{"id":"https://openalex.org/W2138802567","doi":"https://doi.org/10.1109/infcom.2003.1208690","title":"On bandwidth efficiency of the hose resource management model in virtual private networks","display_name":"On bandwidth efficiency of the hose resource management model in virtual private networks","publication_year":2004,"publication_date":"2004-03-02","ids":{"openalex":"https://openalex.org/W2138802567","doi":"https://doi.org/10.1109/infcom.2003.1208690","mag":"2138802567"},"language":"en","primary_location":{"id":"doi:10.1109/infcom.2003.1208690","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2003.1208690","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015865321","display_name":"Alp\u00e1r J\u00fcttner","orcid":null},"institutions":[{"id":"https://openalex.org/I106118109","display_name":"E\u00f6tv\u00f6s Lor\u00e1nd University","ror":"https://ror.org/01jsq2704","country_code":"HU","type":"education","lineage":["https://openalex.org/I106118109"]},{"id":"https://openalex.org/I4210131589","display_name":"Ericsson (Hungary)","ror":"https://ror.org/03c0yyz21","country_code":"HU","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210131589"]}],"countries":["HU"],"is_corresponding":true,"raw_author_name":"A. Juttner","raw_affiliation_strings":["Computer Networks Laboratory, E\u00f6tv\u00f6s University, Budapest, Hungary","Ericsson Research, Traffic Analysis and Network Performance Laboratory, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"Computer Networks Laboratory, E\u00f6tv\u00f6s University, Budapest, Hungary","institution_ids":["https://openalex.org/I106118109"]},{"raw_affiliation_string":"Ericsson Research, Traffic Analysis and Network Performance Laboratory, Budapest, Hungary","institution_ids":["https://openalex.org/I4210131589"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031441479","display_name":"Istv\u00e1n Szab\u00f3","orcid":"https://orcid.org/0000-0002-3954-799X"},"institutions":[{"id":"https://openalex.org/I4210131589","display_name":"Ericsson (Hungary)","ror":"https://ror.org/03c0yyz21","country_code":"HU","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210131589"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"I. Szabo","raw_affiliation_strings":["Ericsson Research, Traffic Analysis and Network Performance Laboratory, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"Ericsson Research, Traffic Analysis and Network Performance Laboratory, Budapest, Hungary","institution_ids":["https://openalex.org/I4210131589"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026521187","display_name":"\u00c1. Szentesi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131589","display_name":"Ericsson (Hungary)","ror":"https://ror.org/03c0yyz21","country_code":"HU","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210131589"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"A. Szentesi","raw_affiliation_strings":["Ericsson Research, Traffic Analysis and Network Performance Laboratory, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"Ericsson Research, Traffic Analysis and Network Performance Laboratory, Budapest, Hungary","institution_ids":["https://openalex.org/I4210131589"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015865321"],"corresponding_institution_ids":["https://openalex.org/I106118109","https://openalex.org/I4210131589"],"apc_list":null,"apc_paid":null,"fwci":7.8797,"has_fulltext":false,"cited_by_count":91,"citation_normalized_percentile":{"value":0.97557934,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"1","issue":null,"first_page":"386","last_page":"395"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.8911399245262146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7495625019073486},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6535390019416809},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.6413179636001587},{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.5682550668716431},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5440191626548767},{"id":"https://openalex.org/keywords/linear-programming","display_name":"Linear programming","score":0.500399112701416},{"id":"https://openalex.org/keywords/network-model","display_name":"Network model","score":0.46777740120887756},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.45692679286003113},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4210498332977295},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38124319911003113},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18509897589683533},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11264273524284363},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1082187294960022}],"concepts":[{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.8911399245262146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7495625019073486},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6535390019416809},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.6413179636001587},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.5682550668716431},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5440191626548767},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.500399112701416},{"id":"https://openalex.org/C104122410","wikidata":"https://www.wikidata.org/wiki/Q1416406","display_name":"Network model","level":2,"score":0.46777740120887756},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.45692679286003113},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4210498332977295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38124319911003113},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18509897589683533},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11264273524284363},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1082187294960022},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infcom.2003.1208690","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2003.1208690","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1639032689","https://openalex.org/W2005228957","https://openalex.org/W2068811470","https://openalex.org/W2115380905","https://openalex.org/W2123138012","https://openalex.org/W2143213750","https://openalex.org/W2152150600","https://openalex.org/W2155659292","https://openalex.org/W2161310377","https://openalex.org/W2170595412","https://openalex.org/W2248064281","https://openalex.org/W2339500526","https://openalex.org/W2904250082","https://openalex.org/W3023540311","https://openalex.org/W4212899374","https://openalex.org/W4247255165"],"related_works":["https://openalex.org/W2017432143","https://openalex.org/W1973694374","https://openalex.org/W2983574358","https://openalex.org/W2370475531","https://openalex.org/W4385924768","https://openalex.org/W4256551238","https://openalex.org/W2610550183","https://openalex.org/W2258161702","https://openalex.org/W2521803028","https://openalex.org/W2166432012"],"abstract_inverted_index":{"The":[0,68,124],"hose":[1,53,109,136,163],"resource":[2,104],"provisioning":[3,30,155],"model":[4,54,63,110,164],"promises":[5],"to":[6,35],"provide":[7],"an":[8],"easy-to-use":[9],"characterization":[10],"framework":[11],"for":[12,29,47,102,121,134],"virtual":[13],"private":[14],"network":[15,90,93,159],"service":[16],"offerings.":[17],"Significant":[18],"research":[19],"effort":[20],"has":[21,64],"recently":[22],"been":[23,66],"spent":[24],"on":[25,51,59,107,161],"proposing":[26],"new":[27,37],"algorithms":[28],"cost-optimal":[31],"networks":[32,48,56],"specified":[33],"according":[34],"this":[36,72,122],"model.":[38],"However,":[39],"a":[40,75,87,113,131,156],"detailed":[41,76],"comparison":[42,77],"of":[43,71,78,82,89,130,154],"the":[44,52,60,79,83,108,128,135,147,152,162],"bandwidth":[45,80],"requirement":[46],"designed":[49,57],"based":[50,58,106,116,137,160],"and":[55,92],"traditional":[61],"pipe":[62],"not":[65],"performed.":[67],"first":[69],"contribution":[70,126],"paper":[73],"is":[74,118,127,142],"needs":[81],"two":[84,148],"models":[85,149],"assuming":[86],"range":[88],"sizes":[91],"topologies.":[94],"This":[95,139],"numerical":[96],"evaluation":[97],"required":[98],"efficient":[99],"calculation":[100,129],"methods":[101],"determining":[103],"allocation":[105],"parameters,":[111],"therefore,":[112],"linear":[114],"programming":[115],"formulation":[117],"also":[119],"presented":[120],"purpose.":[123],"second":[125],"lower":[132,140],"bound":[133,141],"realization.":[138],"very":[143],"useful":[144],"in":[145,171],"evaluating":[146],"given":[150],"that":[151],"problem":[153],"minimal":[157],"cost":[158],"specification":[165],"can":[166],"only":[167],"approximately":[168],"be":[169],"solved":[170],"polynomial":[172],"time.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
