{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:21Z","timestamp":1750307661530,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,2,25]],"date-time":"2008-02-25T00:00:00Z","timestamp":1203897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["261545-3"],"award-info":[{"award-number":["261545-3"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0509004"],"award-info":[{"award-number":["CNS-0509004"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,2,25]]},"DOI":"10.1145\/1411759.1411779","type":"proceedings-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T11:59:52Z","timestamp":1221739192000},"page":"74-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Low-bandwidth VM migration via opportunistic replay"],"prefix":"10.1145","author":[{"given":"Ajay","family":"Surie","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"H. Andr\u00e9s","family":"Lagar-Cavilla","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Eyal","family":"de Lara","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"M.","family":"Satyanarayanan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2008,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. 2 nd Symposium on Networked Systems Design and Implementation","author":"Annapureddy S.","year":"2005","unstructured":"S. Annapureddy , M. J. Freedman , and D. Mazi\u00c3\u013ares . Shark: Scaling file servers via cooperative caching . In Proc. 2 nd Symposium on Networked Systems Design and Implementation , Boston, MA , May 2005 . S. Annapureddy, M. J. Freedman, and D. Mazi\u00c3\u013ares. Shark: Scaling file servers via cooperative caching. In Proc. 2 nd Symposium on Networked Systems Design and Implementation, Boston, MA, May 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067179"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTMOBILE.2007.14"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060309"},{"key":"e_1_3_2_1_6_1","volume-title":"Internet Suspend\/Resume. In Proc. 4 th IEEE Workshop on Mobile Computing Systems and Applications","author":"Kozuch M.","year":"2002","unstructured":"M. Kozuch and M. Satyanarayanan . Internet Suspend\/Resume. In Proc. 4 th IEEE Workshop on Mobile Computing Systems and Applications , Callicoon, NY , June 2002 . M. Kozuch and M. Satyanarayanan. Internet Suspend\/Resume. In Proc. 4 th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1516124.1516135"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1146707"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224068"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502052"},{"key":"e_1_3_2_1_11_1","unstructured":"H. Sandklef J.-E. Dahl and L. Santander. GNU Xnee. http:\/\/www.sandklef.com\/xnee\/.  H. Sandklef J.-E. Dahl and L. Santander. GNU Xnee. http:\/\/www.sandklef.com\/xnee\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.46"},{"volume-title":"A. Opportunistic Use of Content-Addressable Storage for Distributed File Systems. In Proc. 2003 USENIX Technical Conference","year":"2003","key":"e_1_3_2_1_13_1","unstructured":"Tolia, N., Kozuch, M., Satyanarayanan, M., Karp, B., Bressoud, T., Perrig , A. Opportunistic Use of Content-Addressable Storage for Distributed File Systems. In Proc. 2003 USENIX Technical Conference , San Antonio, TX , June 2003 . Tolia, N., Kozuch, M., Satyanarayanan, M., Karp, B., Bressoud, T., Perrig, A. Opportunistic Use of Content-Addressable Storage for Distributed File Systems. In Proc. 2003 USENIX Technical Conference, San Antonio, TX, June 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247672"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. 3 rd Annual Workshop on Modeling, Benchmarking and Simulation, MoBS","author":"Xu M.","year":"2007","unstructured":"M. Xu , V. Malyugin , J. Sheldon , G. Venkitachalam , and B. Weissman . Retrace: Collecting execution trace with virtual machine deterministic replay . In Proc. 3 rd Annual Workshop on Modeling, Benchmarking and Simulation, MoBS , San Diego, CA , June 2007 . M. Xu, V. Malyugin, J. Sheldon, G. Venkitachalam, and B. Weissman. Retrace: Collecting execution trace with virtual machine deterministic replay. In Proc. 3 rd Annual Workshop on Modeling, Benchmarking and Simulation, MoBS, San Diego, CA, June 2007."}],"event":{"name":"HotMobile08: Workshop on Mobile Computing Systems and Applications","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Napa Valley California","acronym":"HotMobile08"},"container-title":["Proceedings of the 9th workshop on Mobile computing systems and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1411759.1411779","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1411759.1411779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:30Z","timestamp":1750253370000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1411759.1411779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,2,25]]},"references-count":15,"alternative-id":["10.1145\/1411759.1411779","10.1145\/1411759"],"URL":"https:\/\/doi.org\/10.1145\/1411759.1411779","relation":{},"subject":[],"published":{"date-parts":[[2008,2,25]]},"assertion":[{"value":"2008-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}