{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:17Z","timestamp":1750307477692,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,20]],"date-time":"2010-10-20T00:00:00Z","timestamp":1287532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF0910273"],"award-info":[{"award-number":["W911NF0910273"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1040757CNS-1032226CNS-0905134CNS-0746531"],"award-info":[{"award-number":["CNS-1040757CNS-1032226CNS-0905134CNS-0746531"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,20]]},"DOI":"10.1145\/1868447.1868451","type":"proceedings-article","created":{"date-parts":[[2010,10,26]],"date-time":"2010-10-26T12:36:11Z","timestamp":1288096571000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A case for information-bound referencing"],"prefix":"10.1145","author":[{"given":"Ashok","family":"Anand","sequence":"first","affiliation":[{"name":"Univ. of Wisconsin-Madison, Madison, WI"}]},{"given":"Aditya","family":"Akella","sequence":"additional","affiliation":[{"name":"Univ. of Wisconsin-Madison, Madison, WI"}]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[{"name":"Intel Labs, Berkeley, CA"}]},{"given":"Srinivasan","family":"Seshan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/www.cs.washington.edu\/research\/imagedatabase\/.  http:\/\/www.cs.washington.edu\/research\/imagedatabase\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Crowdsourcing crisis information. http:\/\/www.ushahidi.com.  Crowdsourcing crisis information. http:\/\/www.ushahidi.com."},{"key":"e_1_3_2_1_3_1","unstructured":"The open source perceptual hash library. http:\/\/phash.org.  The open source perceptual hash library. http:\/\/phash.org."},{"key":"e_1_3_2_1_4_1","volume-title":"USITS","author":"Harvey N. J. A.","year":"2003","unstructured":"N. J. A. Harvey , M. B. Jones , S. Saroiu , M. Theimer , and A. Wolman . SkipNet: a scalable overlay network with practical locality properties . In USITS , 2003 . N. J. A. Harvey, M. B. Jones, S. Saroiu, M. Theimer, and A. Wolman. SkipNet: a scalable overlay network with practical locality properties. In USITS, 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJEM.2009.031564"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319164"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015507"},{"key":"e_1_3_2_1_8_1","first-page":"170","volume-title":"Storage and Retrieval for Still Image and Video Databases IV, No. SPIE 2664","author":"Boreczky J.","year":"1996","unstructured":"J. Boreczky , J. S. Boreczky , and L. A. Rowe . Comparison of video shot boundary detection techniques . In In Storage and Retrieval for Still Image and Video Databases IV, No. SPIE 2664 , pages 170 -- 179 , 1996 . J. Boreczky, J. S. Boreczky, and L. A. Rowe. Comparison of video shot boundary detection techniques. In In Storage and Retrieval for Still Image and Video Databases IV, No. SPIE 2664, pages 170--179, 1996."},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. EUSIPCO 04","author":"Coskun B.","year":"2004","unstructured":"B. Coskun and B. Sankur . Robust video hash extraction . In Proc. EUSIPCO 04 , 2004 . B. Coskun and B. Sankur. Robust video hash extraction. In Proc. EUSIPCO 04, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764878"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863960"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. VLDB","author":"Gionis A.","year":"1999","unstructured":"A. Gionis , P. Indyk , and R. Motwani . Similarity search in high dimensions via hashing . In Proc. VLDB , 1999 . A. Gionis, P. Indyk, and R. Motwani. Similarity search in high dimensions via hashing. In Proc. VLDB, 1999."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of ISCRAM","author":"Fall K.","year":"2010","unstructured":"K. Fall , G. Iannaccone , J. Kannan , F. Silveira , and N. Taft . A Disruption-Tolerant Architecture for Secure and Efficient Disaster Response Communications . In Proceedings of ISCRAM , 2010 . K. Fall, G. Iannaccone, J. Kannan, F. Silveira, and N. Taft. A Disruption-Tolerant Architecture for Secure and Efficient Disaster Response Communications. In Proceedings of ISCRAM, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.312.0249"},{"key":"e_1_3_2_1_16_1","volume-title":"An evaluation of color histogram based methods in video indexing. Technical report","author":"Kasturi R.","year":"1996","unstructured":"R. Kasturi , S. H. Strayer , U. Gargi , and S. Antani . An evaluation of color histogram based methods in video indexing. Technical report , Penn State University , 1996 . R. Kasturi, S. H. Strayer, U. Gargi, and S. Antani. An evaluation of color histogram based methods in video indexing. Technical report, Penn State University, 1996."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of NSDI","author":"Walfish M.","year":"2004","unstructured":"M. Walfish , H. Balakrishnan , and S. Shenker . Untangling the web from DNS . In Proceedings of NSDI , 2004 . M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the web from DNS. In Proceedings of NSDI, 2004."},{"volume-title":"Freedman. Experiences with CoralCDN: A Five-Year Operational View. In Proc NSDI","year":"2010","key":"e_1_3_2_1_18_1","unstructured":"Michael Freedman. Experiences with CoralCDN: A Five-Year Operational View. In Proc NSDI , 2010 . Michael Freedman. Experiences with CoralCDN: A Five-Year Operational View. In Proc NSDI, 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1992.223129"},{"key":"e_1_3_2_1_20_1","volume-title":"Building the gist of a scene: the role of global image features in recognition. Progress in brain research","author":"Oliva A.","year":"2006","unstructured":"A. Oliva and A. Torralba . Building the gist of a scene: the role of global image features in recognition. Progress in brain research , 2006 . A. Oliva and A. Torralba. Building the gist of a scene: the role of global image features in recognition. Progress in brain research, 2006."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-005-4151-3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of NSDI","author":"Pucha H.","year":"2007","unstructured":"H. Pucha , D. G. Andersen , and M. Kaminsky . Exploiting similarity for multi-source downloads using file handprints . In Proc. of NSDI , 2007 . H. Pucha, D. G. Andersen, and M. Kaminsky. Exploiting similarity for multi-source downloads using file handprints. In Proc. of NSDI, 2007."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. SPIE Internet Imaging","author":"Cheung S.-C.","year":"2000","unstructured":"S.-C. Cheung and A. Zakhor . Estimation of web video multiplicity . In Proc. SPIE Internet Imaging , 2000 . S.-C. Cheung and A. Zakhor. Estimation of web video multiplicity. In Proc. SPIE Internet Imaging, 2000."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of ISCRAM","author":"Liu S.","year":"2008","unstructured":"S. Liu , L. Palen , J. Sutton , A. Hughes and S. Vieweg . In Search of the Bigger Picture: The Emergent Role of On-Line Photo-Sharing in Times of Disaster . In Proceedings of ISCRAM , 2008 . S. Liu, L. Palen, J. Sutton, A. Hughes and S. Vieweg. In Search of the Bigger Picture: The Emergent Role of On-Line Photo-Sharing in Times of Disaster. In Proceedings of ISCRAM, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"key":"e_1_3_2_1_27_1","volume-title":"Chord: A scalable peer-to-peer lookup service for Internet applications","author":"Stoica I.","year":"2001","unstructured":"I. Stoica , R. Morris , D. Karger , F. Kaashoek , and H. Balakrishnan . Chord: A scalable peer-to-peer lookup service for Internet applications . 2001 . I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for Internet applications. 2001."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. NSDI","author":"Tolia N.","year":"2006","unstructured":"N. Tolia , M. Kaminsky , D. G. Andersen , and S. Patil . An architecture for Internet data transfer . In Proc. NSDI , 2006 . N. Tolia, M. Kaminsky, D. G. Andersen, and S. Patil. An architecture for Internet data transfer. In Proc. NSDI, 2006."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. NSDI","author":"Walsh K.","year":"2006","unstructured":"K. Walsh and E. G. Sirer . Experience With A Distributed Object Reputation System for Peer-to-Peer Filesharing . In Proc. NSDI , 2006 . K. Walsh and E. G. Sirer. Experience With A Distributed Object Reputation System for Peer-to-Peer Filesharing. In Proc. NSDI, 2006."}],"event":{"name":"Hotnets-X: 10th ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Monterey California","acronym":"Hotnets-X"},"container-title":["Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868447.1868451","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1868447.1868451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:54Z","timestamp":1750248534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868447.1868451"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,20]]},"references-count":30,"alternative-id":["10.1145\/1868447.1868451","10.1145\/1868447"],"URL":"https:\/\/doi.org\/10.1145\/1868447.1868451","relation":{},"subject":[],"published":{"date-parts":[[2010,10,20]]},"assertion":[{"value":"2010-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}