{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:24:08Z","timestamp":1729643048174,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6754949","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:57Z","timestamp":1394212497000},"page":"000219-000225","source":"Crossref","is-referenced-by-count":2,"title":["Characterizing and analysis of the flattening Internet topology"],"prefix":"10.1109","author":[{"family":"Zhengwei Zhao","sequence":"first","affiliation":[]},{"family":"Jingping Bi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"On inferring autonomous system relationships in the Internet","volume":"9","author":"gao","year":"2001","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2119327"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298336"},{"journal-title":"Collecting the Internet ASlevel Topology","year":"2005","author":"zhang","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.234"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020798"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"year":"0","key":"22"},{"year":"2011","key":"23"},{"year":"2011","key":"24"},{"year":"0","key":"25"},{"key":"26","article-title":"Complexity of internet interconnections Technology, incentives and implications for policy","author":"faratin","year":"2007","journal-title":"Research Conference on Communication Information and Internet Policy (TPRC)"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/2184356.2184360"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962885"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_1"},{"journal-title":"The Internet Is t1at Modeling the Transition from A Transit Hierarchy to A Peering Mesh","year":"0","author":"dhamdhere","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851194"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926512"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1771","author":"rekhter","year":"1995","journal-title":"A Border Gateway Protocol 4"},{"key":"6","article-title":"Quantifying the pitfalls of traceroute in AS connectivity inference","author":"zhang","year":"2010","journal-title":"PAM"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644934"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06754949.pdf?arnumber=6754949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:15:17Z","timestamp":1498108517000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6754949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6754949","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}