iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/INFOCOM.2019.8737565
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:32:05Z","timestamp":1725766325147},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/infocom.2019.8737565","type":"proceedings-article","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T00:35:56Z","timestamp":1560818156000},"page":"1918-1926","source":"Crossref","is-referenced-by-count":57,"title":["RABA: Resource-Aware Backup Allocation For A Chain of Virtual Network Functions"],"prefix":"10.1109","author":[{"given":"Jiao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zenan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunyi","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Linquan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yunjie","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2723090"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919487"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523635"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787501"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1201\/b12536"},{"key":"ref16","first-page":"590","article-title":"Reliability evaluations of fault-tolerant systems based on neural networks","author":"cheng","year":"1994","journal-title":"International Symposium on Artificial Neural Networks"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0045-7825(01)00248-1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2008.2011854"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.08.043"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2785989.2786000"},{"key":"ref3","first-page":"161","article-title":"Remus: High availability via asynchronous virtual machine replication","author":"cully","year":"2008","journal-title":"USENIX NSDI"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057153"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2703080"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2017.7969152"},{"journal-title":"Protecting Mission-Critical Workloads with VMware Fault Tolerance","year":"2009","key":"ref2"},{"journal-title":"White Paper on Network Functions Virtualisation","year":"2012","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2531104"},{"key":"ref20","first-page":"424","article-title":"Using genetic algorithms in engineering design optimization with non-linear constraints","author":"powell","year":"1993","journal-title":"International Conference on Genetic Algorithms"},{"journal-title":"Ietf sfc wg","article-title":"Service function chaining use cases in data centers","year":"2015","author":"kumar","key":"ref22"},{"journal-title":"IETF","article-title":"Service function chaining use cases in mobile networks","year":"2015","author":"haeffner","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24777-7_16"},{"journal-title":"Amazon EC2 Instance Types","year":"0","key":"ref23"}],"event":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","start":{"date-parts":[[2019,4,29]]},"location":"Paris, France","end":{"date-parts":[[2019,5,2]]}},"container-title":["IEEE INFOCOM 2019 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8732929\/8737365\/08737565.pdf?arnumber=8737565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:15:48Z","timestamp":1657854948000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8737565\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":24,"URL":"http:\/\/dx.doi.org\/10.1109\/infocom.2019.8737565","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}