{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:15Z","timestamp":1725558915557},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/icccn.2010.5560113","type":"proceedings-article","created":{"date-parts":[[2010,9,7]],"date-time":"2010-09-07T16:30:51Z","timestamp":1283877051000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Redundancy-Aware Routing with Limited Resources"],"prefix":"10.1109","author":[{"given":"Yang","family":"Song","sequence":"first","affiliation":[]},{"given":"Katherine","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Lixin","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Finding similar files in a large file system","author":"manber","year":"1994","journal-title":"USENIX"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"ref12","article-title":"SmartRE:an architecture for coordinated network-wide redundancy elimination","author":"anand","year":"2009","journal-title":"SIG-COMM"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555355"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF01949715"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/90.532865"},{"key":"ref16","article-title":"On directed steiner trees","author":"zosin","year":"2002","journal-title":"Annual ACM-SIAM Symposium on Discrete Algorithms"},{"journal-title":"Steiner problem in graphs and its applications","year":"1971","author":"hakimi","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781080"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633039"},{"journal-title":"Netcqualizer bandwidth shaper","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402984"},{"journal-title":"Peribit wan optimization","year":"0","key":"ref6"},{"journal-title":"Packeteer wan optimization solutions","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2007.78"},{"journal-title":"Riverbed steelhead appliance performance brief File transfer protocol","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1145\/347059.347408","article-title":"A protocol-independent technique for eliminating redundant network traffic","author":"spring","year":"2000","journal-title":"SIGCOMM"},{"key":"ref1","article-title":"Fingerprinting by random polynomials","author":"rabin","year":"1981","journal-title":"Harvard University Technical Report"},{"journal-title":"Squid Web Proxy Cache","year":"0","key":"ref9"},{"journal-title":"Redundancyaware routing with limited resources","year":"0","author":"song","key":"ref20"}],"event":{"name":"2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010)","start":{"date-parts":[[2010,8,2]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2010,8,5]]}},"container-title":["2010 Proceedings of 19th International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5559661\/5560011\/05560113.pdf?arnumber=5560113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T09:46:49Z","timestamp":1497865609000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5560113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccn.2010.5560113","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}