{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:12Z","timestamp":1772163912948,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,30]],"date-time":"2004-08-30T00:00:00Z","timestamp":1093824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,30]]},"DOI":"10.1145\/1015467.1015504","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T13:39:48Z","timestamp":1097156388000},"page":"331-342","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":137,"title":["The design and implementation of a next generation name service for the internet"],"prefix":"10.1145","author":[{"given":"Venugopalan","family":"Ramasubramanian","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY"}]},{"given":"Emin G\u00fcn","family":"Sirer","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY"}]}],"member":"320","published-online":{"date-parts":[[2004,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Negative Caching of DNS Queries. RFC","author":"Andrews M.","year":"1998","unstructured":"M. Andrews . Negative Caching of DNS Queries. RFC 2308, Mar 1998 .]] M. Andrews. Negative Caching of DNS Queries. RFC 2308, Mar 1998.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"Operating System Support for Planetary-Scale Network Services. Symposium on Networked Systems Design and Implementation, San Francisco CA","author":"Bavier A.","year":"2004","unstructured":"A. Bavier , M. Bowman , B. Chun , D. Culler , S. Karlin , S. Muir , L. Peterson , T. Roscoe , T. Spalink , and M. Wawrzoniak . Operating System Support for Planetary-Scale Network Services. Symposium on Networked Systems Design and Implementation, San Francisco CA , Mar 2004 .]] A. Bavier, M. Bowman, B. Chun, D. Culler, S. Karlin, S. Muir, L. Peterson, T. Roscoe, T. Spalink, and M. Wawrzoniak. Operating System Support for Planetary-Scale Network Services. Symposium on Networked Systems Design and Implementation, San Francisco CA, Mar 2004.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"DNS Support for Load Balancing. RFC","author":"Brisco T.","year":"1995","unstructured":"T. Brisco . DNS Support for Load Balancing. RFC 1794, Apr 1995 .]] T. Brisco. DNS Support for Load Balancing. RFC 1794, Apr 1995.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.965864"},{"key":"e_1_3_2_1_5_1","volume-title":"Systems Administration Conference, San Diego CA","author":"Brownlee N.","year":"2001","unstructured":"N. Brownlee , kc Claffy, and E. Nemeth . DNS Root\/gTLD Performance Measurements . Systems Administration Conference, San Diego CA , Dec 2001 .]] N. Brownlee, kc Claffy, and E. Nemeth. DNS Root\/gTLD Performance Measurements. Systems Administration Conference, San Diego CA, Dec 2001.]]"},{"key":"e_1_3_2_1_6_1","volume-title":"Web Caching and Zipf-like Distributions: Evidence and Implications. International Conference on Computer Communications, New York NY","author":"Breslau L.","year":"1999","unstructured":"L. Breslau , P. Cao , L. Fan , G. Phillips , and S. Shenker . Web Caching and Zipf-like Distributions: Evidence and Implications. International Conference on Computer Communications, New York NY , Mar 1999 .]] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. Web Caching and Zipf-like Distributions: Evidence and Implications. International Conference on Computer Communications, New York NY, Mar 1999.]]"},{"key":"e_1_3_2_1_7_1","volume-title":"Secure Routing for Structured Peer-to-Peer Overlay Networks. Symposium on Operating Systems Design and Implementation, Boston MA","author":"Castro M.","year":"2002","unstructured":"M. Castro , P. Druschel , A. Ganesh , A. Rowstron , and D. Wallach . Secure Routing for Structured Peer-to-Peer Overlay Networks. Symposium on Operating Systems Design and Implementation, Boston MA , Dec 2002 .]] M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Secure Routing for Structured Peer-to-Peer Overlay Networks. Symposium on Operating Systems Design and Implementation, Boston MA, Dec 2002.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/516965.829173"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687812"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/144179.144301"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851884"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"D. Eastlake. Domain Name System Security Extensions. RFC 2535 Mar 1999.]]   D. Eastlake. Domain Name System Security Extensions. RFC 2535 Mar 1999.]]","DOI":"10.17487\/rfc2535"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_15"},{"key":"e_1_3_2_1_14_1","volume-title":"Efficient Routing for Peer-to-Peer Overlays. Symposium on Networked Systems Design and Implementation, San Francisco CA","author":"Gupta A.","year":"2004","unstructured":"A. Gupta , B. Liskov , and R. Rodrigues . Efficient Routing for Peer-to-Peer Overlays. Symposium on Networked Systems Design and Implementation, San Francisco CA , Mar 2004 .]] A. Gupta, B. Liskov, and R. Rodrigues. Efficient Routing for Peer-to-Peer Overlays. Symposium on Networked Systems Design and Implementation, San Francisco CA, Mar 2004.]]"},{"key":"e_1_3_2_1_15_1","volume-title":"Symposium on Internet Technologies and Systems, Seattle WA","author":"Harvey N.","year":"2003","unstructured":"N. Harvey , M. Jones , S. Saroiu , M. Theimer , and A. Wolman . SkipNet: A Scalable Overlay Network with Practical Locality Properties ., Symposium on Internet Technologies and Systems, Seattle WA , Mar 2003 .]] N. Harvey, M. Jones, S. Saroiu, M. Theimer, and A. Wolman. SkipNet: A Scalable Overlay Network with Practical Locality Properties., Symposium on Internet Technologies and Systems, Seattle WA, Mar 2003.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"Monterey CA","author":"Huitema C.","year":"2000","unstructured":"C. Huitema and S. Weerahandi . Internet Measurements: the Rising Tide and the DNS Snag., ITC Specialist Seminar on Internet Traffic Measurement and Modeling , Monterey CA , Sep 2000 .]] C. Huitema and S. Weerahandi. Internet Measurements: the Rising Tide and the DNS Snag., ITC Specialist Seminar on Internet Traffic Measurement and Modeling, Monterey CA, Sep 2000.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"Feb","author":"Internet Systems Consortium","year":"2004","unstructured":"Internet Systems Consortium . BIND Vulnerabilities . www.isc.org\/sw\/bind\/bind-security.php , Feb 2004 .]] Internet Systems Consortium. BIND Vulnerabilities. www.isc.org\/sw\/bind\/bind-security.php, Feb 2004.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505223"},{"key":"e_1_3_2_1_19_1","volume-title":"Modeling TTL-based Internet Caches. International Conference on Computer Communications, San Francisco CA","author":"Jung J.","year":"2003","unstructured":"J. Jung , A. Berger , and H. Balakrishnan . Modeling TTL-based Internet Caches. International Conference on Computer Communications, San Francisco CA , Mar 2003 .]] J. Jung, A. Berger, and H. Balakrishnan. Modeling TTL-based Internet Caches. International Conference on Computer Communications, San Francisco CA, Mar 2003.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"e_1_3_2_1_21_1","volume-title":"Koorde: A Simple Degree-Optimal Distributed Hash Table. International Workshop on Peer-To-Peer Systems Workshop, Berkeley CA","author":"Kaashoek F.","year":"2003","unstructured":"F. Kaashoek and D. Karger . Koorde: A Simple Degree-Optimal Distributed Hash Table. International Workshop on Peer-To-Peer Systems Workshop, Berkeley CA , Feb 2003 .]] F. Kaashoek and D. Karger. Koorde: A Simple Degree-Optimal Distributed Hash Table. International Workshop on Peer-To-Peer Systems Workshop, Berkeley CA, Feb 2003.]]"},{"key":"e_1_3_2_1_22_1","volume-title":"Common DNS Implementation Errors and Suggested Fixes. RFC","author":"Kumar A.","year":"1993","unstructured":"A. Kumar , J. Postel , C. Neuman , P. Danzig , and S. Miller . Common DNS Implementation Errors and Suggested Fixes. RFC 1536, Oct 1993 .]] A. Kumar, J. Postel, C. Neuman, P. Danzig, and S. Miller. Common DNS Implementation Errors and Suggested Fixes. RFC 1536, Oct 1993.]]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571857"},{"key":"e_1_3_2_1_24_1","volume-title":"Kademlia: A Peer-to-peer Information System Based on the XOR Metric. International Workshop on Peer-To-Peer Systems, Cambridge MA","author":"Maymounkov P.","year":"2002","unstructured":"P. Maymounkov and D. Mazi\u00e9res . Kademlia: A Peer-to-peer Information System Based on the XOR Metric. International Workshop on Peer-To-Peer Systems, Cambridge MA , Mar 2002 .]] P. Maymounkov and D. Mazi\u00e9res. Kademlia: A Peer-to-peer Information System Based on the XOR Metric. International Workshop on Peer-To-Peer Systems, Cambridge MA, Mar 2002.]]"},{"key":"e_1_3_2_1_25_1","volume-title":"Domain Names: Concepts and Facilities. RFC","author":"Mockapetris P.","year":"1987","unstructured":"P. Mockapetris . Domain Names: Concepts and Facilities. RFC 1034, Nov 1987 .]] P. Mockapetris. Domain Names: Concepts and Facilities. RFC 1034, Nov 1987.]]"},{"key":"e_1_3_2_1_26_1","volume-title":"Implementation and Specification. RFC","author":"Mockapetris P.","year":"1987","unstructured":"P. Mockapetris . Domain Names : Implementation and Specification. RFC 1035, Nov 1987 .]] P. Mockapetris. Domain Names: Implementation and Specification. RFC 1035, Nov 1987.]]"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52338"},{"key":"e_1_3_2_1_28_1","volume-title":"Oct","author":"Naraine R.","year":"2002","unstructured":"R. Naraine . Massive DDoS Attack Hit DNS Root Servers. www.internetnews.com\/dev-news\/article.php\/1486981 , Oct 2002 .]] R. Naraine. Massive DDoS Attack Hit DNS Root Servers. www.internetnews.com\/dev-news\/article.php\/1486981, Oct 2002.]]"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015503"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s002240000118"},{"key":"e_1_3_2_1_32_1","volume-title":"Symposium on Networked Systems Design and Implementation, San Francisco CA","author":"Ramasubramanian V.","year":"2004","unstructured":"V. Ramasubramanian and E. G. Sirer . Beehive: Exploiting Power Law Query Distributions for O(1) Lookup Performance in Peer to Peer Overlays . Symposium on Networked Systems Design and Implementation, San Francisco CA , Mar 2004 .]] V. Ramasubramanian and E. G. Sirer. Beehive: Exploiting Power Law Query Distributions for O(1) Lookup Performance in Peer to Peer Overlays. Symposium on Networked Systems Design and Implementation, San Francisco CA, Mar 2004.]]"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/646591.697650"},{"key":"e_1_3_2_1_35_1","volume-title":"On the Effectiveness of DNS-based Server Selection. International Conference on Computer Communications, Anchorage AK","author":"Shaikh A.","year":"2001","unstructured":"A. Shaikh , R. Tewari , and M. Agarwal . On the Effectiveness of DNS-based Server Selection. International Conference on Computer Communications, Anchorage AK , Apr 2001 .]] A. Shaikh, R. Tewari, and M. Agarwal. On the Effectiveness of DNS-based Server Selection. International Conference on Computer Communications, Anchorage AK, Apr 2001.]]"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_37_1","volume-title":"Vienna Austria","author":"Theimer M.","year":"2002","unstructured":"M. Theimer and M. Jones . Overlook: Scalable Name Service on an Overlay Network International Conference on Distributed Computing Systems , Vienna Austria , Jul 2002 .]] M. Theimer and M. Jones. Overlook: Scalable Name Service on an Overlay Network International Conference on Distributed Computing Systems, Vienna Austria, Jul 2002.]]"},{"key":"e_1_3_2_1_38_1","volume-title":"Jan","author":"Thurrott P.","year":"2001","unstructured":"P. Thurrott . Microsoft Suffers Another DoS Attack. www.winnetmag.com\/WindowsSecurity\/Article\/ArticleID\/ 19770\/WindowsSecurity_19770.html , Jan 2001 .]] P. Thurrott. Microsoft Suffers Another DoS Attack. www.winnetmag.com\/WindowsSecurity\/Article\/ArticleID\/ 19770\/WindowsSecurity_19770.html, Jan 2001.]]"},{"key":"e_1_3_2_1_39_1","volume-title":"Symposium on Networked Systems Design and Implementation, San Francisco CA","author":"Walfish M.","year":"2004","unstructured":"M. Walfish , H. Balakrishnan , and S. Shenker . Untangling the Web from DNS . Symposium on Networked Systems Design and Implementation, San Francisco CA , Mar 2004 .]] M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. Symposium on Networked Systems Design and Implementation, San Francisco CA, Mar 2004.]]"},{"key":"e_1_3_2_1_40_1","volume-title":"International Workshop on Peer-To-Peer Systems, Berkeley CA","author":"Wieder U.","year":"2003","unstructured":"U. Wieder and M. Naor . A Simple Fault Tolerant Distributed Hash Table . International Workshop on Peer-To-Peer Systems, Berkeley CA , Feb 2003 .]] U. Wieder and M. Naor. A Simple Fault Tolerant Distributed Hash Table. International Workshop on Peer-To-Peer Systems, Berkeley CA, Feb 2003.]]"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571638"}],"event":{"name":"SIGCOMM04: ACM SIGCOMM 2004 Conference","location":"Portland Oregon USA","acronym":"SIGCOMM04","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1015467.1015504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:23:45Z","timestamp":1750253025000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,30]]},"references-count":41,"alternative-id":["10.1145\/1015467.1015504","10.1145\/1015467"],"URL":"https:\/\/doi.org\/10.1145\/1015467.1015504","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1030194.1015504","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,8,30]]},"assertion":[{"value":"2004-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}