{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:22:50Z","timestamp":1729628570113,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/comsnets.2012.6151317","type":"proceedings-article","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T15:20:00Z","timestamp":1329319200000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Better Internet routing through intrinsic support for selfishness"],"prefix":"10.1109","author":[{"given":"Holly","family":"Esquivel","sequence":"first","affiliation":[]},{"given":"Chitra","family":"Muthukrishnan","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Akella","sequence":"additional","affiliation":[]},{"given":"Shuchi","family":"Chawla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1145\/347057.347403","article-title":"A novel bandwidth broker architecture for scalable support of guaranteed services","author":"zhang","year":"0","journal-title":"SIGCOMM"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893888"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159934"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79309-0_8"},{"journal-title":"MPLS Technology and Applications","year":"2000","author":"davie","key":"ref11"},{"key":"ref12","article-title":"Achieving good end-to-end service using Bill-Pay","author":"estan","year":"0","journal-title":"ACM HotNets-VI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592583"},{"key":"ref14","article-title":"Keynote: What can we unlearn from bgp?","author":"griffin","year":"0","journal-title":"DIN05"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0262.00153"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073869"},{"key":"ref17","article-title":"Towards internet-wide multipath routing","author":"he","year":"2007","journal-title":"Technical Report"},{"journal-title":"Towards Internet-wide Multipath Routing","year":"2008","author":"he","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2009.4808885"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544082"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015479"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481.003"},{"journal-title":"Apple Online Sales Huge On Black Friday","year":"2009","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374476"},{"key":"ref29","article-title":"Multi-armed bandit algorithms and empirical evaluation","author":"vermorel","year":"0","journal-title":"European Conf on Machine Learning"},{"journal-title":"Resilient overlay networks","year":"0","author":"andersen","key":"ref5"},{"journal-title":"Machine learning in metrical task systems and other on-line problems","year":"2000","author":"burch","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00199-004-0514-4"},{"year":"1999","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1566374.1566418"},{"journal-title":"Band-X Bandwidth Exchange","year":"0","key":"ref1"},{"key":"ref20","article-title":"Automated and Scalable QoS Control for Network Convergence","author":"kim","year":"0","journal-title":"INM\/WREN Workshop"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544081"},{"journal-title":"Prolexic Technologies Home Page","year":"2008","key":"ref24"},{"journal-title":"Internet Service Providers and Peering","year":"2000","author":"norton","key":"ref23"},{"key":"ref26","first-page":"50","volume":"19","author":"savage","year":"1999","journal-title":"Detour A case for informed internet routing and transport"},{"journal-title":"On Selfish Routing in Internet-Like Enviroments","year":"2003","author":"qiu","key":"ref25"}],"event":{"name":"2012 Fourth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2012,1,3]]},"location":"Bangalore, India","end":{"date-parts":[[2012,1,7]]}},"container-title":["2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6145051\/6151271\/06151317.pdf?arnumber=6151317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,29]],"date-time":"2021-12-29T10:31:40Z","timestamp":1640773900000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6151317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2012.6151317","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}