{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:35:30Z","timestamp":1757781330518},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/percom.2017.7917850","type":"proceedings-article","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T16:32:17Z","timestamp":1493915537000},"page":"50-58","source":"Crossref","is-referenced-by-count":4,"title":["Prediction-based redundant data elimination with content overhearing in wireless networks"],"prefix":"10.1109","author":[{"given":"Haiying","family":"Shen","sequence":"first","affiliation":[]},{"given":"Shenghua","family":"He","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ankur","family":"Sarker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409977"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348565"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030638"},{"key":"ref13","article-title":"Cache contention aware virtual machine placement and migration $i$n cloud datacenters","author":"chen","year":"2016","journal-title":"Proc of ICNP"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555355"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402984"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848012"},{"key":"ref17","article-title":"Endre: An end-system redundancy elimination service for enterprises","author":"agarwal","year":"2010","journal-title":"Proc of NSDI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592580"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018447"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080833"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568537"},{"key":"ref27","article-title":"Content-dependent chunking for differential compression, the local maximum approach","author":"bjorner","year":"2007","journal-title":"Technical Report 109 Microsoft Research"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2015.7338328"},{"key":"ref6","article-title":"CatCharger: Deploying wireless charging lanes in a metropolitan road network through categorization and clustering of vehicle traffic","author":"yan","year":"2017","journal-title":"Proc of INFOCOM"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/938998.939000"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2016.44"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC.2014.7014810"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0628-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2016.042"},{"key":"ref9","article-title":"Efficiency through eavesdropping: link-layer packet caching","author":"afanasyev","year":"2008","journal-title":"Proc of NSDI"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848042"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1145\/347059.347408","article-title":"A protocol-independent technique for eliminating redundant network traffic","author":"spring","year":"2000","journal-title":"Proc of SIGCOMM"},{"journal-title":"Juniper Networks Application Acceleration","year":"0","key":"ref22"},{"journal-title":"Riverbed Networks Wan Optimization","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"journal-title":"Cisco Wide Are Application Acceleration Services","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218541"},{"key":"ref25","article-title":"Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost","author":"yu","year":"2012","journal-title":"Proc of ICNP"}],"event":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2017,3,13]]},"location":"Kona, Big Island, HI, USA","end":{"date-parts":[[2017,3,17]]}},"container-title":["2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7911029\/7917840\/07917850.pdf?arnumber=7917850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T05:34:16Z","timestamp":1569216856000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7917850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/percom.2017.7917850","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}