{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:53:03Z","timestamp":1743054783396,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540212508"},{"type":"electronic","value":"9783540247159"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24715-9_11","type":"book-chapter","created":{"date-parts":[[2010,7,28]],"date-time":"2010-07-28T00:14:53Z","timestamp":1280276093000},"page":"115-126","source":"Crossref","is-referenced-by-count":3,"title":["DataRouter: A Network-Layer Service for Application-Layer Forwarding"],"prefix":"10.1007","author":[{"given":"Joseph D.","family":"Touch","sequence":"first","affiliation":[]},{"given":"Venkata K.","family":"Pingali","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Adjie-Winoto, W., et al.: The Design and Implementation of an Intentional Naming System. In: Proc. ACM SOSP (OS Review, V34 N5), December 1999, pp. 186\u2013201 (1999)","DOI":"10.1145\/319151.319164"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Baker, F.: Requirements for IP Version 4 Routers. RFC1812 (June 1995)","DOI":"10.17487\/rfc1812"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Borman, D., Hinden, R., Deering, S.: IPv6 Jumbograms. RFC 2675 (August 1999)","DOI":"10.17487\/rfc2675"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Braden, R. (ed.): Requirements for Internet Hosts \u2013 Application and Support. RFC 1123 (October 1989)","DOI":"10.17487\/rfc1123"},{"key":"#cr-split#-11_CR5.1","doi-asserted-by":"crossref","unstructured":"Braden, R., Faber, T., Handley, M.: From Protocol Stack to Protocol Heap ??? Role-Based Architecture. In: Proc. HotNets-I (October 2002);","DOI":"10.1145\/774763.774765"},{"key":"#cr-split#-11_CR5.2","doi-asserted-by":"crossref","unstructured":"ACM CCR, January 2003, pp. 17???22 (2002)","DOI":"10.1108\/09504120310473425"},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1145\/214419.214420","volume":"4","author":"N. Carriero","year":"1986","unstructured":"Carriero, N., Gelernter, D.: The S\/Net\u2019s Linda Kernel. ACM Transactions on Computer Systems (TOCS)\u00a04(2), 110\u2013129 (1986)","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Carzaniga, A., Wolf, A.L.: Forwarding in a Content-Based Network. In: Proc. Sigcomm 2003, August 2003, pp. 163\u2013174 (2003)","DOI":"10.1145\/863955.863975"},{"key":"11_CR8","unstructured":"Cerf, V.: The Catanet Model for Internetworking. IEN 48 (July 1978)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Chandranmenon, G.P., Varghese, G.: Trading packet headers for packet processing. In: Proc. Sigcomm, August 1995, pp. 162\u2013173 (1995)","DOI":"10.1145\/217382.217427"},{"key":"11_CR10","unstructured":"Cheriton, D., Gritter, M.: TRIAD: A Scalable Deployable NAT-based Internet Architecture, Stanford Computer Science Technical Report (January 2000)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6). RFC 2460 (December 1998)","DOI":"10.17487\/rfc2460"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/179606.179627","volume":"37","author":"H. Eriksson","year":"1994","unstructured":"Eriksson, H.: MBone: The Multicast Backbone. Communications of the ACM\u00a037, 54\u201360 (1994)","journal-title":"Communications of the ACM"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Francis, P., Gummadi, R.: IPNL: A NAT-Extended Internet Architecture. In: Proc. Sigcomm 2001, August 2001, pp. 69\u201380 (2001)","DOI":"10.1145\/964723.383065"},{"key":"11_CR14","unstructured":"FreeBSD man pages, e.g., http:\/\/www.freebsd.org\/"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Johnson, D., Deering, S.: Reserved IPv6 Subnet Anycast Addresses. RFC 2526 (March 1999)","DOI":"10.17487\/rfc2526"},{"key":"11_CR16","unstructured":"Moskowitz, R., Nikander, P.: Host Identity Payload Architecture (April 2003) (work in progress)"},{"volume-title":"Peer-To-Peer: Harnessing the Power of Disruptive Technologies","year":"2001","key":"11_CR17","unstructured":"Oram, A. (ed.): Peer-To-Peer: Harnessing the Power of Disruptive Technologies. O\u2019Reilly & Associates, Sebastopol (2001)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Postel, J. (ed.): Internet Protocol. RFC 971 (September 1981)","DOI":"10.17487\/rfc0791"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Karp, R., Francis, P., Handley, M., Shenker, S.: A Scalable Content-Addressable Network. In: Proc. Sigcomm 2001, August 2001, pp. 161\u2013172 (2001)","DOI":"10.1145\/383059.383072"},{"key":"11_CR20","unstructured":"Regexp Unix Manual Pages (June 1993)"},{"issue":"4","key":"11_CR21","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/357401.357402","volume":"2","author":"J. Saltzer","year":"1984","unstructured":"Saltzer, J., Reed, D., Clark, D.: End-To-End Arguments in System Design. ACM Transactions on Computer Systems\u00a02(4), 277\u2013288 (1984)","journal-title":"ACM Transactions on Computer Systems"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Stoica, I., Adkins, D., Zhuang, S., Shener, S., Surana, S.: Internet Indirection Infrastructure. In: Proc. Sigcomm, August 2002, pp. 73\u201386 (2002)","DOI":"10.1145\/633025.633033"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Stoica, I., et al.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: Proc. Sigcomm, August 2001, pp. 149\u2013160 (2001)","DOI":"10.1145\/383059.383071"},{"issue":"1","key":"11_CR24","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/35.568214","volume":"35","author":"D. Tennenhouse","year":"1997","unstructured":"Tennenhouse, D., Smith, J., Sincoskie, W., Wetherall, D., Minden, G.: A Survey of Active Network Research. IEEE Comm. Magazine\u00a035(1), 80\u201386 (1997)","journal-title":"IEEE Comm. Magazine"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Touch, J.: Dynamic Internet Overlay Deployment and Management Using the X-Bone. Computer Networks, 117\u2013135 (July 2001)","DOI":"10.1016\/S1389-1286(01)00172-4"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Touch, J., Pingali, V.: DataRouter: A Network-Layer Service for Application-Layer Forwarding. ISI Technical Report ISI-TR-2003-578 (May 2003)","DOI":"10.1007\/978-3-540-24715-9_11"},{"key":"#cr-split#-11_CR27.1","unstructured":"Tschudin, C., Gold, R.: Network Pointers. In: Proc. ACM HotNets-I (October 2002);"},{"key":"#cr-split#-11_CR27.2","unstructured":"ACM CCR, January 2003, pp. 23???28 (2003)"}],"container-title":["Lecture Notes in Computer Science","Active Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24715-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T11:06:37Z","timestamp":1685703997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24715-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540212508","9783540247159"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24715-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}