{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T20:06:59Z","timestamp":1725394019844},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/ngi.2010.5534461","type":"proceedings-article","created":{"date-parts":[[2010,8,3]],"date-time":"2010-08-03T16:23:28Z","timestamp":1280852608000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["End-to-end routing for user driven network recovery"],"prefix":"10.1109","author":[{"given":"Simon","family":"Delamare","sequence":"first","affiliation":[]},{"given":"Michel","family":"Riguidel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948218"},{"key":"ref11","article-title":"Rfc 4271: A border gateway protocol 4 (bgp-4)","author":"rekhter","year":"2006","journal-title":"Internet Engineering Task Force Tech Rep"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/90.649563"},{"key":"ref13","article-title":"Rfc 2547: Bgp\/mpls vpns","author":"rosen","year":"1999","journal-title":"Internet Engineering Task Force Tech Rep"},{"key":"ref14","article-title":"Incentives to build robustness in bittorrent","author":"cohen","year":"2003","journal-title":"Proceedings of the 1st Workshop on Economics of Peer-to-peer Systems"},{"key":"ref15","article-title":"The detour framework for packet rerouting","author":"collins","year":"1998","journal-title":"PhD Qualifying Examination university of Washington"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"ref17","article-title":"Narron: overlay routing to oblivious destinations","author":"morris","year":"2002","journal-title":"Massachusetts Institute of Technology Tech Rep"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"key":"ref19","article-title":"Exploiting routing redundancy via structured peer-to-peer overlays","author":"zhao","year":"2003","journal-title":"Proc ICNP"},{"article-title":"Linux advanced routing and traffic control","year":"2010","author":"hubert","key":"ref28"},{"key":"ref4","article-title":"Rfc 3031: Multiprotocol label switching architecture","author":"rosen","year":"2001","journal-title":"Internet Engineering Task Force Tech Rep"},{"year":"2010","key":"ref27","article-title":"Openvz"},{"key":"ref3","article-title":"Rfc 1142: Osi is-is intra-domain routing protocol","author":"oran","year":"1990","journal-title":"Internet Engineering Task Force Tech Rep"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/49.887914"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-31966-5_19","article-title":"Internet routing policies and round-trip-times","author":"zheng","year":"2005","journal-title":"Passive and Active Network Measurement"},{"key":"ref5","article-title":"Reroutage dans ospf avec des chemins de secours","author":"moln\u00e1r","year":"2001","journal-title":"Projet ARMOR Rapport de recherche 4340"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2005.70"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/90.803380"},{"key":"ref2","article-title":"Rfc 2328: Ospf version 2","author":"moy","year":"1998","journal-title":"Internet Engineering Task Force Tech Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781043"},{"journal-title":"Network Recovery","year":"2004","author":"vasseur","key":"ref1"},{"key":"ref20","article-title":"Improving the reliability of internet paths with one-hop source routing","author":"gummadi","year":"2004","journal-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation (OSDI'04)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378207"},{"key":"ref24","article-title":"The impact of topology on overlay routing ser-vice","author":"li","year":"2004","journal-title":"Proceeding of INFO COM Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies"},{"key":"ref23","article-title":"Tapestry: An infrastructure for fault-tolerant wide-area location and routing","author":"zhao","year":"2001","journal-title":"IEEE Computer"},{"year":"0","key":"ref26","article-title":"Linux man-pages project: Ping, send icmp echo request to network hosts"},{"article-title":"Linux netfilter hacking howto","year":"2010","author":"russell","key":"ref25"}],"event":{"name":"2010 6th EURO-NGI Conference on Next Generation Internet Networks (NGI)","start":{"date-parts":[[2010,6,2]]},"location":"Paris, France","end":{"date-parts":[[2010,6,4]]}},"container-title":["6th EURO-NGI Conference on Next Generation Internet"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5512517\/5534454\/05534461.pdf?arnumber=5534461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T08:04:03Z","timestamp":1497859443000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5534461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ngi.2010.5534461","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}