{"id":"https://openalex.org/W2052806256","doi":"https://doi.org/10.1109/ifipnetworking.2014.6857095","title":"Policy-compliant virtual network embedding","display_name":"Policy-compliant virtual network embedding","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2052806256","doi":"https://doi.org/10.1109/ifipnetworking.2014.6857095","mag":"2052806256"},"language":"en","primary_location":{"id":"doi:10.1109/ifipnetworking.2014.6857095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ifipnetworking.2014.6857095","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IFIP Networking Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002854630","display_name":"David Dietrich","orcid":"https://orcid.org/0000-0002-5558-2090"},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"David Dietrich","raw_affiliation_strings":["Leibniz Universitat Hannover, Hannover, Niedersachsen, DE","Inst. of Commun. Technol., Leibniz Univ. Hannover, Hannover, Germany"],"affiliations":[{"raw_affiliation_string":"Leibniz Universitat Hannover, Hannover, Niedersachsen, DE","institution_ids":[]},{"raw_affiliation_string":"Inst. of Commun. Technol., Leibniz Univ. Hannover, Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057744054","display_name":"Panagiotis Papadimitriou","orcid":"https://orcid.org/0000-0001-5005-8866"},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Panagiotis Papadimitriou","raw_affiliation_strings":["Leibniz Universitat Hannover, Hannover, Niedersachsen, DE","Inst. of Commun. Technol., Leibniz Univ. Hannover, Hannover, Germany"],"affiliations":[{"raw_affiliation_string":"Leibniz Universitat Hannover, Hannover, Niedersachsen, DE","institution_ids":[]},{"raw_affiliation_string":"Inst. of Commun. Technol., Leibniz Univ. Hannover, Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002854630"],"corresponding_institution_ids":["https://openalex.org/I114112103"],"apc_list":null,"apc_paid":null,"fwci":1.0344,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.80039304,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"55","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revenue","display_name":"Revenue","score":0.7102380394935608},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.675728440284729},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6636659502983093},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6258046627044678},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.4689849019050598},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.46703311800956726},{"id":"https://openalex.org/keywords/network-virtualization","display_name":"Network virtualization","score":0.4609200954437256},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.45780181884765625},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43168550729751587},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4172388017177582},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4119744300842285},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2133767008781433},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20149469375610352},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.12668848037719727},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10864421725273132},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10623210668563843}],"concepts":[{"id":"https://openalex.org/C195487862","wikidata":"https://www.wikidata.org/wiki/Q850210","display_name":"Revenue","level":2,"score":0.7102380394935608},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.675728440284729},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6636659502983093},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6258046627044678},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.4689849019050598},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.46703311800956726},{"id":"https://openalex.org/C2779898492","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Network virtualization","level":4,"score":0.4609200954437256},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.45780181884765625},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43168550729751587},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4172388017177582},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4119744300842285},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2133767008781433},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20149469375610352},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.12668848037719727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10864421725273132},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10623210668563843},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ifipnetworking.2014.6857095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ifipnetworking.2014.6857095","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IFIP Networking Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1606007663","https://openalex.org/W1843509127","https://openalex.org/W1990259429","https://openalex.org/W2030793839","https://openalex.org/W2107589467","https://openalex.org/W2114298221","https://openalex.org/W2114716177","https://openalex.org/W2125150972","https://openalex.org/W2142547489","https://openalex.org/W2147118406","https://openalex.org/W2148322931","https://openalex.org/W2150944886","https://openalex.org/W2152415706","https://openalex.org/W2155250574","https://openalex.org/W2161965229","https://openalex.org/W2169033825","https://openalex.org/W6636279949"],"related_works":["https://openalex.org/W1974496971","https://openalex.org/W2606336747","https://openalex.org/W2128291817","https://openalex.org/W1971175048","https://openalex.org/W2766546449","https://openalex.org/W2787824175","https://openalex.org/W2963506123","https://openalex.org/W3124910860","https://openalex.org/W2602555740","https://openalex.org/W1639136369"],"abstract_inverted_index":{"Virtual":[0],"network":[1,10,16],"embedding":[2,45],"algorithms":[3],"that":[4,77],"optimize":[5],"the":[6,22,34,81,85,91,112,125,133],"mapping":[7],"of":[8,24,38,94,127,135],"virtual":[9],"(VN)":[11],"topologies":[12],"onto":[13],"a":[14,39,66,73,101],"substrate":[15,25],"usually":[17],"do":[18],"not":[19],"comply":[20],"with":[21,118],"policies":[23],"providers":[26],"which":[27],"may":[28],"prefer":[29],"to":[30,69,90,103],"identify":[31],"and":[32,115,131,142],"embed":[33],"most":[35,95],"profitable":[36],"subset":[37],"VN":[40,44],"request.":[41],"Such":[42],"policy-based":[43],"(VNE)":[46],"is":[47],"required":[48],"by":[49,57,71],"distributed":[50],"VNE":[51,59,70,75,96,129],"architectures,":[52],"such":[53],"as":[54],"PolyVine,":[55],"or":[56],"auction-based":[58],"environments.":[60],"In":[61,88],"this":[62],"paper,":[63],"we":[64],"introduce":[65],"policy":[67,137],"dimension":[68],"proposing":[72],"new":[74],"algorithm":[76,99,130],"aims":[78],"at":[79],"maximizing":[80],"revenue":[82,106,110],"without":[83],"violating":[84],"provider's":[86],"policy.":[87],"contrast":[89],"greedy":[92],"nature":[93],"techniques,":[97],"our":[98,128],"allows":[100],"provider":[102],"trade":[104],"short-term":[105],"gains":[107],"for":[108],"higher":[109],"in":[111],"long":[113],"term":[114],"cope":[116],"better":[117],"evolving":[119],"demands.":[120],"Our":[121],"simulation":[122],"results":[123],"corroborate":[124],"efficiency":[126],"show":[132],"impact":[134],"diverse":[136],"adjustments":[138],"on":[139],"resource":[140],"utilization":[141],"generated":[143],"revenue.":[144]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
