{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T00:57:34Z","timestamp":1771030654066,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T00:00:00Z","timestamp":1552867200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10922-019-09495-y","type":"journal-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T12:02:57Z","timestamp":1552910577000},"page":"998-1019","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Filter-Based Design of Pending Interest Table in Named Data Networking"],"prefix":"10.1007","volume":"27","author":[{"given":"Roaa","family":"Shubbar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4110-6824","authenticated-orcid":false,"given":"Mahmood","family":"Ahmadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,18]]},"reference":[{"key":"9495_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2015.02.001","volume":"52","author":"AV Vasilakos","year":"2015","unstructured":"Vasilakos, A.V., Li, Z., Simon, G., Yo, W.: Information centric network: research challenges and opportunities. J. Netw. Comput. Appl. 52, 1\u201310 (2015)","journal-title":"J. Netw. Comput. Appl."},{"key":"9495_CR2","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: ACM CoNEXT 2009, pp. 1\u201312, December (2009)","DOI":"10.1145\/1658939.1658941"},{"key":"9495_CR3","unstructured":"Zhang, L., Estrin, D., Burke, J., Jacobson, V., Thornton, J.D., Smetters, D.K., Zhang, B., Tsudik, G., Claffy, K., Krioukov, D., Massey, D., Papadopoulos, C., Abdelzaher, T., Wang, L., Crowley, P., Yeh, E.: Named data networking (ndn) project. Technical Report NDN-0001, Palo Alto Research Center (PARC) (2010)"},{"key":"9495_CR4","doi-asserted-by":"crossref","unstructured":"Li, F., Chen, F., Wu, J., Xie, H.: Longest prefix lookup in named data networking: how fast can it be?. In: 9th IEEE International Conference on Networking, Architecture, and Storage, pp. 186\u2013190, August (2014)","DOI":"10.1109\/NAS.2014.36"},{"key":"9495_CR5","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/LCOMM.2013.112413.132231","volume":"18","author":"W Quan","year":"2014","unstructured":"Quan, W., Xu, C., Guan, J., Zhang, H., Grieco, L.A.: Scalable name lookup with adaptive prefix Bloom filter for named data networking. IEEE Commun. Lett. 18, 102\u2013105 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"7","key":"9495_CR6","doi-asserted-by":"publisher","first-page":"87","DOI":"10.14257\/ijfgcn.2016.9.7.09","volume":"9","author":"S Huang","year":"2016","unstructured":"Huang, S., Xu, J., Yang, X., Wu, Z., Niu, C.: Steerable name lookup based on classified prefixes and scalable one memory access Bloom filter for named data networking. Int. J. Future Gener. Commun. Netw. 9(7), 87\u2013100 (2016)","journal-title":"Int. J. Future Gener. Commun. Netw."},{"key":"9495_CR7","doi-asserted-by":"crossref","unstructured":"So, W., Narayanan, A., Oran, D.: Named data networking on a router: fast and dos-resistant forwarding with hash tables. In: Architectures for Networking and Communications Systems, pp. 215\u2013225, October (2013)","DOI":"10.1109\/ANCS.2013.6665203"},{"key":"9495_CR8","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/LCOMM.2014.2359191","volume":"18","author":"Z Li","year":"2014","unstructured":"Li, Z., Liu, K., Zhao, Y., Ma, Y.: Mapit: an enhanced pending interest table for ndn with mapping Bloom filter. IEEE Commun. Lett. 18, 1915\u20131918 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"3","key":"9495_CR9","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2656877.2656887","volume":"44","author":"L Zhang","year":"2014","unstructured":"Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Claffy, K., Crowley, P., Papadopoulos, C., Wang, L., Zhang, B.: Named data networking. SIGCOMM Comput. Commun. Rev. 44(3), 66\u201373 (2014)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"16","key":"9495_CR10","doi-asserted-by":"publisher","first-page":"3165","DOI":"10.1016\/j.comnet.2013.07.006","volume":"57","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Dai, H., Zhang, T., Meng, W., Fan, J., Liu, B.: Gpu-accelerated name lookup with component encoding. Comput. Netw. 57(16), 3165\u20133177 (2013)","journal-title":"Comput. Netw."},{"issue":"3","key":"9495_CR11","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/2317307.2317319","volume":"42","author":"Y Cheng","year":"2012","unstructured":"Cheng, Y., Alexander, A., Lan, W., Beichuan, Z., Lixia, Z.: Adaptive forwarding in named data networking. SIGCOMM Comput. Commun. Rev. 42(3), 62\u201367 (2012)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9495_CR12","doi-asserted-by":"crossref","unstructured":"You, W., Mathieu, B., Truong, P., Peltier, J., Simon, G.: Dipit: a distributed Bloom-filter based pit table for ccn nodes. In: 21st International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20137, July (2012)","DOI":"10.1109\/ICCCN.2012.6289282"},{"issue":"2","key":"9495_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1080\/17445760.2017.1363202","volume":"34","author":"R Shubbar","year":"2019","unstructured":"Shubbar, R., Ahmadi, M.: Efficient name matching based on a fast two-dimensional filter in named data networking. Int. J. Parallel Emerg. Distrib. Syst. 34(2), 203\u2013221 (2019)","journal-title":"Int. J. Parallel Emerg. Distrib. Syst."},{"key":"9495_CR14","doi-asserted-by":"crossref","unstructured":"Bender, M., Farach-Colton, M., Johnson, R., Kuszmaul, B.C., Medjedovic, D., Montes, A.R.P.S.P., Shetty, P., Zadok, E.: Dont thrash: how to cache your hash on flash. In: Proceedings of the VLDB Endowment, vol. 5, pp. 1627\u20131637 (2012)","DOI":"10.14778\/2350229.2350275"},{"key":"9495_CR15","volume-title":"The Art of Computer Programming: Sorting and Searching","author":"DE Knuth","year":"1973","unstructured":"Knuth, D.E.: The Art of Computer Programming: Sorting and Searching, vol. 3. Addison Wesley, Reading (1973)"},{"key":"9495_CR16","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MM.2004.1289292","volume":"24","author":"VC Ravikumar","year":"2004","unstructured":"Ravikumar, V.C., Mahapatra, R.N.: Tcam architecture for ip lookup using prefix properties. IEEE Micro 24, 60\u201369 (2004)","journal-title":"IEEE Micro"},{"issue":"4","key":"9495_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/263109.263136","volume":"27","author":"M Waldvogel","year":"1997","unstructured":"Waldvogel, M., Varghese, G., Turner, J., Plattner, B.: Scalable high speed ip routing lookups. SIGCOMM Comput. Commun. Rev. 27(4), 25\u201336 (1997)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9495_CR18","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/TNET.2006.872576","volume":"14","author":"S Dharmapurikar","year":"2006","unstructured":"Dharmapurikar, S., Krishnamurthy, P., Taylor, D.E.: Longest prefix matching using Bloom filters. IEEE\/ACM Trans. Netw. 14, 397\u2013409 (2006)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9495_CR19","doi-asserted-by":"crossref","unstructured":"Perino, D., Varvello, M.: A reality check for content centric networking. In: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, pp. 44\u201349, August (2011)","DOI":"10.1145\/2018584.2018596"},{"key":"9495_CR20","doi-asserted-by":"crossref","unstructured":"Yuan, H., Crowley, P.: Scalable pending interest table design: from principles to practice. In: IEEE INFOCOM 2014\u2014IEEE Conference on Computer Communications, pp. 2049\u20132057, April (2014)","DOI":"10.1109\/INFOCOM.2014.6848146"},{"key":"9495_CR21","doi-asserted-by":"crossref","unstructured":"Dai, H., Liu, B., Chen, Y., Wang, Y.: On pending interest table in named data networking. In: 2012 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 211\u2013222, October (2012)","DOI":"10.1145\/2396556.2396600"},{"key":"9495_CR22","doi-asserted-by":"crossref","unstructured":"Li, Z., Bi, J., Jun, W., Wang, S., Jiang, X.: Compression of pending interest table with Bloom filter in content centric network. In: Proceedings of the 7th International Conference on Future Internet Technologies, pp. 46\u201346, September (2012)","DOI":"10.1145\/2377310.2377326"},{"key":"9495_CR23","unstructured":"Yuan, H.: Data structures and algorithms for scalable NDN forwarding. Ph.D. thesis, Washington University in St. Louis (2015)"},{"key":"9495_CR24","doi-asserted-by":"crossref","unstructured":"Popa, L., Ghodsi, A., Stoica, I.: Http as the narrow waist of the future internet. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, pp. 1\u20136, October (2010)","DOI":"10.1145\/1868447.1868453"},{"key":"9495_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.cosrev.2016.01.001","volume":"19","author":"D Saxena","year":"2016","unstructured":"Saxena, D., Raychoudhury, V., Suri, N., Becker, C., Cao, J.: Named data networking: a survey. Comput. Sci. Rev. 19, 15\u201355 (2016)","journal-title":"Comput. Sci. Rev."},{"issue":"2","key":"9495_CR26","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1109\/SURV.2013.070813.00063","volume":"16","author":"G Xylomenos","year":"2014","unstructured":"Xylomenos, G., Ververidis, C.N., Siris, V.A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., Katsaros, K.V., Polyzos, G.C.: A survey of information-centric networking research. IEEE Commun. Surv. Tutor. 16(2), 1024\u20131049 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9495_CR27","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.comcom.2015.09.014","volume":"71","author":"SH Bouk","year":"2015","unstructured":"Bouk, S.H., Ahmed, S.H., Kim, D.: Hierarchical and hash based naming with compact trie name management scheme for vehicular content centric networks. Comput. Commun. 71, 73\u201383 (2015)","journal-title":"Comput. Commun."},{"key":"9495_CR28","doi-asserted-by":"crossref","unstructured":"Tan, Y., Zhu, S.: Efficient name lookup scheme based on hash and character trie in named data networking. In: 12th Web Information System and Application Conference (WISA), pp. 130\u2013135, September (2015)","DOI":"10.1109\/WISA.2015.72"},{"key":"9495_CR29","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/LCOMM.2014.2387344","volume":"19","author":"J Luo","year":"2015","unstructured":"Luo, J., Wu, C., Jiang, Y., Tong, J.: Name label switching paradigm for named data networking. IEEE Commun. Lett. 19, 335\u2013338 (2015)","journal-title":"IEEE Commun. Lett."},{"key":"9495_CR30","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"key":"9495_CR31","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/TCOMM.2015.2402660","volume":"63","author":"X Liu","year":"2015","unstructured":"Liu, X., Qi, H., Li, K., Stojmenovic, I., Liu, A.X., Shen, Y., Qu, W., Xue, W.: Sampling Bloom filter-based detection of unknown RFID tags. IEEE Trans. Commun. 63, 1432\u20131442 (2015)","journal-title":"IEEE Trans. Commun."},{"key":"9495_CR32","doi-asserted-by":"crossref","unstructured":"Bonelli, N., Callegari, C., Giordano, S., Procissi, G.: A Bloom filter bank based hash table for high speed packet processing. In: 2014 IEEE International Conference on High Performance Computing and Communications, pp. 974\u2013981, August (2014)","DOI":"10.1109\/HPCC.2014.161"},{"key":"9495_CR33","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/TVLSI.2014.2311234","volume":"23","author":"P Reviriego","year":"2015","unstructured":"Reviriego, P., Pontarelli, S., Maestro, J.A., Ottavi, M.: A synergetic use of Bloom filters for error detection and correction. IEEE Trans. Very Large Scale Integr. VLSI Syst. 23, 584\u2013587 (2015)","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."},{"key":"9495_CR34","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TSG.2014.2343997","volume":"6","author":"Y Yao","year":"2015","unstructured":"Yao, Y., Xiong, S., Qi, H., Liu, Y., Tolbert, L.M., Cao, Q.: Efficient histogram estimation for smart grid data processing with the loglog-Bloom-filter. IEEE Trans. Smart Grid 6, 199\u2013208 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"9495_CR35","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1186\/s40064-015-0958-y","volume":"4","author":"T Zink","year":"2015","unstructured":"Zink, T., Waldvogel, M.: Efficient hash tables for network applications. SpringerPlus 4, 222\u2013242 (2015)","journal-title":"SpringerPlus"},{"issue":"11","key":"9495_CR36","doi-asserted-by":"publisher","first-page":"2217","DOI":"10.1109\/LCOMM.2016.2601898","volume":"20","author":"M Al-hisnawi","year":"2016","unstructured":"Al-hisnawi, M., Ahmadi, M.: Deep packet inspection using quotient filter. IEEE Commun. Lett. 20(11), 2217\u20132220 (2016)","journal-title":"IEEE Commun. Lett."},{"key":"9495_CR37","unstructured":"Schnurrenberger, U.: The content name collection, cnc. \n                    http:\/\/www.icn-names.net\/\n                    \n                  . June 2017"},{"key":"9495_CR38","doi-asserted-by":"crossref","unstructured":"Wang, Y., He, K., Dai, H., Meng, W., Jiang, J., Liu, B., Chen, Y.: Scalable name lookup in ndn using effective name component encoding. In: 32nd IEEE International Conference on Distributed Computing Systems, pp. 688\u2013697, June (2012)","DOI":"10.1109\/ICDCS.2012.35"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-019-09495-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-019-09495-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-019-09495-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:12:11Z","timestamp":1584403931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-019-09495-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,18]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["9495"],"URL":"https:\/\/doi.org\/10.1007\/s10922-019-09495-y","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,18]]},"assertion":[{"value":"31 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}