{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:08Z","timestamp":1772163968772,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,15]],"date-time":"2009-06-15T00:00:00Z","timestamp":1245024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,15]]},"DOI":"10.1145\/1555349.1555355","type":"proceedings-article","created":{"date-parts":[[2009,6,16]],"date-time":"2009-06-16T09:34:36Z","timestamp":1245144876000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":137,"title":["Redundancy in network traffic"],"prefix":"10.1145","author":[{"given":"Ashok","family":"Anand","sequence":"first","affiliation":[{"name":"University of Wisconsin, Madison, WI, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chitra","family":"Muthukrishnan","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aditya","family":"Akella","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ramachandran","family":"Ramjee","sequence":"additional","affiliation":[{"name":"Microsoft Research, Bangalore, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2009,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Citrix application delivery infrastructure. http:\/\/www.citrix.com\/.  Citrix application delivery infrastructure. http:\/\/www.citrix.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Computerworld -- WAN optimization continues growth. www.computerworld.com.au\/index.php\/id;1174462047;fp;16;fpid;0\/.  Computerworld -- WAN optimization continues growth. www.computerworld.com.au\/index.php\/id;1174462047;fp;16;fpid;0\/."},{"key":"e_1_3_2_1_3_1","unstructured":"F5 Networks: WAN Delivery Products. http:\/\/www.f5.com\/.  F5 Networks: WAN Delivery Products. http:\/\/www.f5.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Netequalizer Bandwidth Shaper. http:\/\/www.netequalizer.com\/.  Netequalizer Bandwidth Shaper. http:\/\/www.netequalizer.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Packeteer WAN optimization solutions. http:\/\/www.packeteer.com\/.  Packeteer WAN optimization solutions. http:\/\/www.packeteer.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"PeerApp: P2P and Media Caching. http:\/\/www.peerapp.com.  PeerApp: P2P and Media Caching. http:\/\/www.peerapp.com."},{"key":"e_1_3_2_1_7_1","unstructured":"Peribit Networks (Acquired by Juniper in 2005): WAN Optimization Solution. http:\/\/www.juniper.net\/.  Peribit Networks (Acquired by Juniper in 2005): WAN Optimization Solution. http:\/\/www.juniper.net\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Riverbed Networks: WAN Optimization. http:\/\/www.riverbed.com\/solutions\/optimize\/.  Riverbed Networks: WAN Optimization. http:\/\/www.riverbed.com\/solutions\/optimize\/."},{"key":"e_1_3_2_1_9_1","unstructured":"WAN optimization revenues grow 16% -- IT Facts. www.itfacts.biz\/wan-optimization--market-to-grow-16\/1205\/.  WAN optimization revenues grow 16% -- IT Facts. www.itfacts.biz\/wan-optimization--market-to-grow-16\/1205\/."},{"key":"e_1_3_2_1_10_1","unstructured":"WAN Optimization: Wikipedia entry. http:\/\/en.wikipedia.org\/wiki\/WAN_Optimization.  WAN Optimization: Wikipedia entry. http:\/\/en.wikipedia.org\/wiki\/WAN_Optimization."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.650984"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402984"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"e_1_3_2_1_15_1","volume-title":"Digital SRC Research Report","author":"Burrows M.","year":"1994","unstructured":"M. Burrows and D. J. Wheeler . A block-sorting lossless data compression algorithm. Technical report , Digital SRC Research Report , 1994 . M. Burrows and D. J.Wheeler. A block-sorting lossless data compression algorithm. Technical report, Digital SRC Research Report, 1994."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409977"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285287"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015478"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTWEB.2006.355268"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Winter Technical Conference","author":"Manber U.","year":"1994","unstructured":"U. Manber . Finding similar files in a large file system . In USENIX Winter Technical Conference , 1994 . U. Manber. Finding similar files in a large file system. In USENIX Winter Technical Conference, 1994."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502052"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. 4th USENIX NSDI","author":"Pucha H.","year":"2007","unstructured":"H. Pucha , D. G. Andersen , and M. Kaminsky . Exploiting similarity for multi-source downloads using file handprints . In Proc. 4th USENIX NSDI , Cambridge, MA , Apr. 2007 . H. Pucha, D. G. Andersen, and M. Kaminsky. Exploiting similarity for multi-source downloads using file handprints. In Proc. 4th USENIX NSDI, Cambridge, MA, Apr. 2007."},{"key":"e_1_3_2_1_23_1","volume-title":"Technical report","author":"Rabin M.","year":"1981","unstructured":"M. Rabin . Fingerprinting by random polynomials. Technical report , Harvard University , 1981 . Technical Report, TR-15-81. M. Rabin. Fingerprinting by random polynomials. Technical report, Harvard University, 1981. Technical Report, TR-15-81."},{"key":"e_1_3_2_1_24_1","unstructured":"RouteScience Technologies Inc. Routescience PathControl. http:\/\/www.routescience.com\/products.  RouteScience Technologies Inc. Routescience PathControl. http:\/\/www.routescience.com\/products."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347408"},{"key":"e_1_3_2_1_27_1","unstructured":"Squid Web Proxy Cache. http:\/\/www.squid--cache.org\/.  Squid Web Proxy Cache. http:\/\/www.squid--cache.org\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319153"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 2nd USITS","author":"Wolman A.","year":"1999","unstructured":"A. Wolman Organization-based Analysis of Web-Object Sharing and Caching . In Proceedings of the 2nd USITS , Oct 1999 . A. Wolman et al. Organization-based Analysis of Web-Object Sharing and Caching. In Proceedings of the 2nd USITS, Oct 1999."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"}],"event":{"name":"SIGMETRICS09: ACM SIGMETRICS\/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems","location":"Seattle WA USA","acronym":"SIGMETRICS09","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1555349.1555355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1555349.1555355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:23:03Z","timestamp":1750234983000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1555349.1555355"}},"subtitle":["findings and implications"],"short-title":[],"issued":{"date-parts":[[2009,6,15]]},"references-count":29,"alternative-id":["10.1145\/1555349.1555355","10.1145\/1555349"],"URL":"https:\/\/doi.org\/10.1145\/1555349.1555355","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2492101.1555355","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2009,6,15]]},"assertion":[{"value":"2009-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}