{"id":"https://openalex.org/W3095030372","doi":"https://doi.org/10.1109/mitp.2019.2953905","title":"A Linear Programming Model for Determining Distribution of User Sessions in a Voice Over Internet Protocol Network","display_name":"A Linear Programming Model for Determining Distribution of User Sessions in a Voice Over Internet Protocol Network","publication_year":2020,"publication_date":"2020-11-01","ids":{"openalex":"https://openalex.org/W3095030372","doi":"https://doi.org/10.1109/mitp.2019.2953905","mag":"3095030372"},"language":"en","primary_location":{"id":"doi:10.1109/mitp.2019.2953905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mitp.2019.2953905","pdf_url":null,"source":{"id":"https://openalex.org/S86192639","display_name":"IT Professional","issn_l":"1520-9202","issn":["1520-9202","1941-045X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006579802","display_name":"Vyacheslav Lemberg","orcid":"https://orcid.org/0000-0003-2690-4721"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vyacheslav Lemberg","raw_affiliation_strings":["U.S. Cellular"],"affiliations":[{"raw_affiliation_string":"U.S. Cellular","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069436542","display_name":"Michael Irizarry","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michael S. Irizarry","raw_affiliation_strings":["U.S. Cellular"],"affiliations":[{"raw_affiliation_string":"U.S. Cellular","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060600729","display_name":"Claudio Taglienti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Claudio Taglienti","raw_affiliation_strings":["U.S. Cellular"],"affiliations":[{"raw_affiliation_string":"U.S. Cellular","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006579802"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1027,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.43850058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"22","issue":"6","first_page":"97","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9634000062942505,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9634000062942505,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11499","display_name":"ICT Impact and Policies","score":0.9581000208854675,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9549999833106995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/failover","display_name":"Failover","score":0.9752007722854614},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.787456214427948},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6926915049552917},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.5800547003746033},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5556994080543518},{"id":"https://openalex.org/keywords/network-service","display_name":"Network service","score":0.46006906032562256},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.4528440535068512},{"id":"https://openalex.org/keywords/linear-programming","display_name":"Linear programming","score":0.41538023948669434},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3430190682411194},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1627180576324463},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10072708129882812}],"concepts":[{"id":"https://openalex.org/C109751979","wikidata":"https://www.wikidata.org/wiki/Q998767","display_name":"Failover","level":2,"score":0.9752007722854614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.787456214427948},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6926915049552917},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.5800547003746033},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5556994080543518},{"id":"https://openalex.org/C2779618445","wikidata":"https://www.wikidata.org/wiki/Q1640628","display_name":"Network service","level":2,"score":0.46006906032562256},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.4528440535068512},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.41538023948669434},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3430190682411194},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1627180576324463},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10072708129882812}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mitp.2019.2953905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mitp.2019.2953905","pdf_url":null,"source":{"id":"https://openalex.org/S86192639","display_name":"IT Professional","issn_l":"1520-9202","issn":["1520-9202","1941-045X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.46000000834465027,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W61703663","https://openalex.org/W1520070959","https://openalex.org/W2010997912","https://openalex.org/W2481108008"],"related_works":["https://openalex.org/W4301026628","https://openalex.org/W2606436249","https://openalex.org/W2371793191","https://openalex.org/W2914840859","https://openalex.org/W3170347216","https://openalex.org/W2345333718","https://openalex.org/W4384261745","https://openalex.org/W2507938119","https://openalex.org/W2536221600","https://openalex.org/W3095030372"],"abstract_inverted_index":{"Telecommunications":[0],"service":[1,107],"providers":[2],"build":[3],"highly":[4],"available":[5],"networks":[6,91],"using":[7],"equipment":[8,18,26,58],"redundancy":[9],"and":[10,105],"overload":[11],"protection":[12],"mechanisms.":[13],"However,":[14],"because":[15],"of":[16,43,54,71],"network":[17,25,49,57,74],"misconfiguration":[19],"or":[20],"a":[21,34,47,72,93,118],"natural":[22],"disaster,":[23],"the":[24,40,52,69,89,146,156,160],"failover":[27,59],"could":[28],"be":[29,85],"unsuccessful.":[30],"This":[31,133],"article":[32,111,142],"proposes":[33,143],"linear":[35,147],"programming":[36,148],"model":[37,63,83,149],"for":[38,87],"determining":[39],"optimal":[41],"distribution":[42],"user":[44],"sessions":[45],"in":[46,92,121,159],"commercial":[48,73],"such":[50],"that":[51,75,95,116],"impact":[53],"an":[55,152],"unsuccessful":[56],"is":[60,96,135],"minimal.":[61],"The":[62,81,110,141],"has":[64],"been":[65],"applied":[66],"successfully":[67],"during":[68],"design":[70],"supports":[76],"approximately":[77],"5":[78],"million":[79],"customers.":[80],"proposed":[82],"will":[84],"useful":[86],"managing":[88],"telecommunication":[90],"way":[94],"more":[97],"robust":[98],"to":[99,108,130,145],"catastrophic":[100],"failure,":[101],"providing":[102],"greater":[103],"security":[104],"better":[106],"users.":[109],"also":[112,136],"presents":[113],"quantitative":[114],"results":[115],"show":[117],"modest":[119],"increase":[120,158],"end-to-end":[122],"one-way":[123],"speech":[124],"transmission":[125],"delay":[126,134],"ranging":[127],"from":[128],"3.5":[129],"8.1":[131],"ms.":[132],"known":[137],"as":[138],"mouth-to-ear":[139,161],"delay.":[140,162],"improvements":[144],"by":[150],"putting":[151],"upper":[153],"limit":[154],"on":[155],"potential":[157]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
