{"id":"https://openalex.org/W4390394286","doi":"https://doi.org/10.1109/itnac59571.2023.10368533","title":"Using Intent Directed Acyclic Graphs in Multi-Domain IP-Optical Networks","display_name":"Using Intent Directed Acyclic Graphs in Multi-Domain IP-Optical Networks","publication_year":2023,"publication_date":"2023-11-29","ids":{"openalex":"https://openalex.org/W4390394286","doi":"https://doi.org/10.1109/itnac59571.2023.10368533"},"language":"en","primary_location":{"id":"doi:10.1109/itnac59571.2023.10368533","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/itnac59571.2023.10368533","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021839275","display_name":"Filippos Christou","orcid":null},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Filippos Christou","raw_affiliation_strings":["Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart,Stuttgart,Germany","Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart, Stuttgart, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart,Stuttgart,Germany","institution_ids":["https://openalex.org/I100066346"]},{"raw_affiliation_string":"Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart, Stuttgart, Germany","institution_ids":["https://openalex.org/I100066346"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031502396","display_name":"Andreas Kirst\u00e4dter","orcid":null},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Andreas Kirst\u00e4dter","raw_affiliation_strings":["Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart,Stuttgart,Germany","Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart, Stuttgart, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart,Stuttgart,Germany","institution_ids":["https://openalex.org/I100066346"]},{"raw_affiliation_string":"Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart, Stuttgart, Germany","institution_ids":["https://openalex.org/I100066346"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021839275"],"corresponding_institution_ids":["https://openalex.org/I100066346"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21462862,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"176","last_page":"179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10767","display_name":"Advanced Photonic Communication Systems","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7883022427558899},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.761265754699707},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.7129774689674377},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6701515913009644},{"id":"https://openalex.org/keywords/active-networking","display_name":"Active networking","score":0.5941870212554932},{"id":"https://openalex.org/keywords/directed-acyclic-graph","display_name":"Directed acyclic graph","score":0.5698510408401489},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5673486590385437},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5467619895935059},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.49650222063064575},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4735652208328247},{"id":"https://openalex.org/keywords/information-centric-networking","display_name":"Information-centric networking","score":0.420595645904541},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16167500615119934},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15952453017234802},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08152338862419128}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7883022427558899},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.761265754699707},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.7129774689674377},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6701515913009644},{"id":"https://openalex.org/C102665078","wikidata":"https://www.wikidata.org/wiki/Q4677571","display_name":"Active networking","level":2,"score":0.5941870212554932},{"id":"https://openalex.org/C74197172","wikidata":"https://www.wikidata.org/wiki/Q1195339","display_name":"Directed acyclic graph","level":2,"score":0.5698510408401489},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5673486590385437},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5467619895935059},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.49650222063064575},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4735652208328247},{"id":"https://openalex.org/C2777455782","wikidata":"https://www.wikidata.org/wiki/Q18208068","display_name":"Information-centric networking","level":3,"score":0.420595645904541},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16167500615119934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15952453017234802},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08152338862419128},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac59571.2023.10368533","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/itnac59571.2023.10368533","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1828530087","https://openalex.org/W2035378153","https://openalex.org/W2036302198","https://openalex.org/W2069508753","https://openalex.org/W2095073473","https://openalex.org/W2117771399","https://openalex.org/W2118404561","https://openalex.org/W2517406540","https://openalex.org/W2613070411","https://openalex.org/W3094143099","https://openalex.org/W3094749115","https://openalex.org/W4310717073","https://openalex.org/W4383473990","https://openalex.org/W6852310473"],"related_works":["https://openalex.org/W3134796105","https://openalex.org/W3185644559","https://openalex.org/W2883461750","https://openalex.org/W2077183195","https://openalex.org/W3172174732","https://openalex.org/W2009544506","https://openalex.org/W4229336722","https://openalex.org/W2307718269","https://openalex.org/W4250919833","https://openalex.org/W2592515839"],"abstract_inverted_index":{"The":[0],"global":[1],"internet":[2],"relies":[3],"on":[4],"a":[5,35,84,119],"well-coordinated":[6],"operation":[7,33,101],"of":[8,19,50,95,102],"distinct":[9],"networking":[10,15,40,64],"domains.":[11],"This":[12,66],"renders":[13],"multi-domain":[14,39,63,88],"at":[16],"the":[17,48,61,69,75,93],"heart":[18],"today's":[20],"massive":[21],"digital":[22],"information":[23],"exchange.":[24],"Although":[25],"Software-Defined":[26],"Networking":[27,71],"(SDN)":[28],"undoubtedly":[29],"helps":[30],"advance":[31,47],"network":[32],"within":[34],"single":[36],"organization,":[37],"non-centralized":[38,103],"has":[41],"received":[42],"less":[43],"attention.":[44],"To":[45],"significantly":[46],"state":[49],"networking,":[51],"we":[52,129],"are":[53],"inherently":[54],"bound":[55],"to":[56,82,99],"provide":[57],"progress":[58],"and":[59,74,111,132],"evolve":[60],"current":[62],"scheme.":[65],"work":[67],"exploits":[68],"Intent-Based":[70],"(IBN)":[72],"paradigm":[73],"Directed":[76],"Acyclic":[77],"Graphs":[78],"(DAGs)":[79],"data":[80],"structure":[81],"design":[83],"novel":[85,124],"architecture":[86],"for":[87,137],"IP-Optical":[89],"networking.":[90],"We":[91,114],"highlight":[92],"benefits":[94],"our":[96,123],"approach":[97,117],"leading":[98],"seamless":[100],"networks,":[104],"such":[105],"as":[106],"optically":[107],"transparent":[108],"domain":[109],"boundaries":[110],"cross-domain":[112],"grooming.":[113],"evaluate":[115],"this":[116],"in":[118],"realistic":[120],"scenario":[121],"using":[122],"open-source":[125],"tool":[126],"MINDFul.jl,":[127],"which":[128],"shortly":[130],"introduce":[131],"can":[133],"be":[134],"broadly":[135],"used":[136],"related":[138],"research.":[139]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
