{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:25:15Z","timestamp":1725603915587},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214431"},{"type":"electronic","value":"9783642214448"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21444-8_3","type":"book-chapter","created":{"date-parts":[[2011,9,6]],"date-time":"2011-09-06T15:08:00Z","timestamp":1315321680000},"page":"26-37","source":"Crossref","is-referenced-by-count":1,"title":["Revisiting the Impact of Traffic Engineering Techniques on the Internet\u2019s Routing Table"],"prefix":"10.1007","author":[{"given":"Pedro A. Aranda","family":"Guti\u00e9rrez","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"YouTube Hijacking: A RIPE NCC RIS case study, http:\/\/www.ripe.net\/news\/study-youtube-hijacking.html"},{"key":"3_CR2","unstructured":"INTERSECTION (INfrastructure for heTErogeneous, Resilient, SEcure, Complex, Tightly Inter-Operating Networks) (January 2008), http:\/\/www.intersection-project.eu\/ (last visit June 25, 2010)"},{"key":"3_CR3","first-page":"453","volume-title":"NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation","author":"H. Ballani","year":"2009","unstructured":"Ballani, H., Francis, P., Cao, T., Wang, J.: Making routers last longer with ViAggre. In: NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 453\u2013466. USENIX Association, Berkeley (2009)"},{"key":"3_CR4","unstructured":"Green, B.R., Smith, P.: CISCO - ISP Essentials. Cisco Press (September 2002)"},{"key":"3_CR5","unstructured":"Cisco Systems Inc. Interworking technology handbook"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Draves, R., King, C., Venkatachary, S., Zill, B.D.: Constructing optimal ip routing tables. In: Proc. IEEE INFOCOM, pp. 88\u201397 (1999)","DOI":"10.1109\/INFCOM.1999.749256"},{"key":"3_CR7","volume-title":"Proceedings of Hotnets 2009","author":"K. Fall","year":"2009","unstructured":"Fall, K., Iannaccone, G., Ratnasamy, S., Godfrey, P.B.: Routing Tables: Is Smaller Really Much Better? In: Proceedings of Hotnets 2009. ACM, New York (2009)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Vutukuru, M., Feamster, N., Balakrishnan, H.: Geographic locality of ip prefixes. In: IMC (2005)","DOI":"10.1145\/1330107.1330124"},{"key":"3_CR9","volume-title":"Computer Science","author":"H. Gredler","year":"2005","unstructured":"Gredler, H., Goralski, W.: The Complete IS-IS Routing Protocol. In: Computer Science. Springer, London (2005)"},{"key":"3_CR10","first-page":"277","volume-title":"Proc. of SIGCOMM 1999","author":"T.G. Griffin","year":"1999","unstructured":"Griffin, T.G., Wilfong, G.: An analysis of BGP convergence properties. In: Proc. of SIGCOMM 1999, pp. 277\u2013288. ACM Press, New York (1999)"},{"key":"3_CR11","unstructured":"Halabi, S.: Internet Routing Architectures, 2nd edn. Cisco Press (2000)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Hawkinson, J., Bates, T.: Guidelines for creation, selection, and registration of an Autonomous System (AS). RFC 1930 (Best Current Practice) (March 1996)","DOI":"10.17487\/rfc1930"},{"key":"3_CR13","unstructured":"Huston, G.: Analysing the Internet BGP Routing Table. The Internet Protocol Journal\u00a04(1) (2001)"},{"key":"3_CR14","volume-title":"BGP - Building Reliable Networks with the Border Gateway Protocol","author":"I. Beijnum van","year":"2002","unstructured":"van Beijnum, I.: BGP - Building Reliable Networks with the Border Gateway Protocol. O\u2019Reilly, Sebastopol (2002)"},{"key":"3_CR15","unstructured":"Kapela, A., Pilisov, A.: Stealing the Internet. DefCon August 16 (2008) (last visit, July 17, 2009)"},{"key":"3_CR16","unstructured":"Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., Zhang, L.: Phas: A prefix hijack alert system (2006)"},{"key":"3_CR17","unstructured":"Li, T., Fernando, R., Abley, J.: The AS_PATHLIMIT Path Attribute (2001), http:\/\/tools.ietf.org\/html\/draft-ietf-idr-as-pathlimit-03 (last visit: January 17, 2010)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Marques, P., Dupont, F.: Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing. RFC 2545 (Proposed Standard) (March 1999)","DOI":"10.17487\/rfc2545"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Muthukrishnan, K., Malis, A.: A Core MPLS IP VPN Architecture. RFC 2917 (Informational) (September 2000)","DOI":"10.17487\/rfc2917"},{"key":"3_CR20","unstructured":"Networks, J.: Examine BGP Routes and Route Selection in Juniper routers (last visit December 12, 2009)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T., Hares, S.: A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard) (January 2006)","DOI":"10.17487\/rfc4271"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s00453-002-1000-7","volume":"25","author":"S. Suri","year":"2003","unstructured":"Suri, S., Sandholm, T., Warkhede, P.: Compressing two-dimensional routing tables. Algorithmica\u00a025, 287\u2013300 (2003)","journal-title":"Algorithmica"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Networks and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21444-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T23:23:21Z","timestamp":1560554601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21444-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214431","9783642214448"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21444-8_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}