{"id":"https://openalex.org/W2769620068","doi":"https://doi.org/10.1155/2017/5258010","title":"A Multidomain Survivable Virtual Network Mapping Algorithm","display_name":"A Multidomain Survivable Virtual Network Mapping Algorithm","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2769620068","doi":"https://doi.org/10.1155/2017/5258010","mag":"2769620068"},"language":"en","primary_location":{"id":"doi:10.1155/2017/5258010","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/5258010","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/5258010.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2017/5258010.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002002943","display_name":"Xiancui Xiao","orcid":"https://orcid.org/0000-0001-8115-8755"},"institutions":[{"id":"https://openalex.org/I28006308","display_name":"Shandong Normal University","ror":"https://ror.org/01wy3h363","country_code":"CN","type":"education","lineage":["https://openalex.org/I28006308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiancui Xiao","raw_affiliation_strings":["School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China","Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Jinan 250014, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China","institution_ids":["https://openalex.org/I28006308"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Jinan 250014, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049974611","display_name":"Xiangwei Zheng","orcid":"https://orcid.org/0000-0003-4873-4567"},"institutions":[{"id":"https://openalex.org/I28006308","display_name":"Shandong Normal University","ror":"https://ror.org/01wy3h363","country_code":"CN","type":"education","lineage":["https://openalex.org/I28006308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangwei Zheng","raw_affiliation_strings":["School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China","Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Jinan 250014, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China","institution_ids":["https://openalex.org/I28006308"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Jinan 250014, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101793600","display_name":"Yuang Zhang","orcid":"https://orcid.org/0000-0002-4702-3352"},"institutions":[{"id":"https://openalex.org/I28006308","display_name":"Shandong Normal University","ror":"https://ror.org/01wy3h363","country_code":"CN","type":"education","lineage":["https://openalex.org/I28006308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuang Zhang","raw_affiliation_strings":["School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China","Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Jinan 250014, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China","institution_ids":["https://openalex.org/I28006308"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Jinan 250014, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049974611"],"corresponding_institution_ids":["https://openalex.org/I28006308"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":3.9379,"has_fulltext":true,"cited_by_count":26,"citation_normalized_percentile":{"value":0.9452977,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"2017","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9062395095825195},{"id":"https://openalex.org/keywords/network-virtualization","display_name":"Network virtualization","score":0.7594815492630005},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.691867470741272},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.6832112669944763},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.6563141345977783},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6177088022232056},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5773341059684753},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5062779188156128},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.48191288113594055},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4411187767982483},{"id":"https://openalex.org/keywords/network-simulation","display_name":"Network simulation","score":0.4215855598449707},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.42046061158180237},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.4168175160884857},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.14758267998695374},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07861328125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9062395095825195},{"id":"https://openalex.org/C2779898492","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Network virtualization","level":4,"score":0.7594815492630005},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.691867470741272},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.6832112669944763},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.6563141345977783},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6177088022232056},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5773341059684753},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5062779188156128},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.48191288113594055},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4411187767982483},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.4215855598449707},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.42046061158180237},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.4168175160884857},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.14758267998695374},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07861328125},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2017/5258010","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/5258010","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/5258010.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6dbabd1fb380401d9001119942cc5f33","is_oa":true,"landing_page_url":"https://doaj.org/article/6dbabd1fb380401d9001119942cc5f33","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2017 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2017/5258010","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/5258010","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/5258010.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.5699999928474426,"id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G177410261","display_name":null,"funder_award_id":"61373149","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7921717826","display_name":null,"funder_award_id":"61672329","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2769620068.pdf","grobid_xml":"https://content.openalex.org/works/W2769620068.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1604805468","https://openalex.org/W1966600255","https://openalex.org/W1997154861","https://openalex.org/W2060898162","https://openalex.org/W2077827041","https://openalex.org/W2127095458","https://openalex.org/W2130267070","https://openalex.org/W2498757137","https://openalex.org/W2523637100","https://openalex.org/W2580670629","https://openalex.org/W2950441226"],"related_works":["https://openalex.org/W2128291817","https://openalex.org/W2606336747","https://openalex.org/W2766546449","https://openalex.org/W1971175048","https://openalex.org/W2963506123","https://openalex.org/W1639136369","https://openalex.org/W3124910860","https://openalex.org/W2602555740","https://openalex.org/W76894281","https://openalex.org/W3116863388"],"abstract_inverted_index":{"Although":[0],"the":[1,9,27,39,52,73,78,85,107,124,127,139,148,156],"existing":[2,14],"networks":[3,19,49,64,110,114],"are":[4,22],"more":[5,151],"often":[6],"deployed":[7],"in":[8,102],"multidomain":[10,28,100,142],"environment,":[11],"most":[12,35],"of":[13,55,77,126,141,163],"researches":[15],"focus":[16],"on":[17],"single-domain":[18,63],"and":[20,61,115,153],"there":[21],"no":[23],"appropriate":[24],"solutions":[25],"for":[26,58,72,119],"virtual":[29,93,108,120],"network":[30,41,56,79,94,103,144,149,157],"mapping":[31,95,101],"problem.":[32],"In":[33,81],"fact,":[34],"studies":[36],"assume":[37],"that":[38,98,133],"underlying":[40],"can":[42,135],"operate":[43],"without":[44],"any":[45],"interruption.":[46],"However,":[47],"physical":[48],"cannot":[50],"ensure":[51],"normal":[53],"provision":[54],"services":[57],"external":[59],"reasons":[60],"traditional":[62],"have":[65],"difficulties":[66],"to":[67,83,161],"meet":[68],"user":[69],"needs,":[70],"especially":[71],"high":[74],"security":[75],"requirements":[76],"transmission.":[80],"order":[82],"solve":[84],"above":[86],"problems,":[87],"this":[88],"paper":[89],"proposes":[90],"a":[91],"survivable":[92],"algorithm":[96],"(IntD-GRC-SVNE)":[97],"implements":[99],"virtualization.":[104],"IntD-GRC-SVNE":[105,134],"maps":[106],"communication":[109],"onto":[111],"different":[112],"domain":[113],"provides":[116],"backup":[117],"resources":[118],"links":[121],"which":[122],"improve":[123,138,155],"survivability":[125,140],"special":[128],"networks.":[129],"Simulation":[130],"results":[131],"show":[132],"not":[136],"only":[137],"communications":[143],"but":[145],"also":[146],"render":[147],"load":[150],"balanced":[152],"greatly":[154],"acceptance":[158],"rate":[159],"due":[160],"employment":[162],"GRC":[164],"(global":[165],"resource":[166],"capacity).":[167]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
