{"id":"https://openalex.org/W2254680206","doi":"https://doi.org/10.17487/rfc5089","title":"IS-IS Protocol Extensions for Path Computation Element (PCE) Discovery","display_name":"IS-IS Protocol Extensions for Path Computation Element (PCE) Discovery","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2254680206","doi":"https://doi.org/10.17487/rfc5089","mag":"2254680206"},"language":"en","primary_location":{"id":"doi:10.17487/rfc5089","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc5089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060227869","display_name":"Y. Ikejiri","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Y. Ikejiri","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100439309","display_name":"Ran Zhang","orcid":"https://orcid.org/0009-0007-5973-5692"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Zhang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060227869"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9312000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9312000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9269000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9039000272750854,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6590582728385925},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.6163476705551147},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6088216304779053},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5776805877685547},{"id":"https://openalex.org/keywords/element","display_name":"Element (criminal law)","score":0.4612601697444916},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38024190068244934},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.35946494340896606},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2621687054634094},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17146983742713928},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.05757531523704529},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.05060899257659912}],"concepts":[{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6590582728385925},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.6163476705551147},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6088216304779053},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5776805877685547},{"id":"https://openalex.org/C200288055","wikidata":"https://www.wikidata.org/wiki/Q2621792","display_name":"Element (criminal law)","level":2,"score":0.4612601697444916},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38024190068244934},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.35946494340896606},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2621687054634094},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17146983742713928},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.05757531523704529},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.05060899257659912},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc5089","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc5089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W99496319","https://openalex.org/W1744779065","https://openalex.org/W2115335143","https://openalex.org/W2197330806","https://openalex.org/W2232720325","https://openalex.org/W2275815772","https://openalex.org/W2281401079","https://openalex.org/W2286743186","https://openalex.org/W2297396720"],"related_works":["https://openalex.org/W4231775656","https://openalex.org/W2380000090","https://openalex.org/W2374797863","https://openalex.org/W2383646825","https://openalex.org/W2371018915","https://openalex.org/W2183638083","https://openalex.org/W2119138398","https://openalex.org/W2037384153","https://openalex.org/W2598979711","https://openalex.org/W2306351532"],"abstract_inverted_index":{"There":[0],"are":[1],"various":[2],"circumstances":[3],"where":[4],"it":[5],"is":[6,42],"highly":[7],"desirable":[8],"for":[9,37,89],"a\nPath":[10],"Computation":[11,25],"Client":[12],"(PCC)":[13],"to":[14,17,67,80,84],"be":[15,32],"able":[16],"dynamically":[18],"and\nautomatically":[19],"discover":[20],"a":[21,43,56,62],"set":[22],"of":[23,70,92],"Path":[24],"Elements":[26],"(PCEs),\nalong":[27],"with":[28],"information":[29],"that":[30,75],"can":[31],"used":[33],"by":[34],"the":[35,40,60,81,90,101],"PCC":[36],"PCE":[38,41,93],"selection.\nWhen":[39],"Label":[44],"Switching":[45],"Router":[46],"(LSR)":[47],"participating":[48],"in":[49,59],"the\nInterior":[50],"Gateway":[51],"Protocol":[52],"(IGP),":[53],"or":[54,99],"even":[55],"server":[57],"participating\npassively":[58],"IGP,":[61],"simple":[63],"and":[64],"efficient":[65],"way":[66],"announce":[68],"PCEs\nconsists":[69],"using":[71],"IGP":[72],"flooding.":[73],"For":[74],"purpose,":[76],"this":[77],"document\ndefines":[78],"extensions":[79],"Intermediate":[82,85],"System":[83],"System\n(IS-IS)":[86],"routing":[87],"protocol":[88],"advertisement":[91],"Discovery\ninformation":[94],"within":[95,100],"an":[96],"IS-IS":[97,103],"area":[98],"entire":[102],"routing\ndomain.":[104],"[STANDARDS-TRACK]":[105]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
