{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:39Z","timestamp":1750307199805,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,11,28]],"date-time":"2011-11-28T00:00:00Z","timestamp":1322438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,11,28]]},"DOI":"10.1145\/2072298.2072327","type":"proceedings-article","created":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T17:50:15Z","timestamp":1323107415000},"page":"213-222","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Cloud download"],"prefix":"10.1145","author":[{"given":"Yan","family":"Huang","sequence":"first","affiliation":[{"name":"Tencent Research, Shanghai, China"}]},{"given":"Zhenhua","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Gang","family":"Liu","sequence":"additional","affiliation":[{"name":"Tencent Research, Shanghai, China"}]},{"given":"Yafei","family":"Dai","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2011,11,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The Cisco Visual Networking Index report. http:\/\/newsroom.cisco.com\/dlls\/2008\/ekits\/Cisco_\\\\Visual_Networking_Index_061608.pdf.  The Cisco Visual Networking Index report. http:\/\/newsroom.cisco.com\/dlls\/2008\/ekits\/Cisco_\\\\Visual_Networking_Index_061608.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"YouTube we site. http:\/\/www.youtube.com.  YouTube we site. http:\/\/www.youtube.com."},{"key":"e_1_3_2_1_3_1","unstructured":"The BitTorrent protocol specification. http:\/\/www.BitTorrent.org\/beps\/bep_0003.html.  The BitTorrent protocol specification. http:\/\/www.BitTorrent.org\/beps\/bep_0003.html."},{"key":"e_1_3_2_1_4_1","unstructured":"PPLive web site. http:\/\/www.pptv.com.  PPLive web site. http:\/\/www.pptv.com."},{"key":"e_1_3_2_1_5_1","volume-title":"CoolStreaming\/DONet: A Data-driven Overlay Network for Peer-to-Peer Live Media Streaming,\" In IEEE INFOCOM","author":"Zhang X.","year":"2005","unstructured":"X. Zhang , J. Liu , B. Li , and T. Yum . \" CoolStreaming\/DONet: A Data-driven Overlay Network for Peer-to-Peer Live Media Streaming,\" In IEEE INFOCOM , 2005 . X. Zhang, J. Liu, B. Li, and T. Yum. \"CoolStreaming\/DONet: A Data-driven Overlay Network for Peer-to-Peer Live Media Streaming,\" In IEEE INFOCOM, 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282396"},{"key":"e_1_3_2_1_7_1","unstructured":"Akamai web site. http:\/\/www.akamai.com.  Akamai web site. http:\/\/www.akamai.com."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(01)00409-1"},{"key":"e_1_3_2_1_9_1","unstructured":"eMule web site. http:\/\/www.eMule.org.  eMule web site. http:\/\/www.eMule.org."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496103"},{"key":"e_1_3_2_1_12_1","unstructured":"K. Roth and K. McKenney. \"Energy Consumption by Consumer Electronics in U.S. Residences \" Final Report to the Consumer Electronics Association (CEA) Jan. 2007.  K. Roth and K. McKenney. \"Energy Consumption by Consumer Electronics in U.S. Residences \" Final Report to the Consumer Electronics Association (CEA) Jan. 2007."},{"key":"e_1_3_2_1_13_1","first-page":"251","volume-title":"IPTPS 2002","author":"Douceur J. R.","year":"2002","unstructured":"J. R. Douceur . \"The sybil attack,\" In IPTPS 2002 , Cambridge, MA , March 2002 , pp. 251 - 260 . J. R. Douceur. \"The sybil attack,\" In IPTPS 2002, Cambridge, MA, March 2002, pp. 251 - 260."},{"key":"e_1_3_2_1_14_1","volume-title":"Threats and defenses,\" In IEEE INFOCOM","author":"Singh A.","year":"2006","unstructured":"A. Singh , T. Ngan , P. Druschel , D. Wallach . \" Eclipse attacks on overlay networks : Threats and defenses,\" In IEEE INFOCOM , 2006 . A. Singh, T. Ngan, P. Druschel, D. Wallach. \" Eclipse attacks on overlay networks: Threats and defenses,\" In IEEE INFOCOM, 2006."},{"key":"e_1_3_2_1_15_1","volume-title":"Security considerations for peer-to-peer distributed hash tables,\" In IPTPS","author":"Sil E.","year":"2002","unstructured":"E. Sil and R. Morris . \" Security considerations for peer-to-peer distributed hash tables,\" In IPTPS , 2002 . E. Sil and R. Morris. \" Security considerations for peer-to-peer distributed hash tables,\" In IPTPS, 2002."},{"key":"e_1_3_2_1_16_1","unstructured":"The VideoCloud web page (March 2011). http:\/\/xf.qq.com\/help\\_video.html.  The VideoCloud web page (March 2011). http:\/\/xf.qq.com\/help\\_video.html."},{"key":"e_1_3_2_1_17_1","unstructured":"The QQCyclone platform. http:\/\/xf.qq.com.  The QQCyclone platform. http:\/\/xf.qq.com."},{"key":"e_1_3_2_1_18_1","unstructured":"Amazon S3 web site. http:\/\/aws.amazon.com\/s3.  Amazon S3 web site. http:\/\/aws.amazon.com\/s3."},{"key":"e_1_3_2_1_19_1","unstructured":"MS Azure. http:\/\/www.microsoft.com\/windowsazure.  MS Azure. http:\/\/www.microsoft.com\/windowsazure."},{"key":"e_1_3_2_1_20_1","unstructured":"Dropbox web site. http:\/\/www.dropbox.com.  Dropbox web site. http:\/\/www.dropbox.com."},{"key":"e_1_3_2_1_21_1","unstructured":"Youku web site. http:\/\/www.youku.com.  Youku web site. http:\/\/www.youku.com."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.911156"},{"key":"e_1_3_2_1_23_1","unstructured":"The ChinaCache CDN web site. http:\/\/www.chinacache.com.  The ChinaCache CDN web site. http:\/\/www.chinacache.com."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631279"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2107563"},{"key":"e_1_3_2_1_26_1","unstructured":"USee web site. http:\/\/www.uusee.com.  USee web site. http:\/\/www.uusee.com."},{"key":"e_1_3_2_1_27_1","unstructured":"http:\/\/www.webtvwire.com\/category\/internet-hdtv.  http:\/\/www.webtvwire.com\/category\/internet-hdtv."},{"key":"e_1_3_2_1_28_1","volume-title":"Novasky: Cinematic-Quality VoD in a P2P Storage Cloud,\" In IEEE INFOCOM","author":"Liu F.","year":"2011","unstructured":"F. Liu , S. Shen , B. Li , B. Li , H. Yin , and S. Li . \" Novasky: Cinematic-Quality VoD in a P2P Storage Cloud,\" In IEEE INFOCOM , 2011 . F. Liu, S. Shen, B. Li, B. Li, H. Yin, and S. Li. \"Novasky: Cinematic-Quality VoD in a P2P Storage Cloud,\" In IEEE INFOCOM, 2011."},{"key":"e_1_3_2_1_29_1","unstructured":"China Telecom. http:\/\/www.chinatelecom.com.cn.  China Telecom. http:\/\/www.chinatelecom.com.cn."},{"key":"e_1_3_2_1_30_1","unstructured":"China Unicom. http:\/\/www.chinaunicom.com.cn.  China Unicom. http:\/\/www.chinaunicom.com.cn."},{"key":"e_1_3_2_1_31_1","unstructured":"China Mobile. http:\/\/www.10086.cn.  China Mobile. http:\/\/www.10086.cn."},{"key":"e_1_3_2_1_32_1","unstructured":"CERNET (China Education and Research Network) web site. http:\/\/www.cernet.edu.cn.  CERNET (China Education and Research Network) web site. http:\/\/www.cernet.edu.cn."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402999"},{"key":"e_1_3_2_1_34_1","volume-title":"Taming the torrent,\" In ACM SIGCOMM","author":"Choffnes D.R.","year":"2008","unstructured":"D.R. Choffnes , and F.E. Bustamante . \" Taming the torrent,\" In ACM SIGCOMM , 2008 . D.R. Choffnes, and F.E. Bustamante. \"Taming the torrent,\" In ACM SIGCOMM, 2008."},{"key":"e_1_3_2_1_35_1","unstructured":"Amazon Cloud Drive web site. https:\/\/www.amazon.com\/clouddrive\/learnmore.  Amazon Cloud Drive web site. https:\/\/www.amazon.com\/clouddrive\/learnmore."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954341"},{"key":"e_1_3_2_1_37_1","first-page":"126","article-title":"Web caching and Zipf-like distributions: Evidence and implications","author":"Breslau L.","year":"1999","unstructured":"L. Breslau , P. Cao , L. Fan , G. Phillips , and S. Shenker . \" Web caching and Zipf-like distributions: Evidence and implications ,\" In IEEE INFOCOM , 1999 , pp. 126 - 134 . L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. \"Web caching and Zipf-like distributions: Evidence and implications,\" In IEEE INFOCOM, 1999, pp. 126 - 134.","journal-title":"IEEE INFOCOM"},{"key":"e_1_3_2_1_38_1","unstructured":"The IDC Desktop and Laptop Sales report. http:\/\/news.techworld.com\/sme\/3227696\/desktop-and-laptop-sales-to-grow-this-year.  The IDC Desktop and Laptop Sales report. http:\/\/news.techworld.com\/sme\/3227696\/desktop-and-laptop-sales-to-grow-this-year."},{"key":"e_1_3_2_1_39_1","unstructured":"Dell web site (March 2011). http:\/\/www.dell.com.  Dell web site (March 2011). http:\/\/www.dell.com."},{"key":"e_1_3_2_1_40_1","volume-title":"USA","author":"Croft B.","year":"2009","unstructured":"B. Croft , D. Metzler , and T. Strohman . \" Search engines: Information retrieval in practice,\" Addison-Wesley , USA , 2009 . B. Croft, D. Metzler, and T. Strohman. \"Search engines: Information retrieval in practice,\" Addison-Wesley, USA, 2009."}],"event":{"name":"MM '11: ACM Multimedia Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Scottsdale Arizona USA","acronym":"MM '11"},"container-title":["Proceedings of the 19th ACM international conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2072298.2072327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2072298.2072327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:13Z","timestamp":1750241173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2072298.2072327"}},"subtitle":["using cloud utilities to achieve high-quality content distribution for unpopular videos"],"short-title":[],"issued":{"date-parts":[[2011,11,28]]},"references-count":39,"alternative-id":["10.1145\/2072298.2072327","10.1145\/2072298"],"URL":"https:\/\/doi.org\/10.1145\/2072298.2072327","relation":{},"subject":[],"published":{"date-parts":[[2011,11,28]]},"assertion":[{"value":"2011-11-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}