{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:37:04Z","timestamp":1729633024228,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/comsnets.2013.6465579","type":"proceedings-article","created":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T13:29:54Z","timestamp":1362144594000},"page":"1-9","source":"Crossref","is-referenced-by-count":14,"title":["Design requirements of a global name service for a mobility-centric, trustworthy internetwork"],"prefix":"10.1109","author":[{"given":"Arun","family":"Venkataramani","sequence":"first","affiliation":[]},{"given":"Abhigyan","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Xiaozheng","family":"Tie","sequence":"additional","affiliation":[]},{"given":"Hardeep","family":"Uppal","sequence":"additional","affiliation":[]},{"given":"David","family":"Westbrook","sequence":"additional","affiliation":[]},{"given":"Jim","family":"Kurose","sequence":"additional","affiliation":[]},{"given":"Dipankar","family":"Raychaudhuri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Mobile Connections Will Reach 5 6 Billion in 2011","year":"2011","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015503"},{"journal-title":"Oasis Anycast for Any Service","year":"2006","author":"freedman","key":"17"},{"journal-title":"Mobile IP IEEE Communications Magazine","year":"1997","author":"perkins","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.1997.643720"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/357436.357439"},{"journal-title":"DNS Threats & Weaknesses of the Domain Name System","year":"2012","key":"15"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.207"},{"journal-title":"Rfc 6182 Architectural Guidelines for Multipath Tcp Development","year":"0","author":"ford","key":"16"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1498"},{"journal-title":"The BitTorrent Protocol Specification","year":"2008","author":"cohen","key":"13"},{"key":"14","first-page":"155","article-title":"Serving dns using a peer-to-peer lookup service","author":"cox","year":"2002","journal-title":"IPTPS"},{"key":"37","first-page":"99","article-title":"Beehive: O(1) lookup performance for power-law query distributions in peer-to-peer overlays","author":"ramasubramanian","year":"2004","journal-title":"NSDI"},{"journal-title":"The World Factbook","year":"2011","key":"11"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015504"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944770"},{"key":"21","first-page":"23","article-title":"Xia: Efficient support for evolvable internetworking","author":"han","year":"2012","journal-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation"},{"journal-title":"Global environment for network innovations","year":"2012","key":"20"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345938"},{"journal-title":"Distributing Content Simplifies ISP Traffic Engineering","year":"2012","author":"sharma","key":"42"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935255"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/2080.2081"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.50"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/DANCE.2002.1003502"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851211"},{"key":"22","article-title":"Internet measurements: The rising tide and the dns snag","author":"huitema","year":"2000","journal-title":"ITC Specialist Seminar on Internet Traffic Measurement and Modeling"},{"key":"23","article-title":"Host identity protocol, extended abstract","author":"jokela","year":"2004","journal-title":"Wireless World Research Forum"},{"key":"24","first-page":"589","volume":"10","author":"jung","year":"2002","journal-title":"DNS Performance and the Effectiveness of Caching"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"26","article-title":"Do we need replica placement algorithms in content delivery networks","author":"karlsson","year":"2002","journal-title":"WCW"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/10590.10591"},{"journal-title":"Self-certifying File System","year":"2002","author":"mazieres","key":"29"},{"journal-title":"Elastic Load Balancing","year":"2012","key":"3"},{"key":"2","article-title":"Volley: Automated data placement for geo-distributed cloud services","author":"agarwal","year":"2010","journal-title":"USENIX NSDI"},{"key":"10","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1145\/1151659.1159955","article-title":"Rofl: Routing on flat labels","volume":"36","author":"caesar","year":"2006","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"1","first-page":"186","article-title":"The design and implementation of an intentional naming system","author":"adjie-winoto","year":"1999","journal-title":"ACM SOSP"},{"key":"30","article-title":"Serval: An end-host stack for service-centric networking","author":"nordstrom","year":"2012","journal-title":"USENIX NSDI"},{"key":"7","article-title":"A formally-verified migration protocol for mobile, multihomed hosts","author":"arye","year":"2012","journal-title":"IEEE International Conference on Network Protocols"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921174"},{"journal-title":"Future Internet Design","year":"2012","key":"32"},{"journal-title":"Cassandra","year":"2012","key":"5"},{"journal-title":"Future Internet Architecture","year":"2012","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402997"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.965864"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015505"}],"event":{"name":"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2013,1,7]]},"location":"Bangalore, India","end":{"date-parts":[[2013,1,10]]}},"container-title":["2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6451320\/6465521\/06465579.pdf?arnumber=6465579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T08:29:54Z","timestamp":1498033794000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6465579\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2013.6465579","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}