54,76],"schemes":[45,55],"employed.":[47],"In":[48,89],"contrast":[49],"manual":[51],"intervention,":[52],"automatic":[53],"such":[56],"Shared":[58],"Backup":[59],"Path":[60],"Protection":[61],"(SBPP)":[62],"can":[63,79],"recover":[64,104],"from":[65,105],"quickly":[67,107],"and":[68,108,118,139],"efficiently.":[69,109],"SBPP":[70,90,111,145],"simple":[73],"efficient":[75],"scheme":[77],"that":[78,122,151],"be":[80],"implemented":[81],"in":[82,95,101,130,162],"backbone":[83],"with":[85],"technology":[86],"available":[87],"today.":[88],"backup":[91],"paths":[92],"planned":[94],"advance":[96],"every":[98],"scenario":[100],"order":[102],"The":[110],"problem":[112,129],"NP-hard":[115],"optimization":[116],"problem,":[117],"previous":[119],"work":[120],"confirms":[121],"time-consuming":[125],"solve":[127],"the":[128,144,152,178,189],"practice":[131],"using":[132],"exact":[133],"methods.":[134],"We":[135],"present":[136],"heuristic":[137,153],"algorithms":[138,154],"lower":[140],"bound":[141],"methods":[142],"planning":[146],"problem.":[147],"Experimental":[148],"results":[149],"show":[150],"able":[156],"find":[158],"good":[159],"quality":[160],"solutions":[161],"minutes.":[163],"A":[164],"solution":[165],"gap":[166,183],"less":[168,185],"3.5%":[170],"was":[171],"achieved":[172],"half":[176],"benchmark":[179],"instances":[180],"(and":[181],"12%":[187],"remaining":[190],"instances.)":[191]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2111725442","counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2024-12-17T11:51:21.701280","created_date":"2016-06-24"}