{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:15Z","timestamp":1750307355960,"version":"3.41.0"},"reference-count":7,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2011,7,5]],"date-time":"2011-07-05T00:00:00Z","timestamp":1309824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2011,7,5]]},"abstract":"<jats:p>The development of new technology is driven by scientific research. The Internet, with its roots in the ARPANET and NSFNet, is no exception. Many of the fundamental, long-term improvements to the architecture, security, end-to-end protocols and management of the Internet originate in the related academic research communities. Even shorter-term, more commercially driven extensions are oftentimes derived from academic research. When interoperability is required, the IETF standardizes such new technology. Timely and relevant standardization benefits from continuous input and review from the academic research community.<\/jats:p>\n          <jats:p>For an individual researcher, it can however by quite puzzling how to begin to most effectively participate in the IETF and - arguably to a much lesser degree - in the IRTF. The interactions in the IETF are much different than those in academic conferences, and effective participation follows different rules. The goal of this document is to highlight such differences and provide a rough guideline that will hopefully enable researchers new to the IETF to become successful contributors more quickly.<\/jats:p>","DOI":"10.1145\/2002250.2002253","type":"journal-article","created":{"date-parts":[[2011,7,15]],"date-time":"2011-07-15T12:24:59Z","timestamp":1310732699000},"page":"10-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["How to contribute research results to internet standardization"],"prefix":"10.1145","volume":"41","author":[{"given":"Marcelo","family":"Bagnulo","sequence":"first","affiliation":[{"name":"Universidad Carlos III de Madrid, Madrid, Spain"}]},{"given":"Philip","family":"Eardley","sequence":"additional","affiliation":[{"name":"BT, Ipswich, United Kingdom"}]},{"given":"Lars","family":"Eggert","sequence":"additional","affiliation":[{"name":"Nokia Research Center, Helsinki, Finland"}]},{"given":"Rolf","family":"Winter","sequence":"additional","affiliation":[{"name":"NEC Labs Europe, Heidelberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2011,7,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Eastlake D. 2005. How to Gain Prominence and Influence in Standards Organizations. RFC4144. http:\/\/tools.ietf.org\/html\/rfc4144  Eastlake D. 2005. How to Gain Prominence and Influence in Standards Organizations. RFC4144. http:\/\/tools.ietf.org\/html\/rfc4144","DOI":"10.17487\/rfc4144"},{"key":"e_1_2_1_2_1","unstructured":"Eggert L. 2010. Considerations for Having a Successful \"Bar BOF\" Side Meeting. (Work in progress) http:\/\/tools.ietf.org\/html\/draft-eggert-successful-bar-bof  Eggert L. 2010. Considerations for Having a Successful \"Bar BOF\" Side Meeting. (Work in progress) http:\/\/tools.ietf.org\/html\/draft-eggert-successful-bar-bof"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Rescorla E. 2005. Writing Protocol Models. RFC4101. http:\/\/tools.ietf.org\/html\/rfc4101  Rescorla E. 2005. Writing Protocol Models. RFC4101. http:\/\/tools.ietf.org\/html\/rfc4101","DOI":"10.17487\/rfc4101"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Narten T. 2009. Considerations for Having a Successful Birds-of-a-Feather (BOF) Session. RFC5434. http:\/\/tools.ietf.org\/html\/rfc5434  Narten T. 2009. Considerations for Having a Successful Birds-of-a-Feather (BOF) Session. RFC5434. http:\/\/tools.ietf.org\/html\/rfc5434","DOI":"10.17487\/rfc5434"},{"key":"e_1_2_1_5_1","unstructured":"Multipath TCP working group. http:\/\/tools.ietf.org\/wg\/mptcp\/  Multipath TCP working group. http:\/\/tools.ietf.org\/wg\/mptcp\/"},{"key":"e_1_2_1_6_1","unstructured":"Congestion Exposure working group. http:\/\/tools.ietf.org\/wg\/conex\/  Congestion Exposure working group. http:\/\/tools.ietf.org\/wg\/conex\/"},{"key":"e_1_2_1_7_1","unstructured":"Trilogy Project. http:\/\/www.trilogy-project.org  Trilogy Project. http:\/\/www.trilogy-project.org"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2002250.2002253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2002250.2002253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:19Z","timestamp":1750245739000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2002250.2002253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,5]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,7,5]]}},"alternative-id":["10.1145\/2002250.2002253"],"URL":"https:\/\/doi.org\/10.1145\/2002250.2002253","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2011,7,5]]},"assertion":[{"value":"2011-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}