{"id":"https://openalex.org/W2786570539","doi":"https://doi.org/10.1109/pimrc.2017.8292258","title":"Multiple service function chaining under load balance in SDN/NFV networks","display_name":"Multiple service function chaining under load balance in SDN/NFV networks","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2786570539","doi":"https://doi.org/10.1109/pimrc.2017.8292258","mag":"2786570539"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc.2017.8292258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037705126","display_name":"Faqiang Liu","orcid":"https://orcid.org/0000-0002-2236-0539"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Faqiang Liu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019736036","display_name":"Xin Chen","orcid":"https://orcid.org/0000-0002-6432-3824"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Chen","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016162807","display_name":"Wei An","orcid":"https://orcid.org/0000-0002-0760-1357"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei An","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106551871","display_name":"Yong Peng","orcid":"https://orcid.org/0000-0001-5803-7437"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Peng","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050799186","display_name":"Jiuyue Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiuyue Cao","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111905427","display_name":"Yan Zhang","orcid":"https://orcid.org/0000-0002-2168-9674"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Zhang","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037705126"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.25121799,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chaining","display_name":"Chaining","score":0.9724448919296265},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.803242564201355},{"id":"https://openalex.org/keywords/network-functions-virtualization","display_name":"Network Functions Virtualization","score":0.799403190612793},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6340748071670532},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6083868741989136},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5427953600883484},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5387824773788452},{"id":"https://openalex.org/keywords/shortest-path-problem","display_name":"Shortest path problem","score":0.529466986656189},{"id":"https://openalex.org/keywords/network-service","display_name":"Network service","score":0.49185848236083984},{"id":"https://openalex.org/keywords/load-balancing","display_name":"Load balancing (electrical power)","score":0.44782721996307373},{"id":"https://openalex.org/keywords/dijkstras-algorithm","display_name":"Dijkstra's algorithm","score":0.44624418020248413},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4215608835220337},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3802412450313568},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.3801535964012146},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.23230165243148804},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.22254186868667603},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10429203510284424}],"concepts":[{"id":"https://openalex.org/C49020025","wikidata":"https://www.wikidata.org/wiki/Q1059099","display_name":"Chaining","level":2,"score":0.9724448919296265},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.803242564201355},{"id":"https://openalex.org/C200789330","wikidata":"https://www.wikidata.org/wiki/Q7000834","display_name":"Network Functions Virtualization","level":3,"score":0.799403190612793},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6340748071670532},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6083868741989136},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5427953600883484},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5387824773788452},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.529466986656189},{"id":"https://openalex.org/C2779618445","wikidata":"https://www.wikidata.org/wiki/Q1640628","display_name":"Network service","level":2,"score":0.49185848236083984},{"id":"https://openalex.org/C138959212","wikidata":"https://www.wikidata.org/wiki/Q1806783","display_name":"Load balancing (electrical power)","level":3,"score":0.44782721996307373},{"id":"https://openalex.org/C173870130","wikidata":"https://www.wikidata.org/wiki/Q8548","display_name":"Dijkstra's algorithm","level":4,"score":0.44624418020248413},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4215608835220337},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3802412450313568},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3801535964012146},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.23230165243148804},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.22254186868667603},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10429203510284424},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc.2017.8292258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1516035587","https://openalex.org/W1823841943","https://openalex.org/W2012198968","https://openalex.org/W2018377390","https://openalex.org/W2123372830","https://openalex.org/W2138743329","https://openalex.org/W2142224489","https://openalex.org/W2147118406","https://openalex.org/W2202294430","https://openalex.org/W2401610261","https://openalex.org/W2947162011","https://openalex.org/W4248429016","https://openalex.org/W6687889994"],"related_works":["https://openalex.org/W2592088184","https://openalex.org/W2477318936","https://openalex.org/W2615184401","https://openalex.org/W2611990263","https://openalex.org/W3028301851","https://openalex.org/W2910464852","https://openalex.org/W2779129381","https://openalex.org/W3009834248","https://openalex.org/W4377699785","https://openalex.org/W2774304826"],"abstract_inverted_index":{"Service":[0],"Function":[1],"Chaining":[2],"(SFC)":[3],"has":[4],"received":[5],"considerable":[6],"attentions":[7],"due":[8],"to":[9],"its":[10],"potential":[11],"in":[12,40],"improving":[13],"the":[14,49,64,71,100,114,117],"flexibility":[15],"and":[16,23,56,69,113,119],"efficiency":[17,120],"of":[18,63,104,121],"networks.":[19,42],"Software-Defined":[20],"Networking":[21],"(SDN)":[22],"Network":[24],"Functions":[25],"Virtualization":[26],"(NFV)":[27],"bring":[28],"new":[29],"opportunities":[30],"for":[31,52,75,91,96],"flexibly":[32],"implementing":[33],"SFCs":[34,98],"by":[35,78],"dynamically":[36],"composing":[37],"network":[38],"functions":[39],"SDN/NFV":[41],"In":[43],"this":[44,58],"paper,":[45],"we":[46,86],"first":[47],"introduce":[48],"SFC":[50,77],"instantiation":[51],"a":[53,61,80,88],"single":[54],"path":[55,74],"formulate":[57],"procedure":[59],"as":[60],"model":[62],"Shortest":[65],"Path":[66],"Tour":[67],"Problem,":[68],"find":[70],"minimum":[72,93],"delay":[73,94],"an":[76],"exploiting":[79],"constructed":[81],"auxiliary":[82],"multistage":[83],"graph.":[84],"Next,":[85],"present":[87],"polynomial-time":[89],"algorithm":[90],"finding":[92],"paths":[95],"multiple":[97],"under":[99],"load":[101],"balance":[102],"constraint":[103],"link":[105],"utilization.":[106],"Finally,":[107],"some":[108],"experiments":[109],"are":[110],"carried":[111],"out":[112],"results":[115],"show":[116],"effectiveness":[118],"our":[122],"proposed":[123],"method.":[124]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
