{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:17Z","timestamp":1763468057029,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T00:00:00Z","timestamp":1323129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-0331653NSF-0520187CNS-0520210CNS-0721574"],"award-info":[{"award-number":["NSF-0331653NSF-0520187CNS-0520210CNS-0721574"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["NSF-0331653NSF-0520187CNS-0520210CNS-0721574"],"award-info":[{"award-number":["NSF-0331653NSF-0520187CNS-0520210CNS-0721574"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,6]]},"DOI":"10.1145\/2079296.2079302","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["On route aggregation"],"prefix":"10.1145","author":[{"given":"Franck","family":"Le","sequence":"first","affiliation":[{"name":"IBM T. J. Watson"}]},{"given":"Geoffrey G.","family":"Xie","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School"}]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2011,12,6]]},"reference":[{"unstructured":"BGP Routing Table Analysis Reports. http:\/\/bgp.potaroo.net\/.  BGP Routing Table Analysis Reports. http:\/\/bgp.potaroo.net\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"Cisco IOS IP Configuration Guide Release 12.2.  Cisco IOS IP Configuration Guide Release 12.2.","key":"e_1_3_2_1_2_1"},{"unstructured":"Cisco IOS Release 12.0 Network Protocols Configuration Guide.  Cisco IOS Release 12.0 Network Protocols Configuration Guide.","key":"e_1_3_2_1_3_1"},{"unstructured":"Internet Systems Consortium. www.isc.org.  Internet Systems Consortium. www.isc.org.","key":"e_1_3_2_1_4_1"},{"unstructured":"IRTF Routing Research Group. www.irtf.org.  IRTF Routing Research Group. www.irtf.org.","key":"e_1_3_2_1_5_1"},{"volume-title":"NSDI","year":"2009","author":"Ballani H.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"302","volume-title":"Networking","author":"Bi J.","year":"2008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1644893.1644923"},{"unstructured":"Cisco. Understanding Route Aggregation in BGP August 2005.  Cisco. Understanding Route Aggregation in BGP August 2005.","key":"e_1_3_2_1_9_1"},{"unstructured":"Cisco. What is Administrative Distance? March 2006.  Cisco. What is Administrative Distance? March 2006.","key":"e_1_3_2_1_10_1"},{"volume-title":"Retrieved","year":"2010","key":"e_1_3_2_1_11_1"},{"unstructured":"C. Filsfils S. Previdi and G. Swallow. IS-IS Detailed IP Reachability Extension 2008. Internet Draft draft-swallow-isis-detailed-reach-01.txt.  C. Filsfils S. Previdi and G. Swallow. IS-IS Detailed IP Reachability Extension 2008. Internet Draft draft-swallow-isis-detailed-reach-01.txt.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"crossref","unstructured":"V. Fuller and T. Li. Classless Inter-domain routing (CIDR): The Internet Address Assignment and Aggregation Plan 2006. Request for Comments 4632.  V. Fuller and T. Li. Classless Inter-domain routing (CIDR): The Internet Address Assignment and Aggregation Plan 2006. Request for Comments 4632.","key":"e_1_3_2_1_13_1","DOI":"10.17487\/rfc4632"},{"doi-asserted-by":"crossref","unstructured":"V. Fuller T. Li J. Yu and K. Varadhan. Supernetting: an Address Assignment and Aggregation Strategy 1992. Request for Comments 1338.   V. Fuller T. Li J. Yu and K. Varadhan. Supernetting: an Address Assignment and Aggregation Strategy 1992. Request for Comments 1338.","key":"e_1_3_2_1_14_1","DOI":"10.17487\/rfc1338"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/90.993304"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1080091.1080094"},{"unstructured":"G. Huston. Analyzing the Internet's BGP Routing Table January 2001.  G. Huston. Analyzing the Internet's BGP Routing Table January 2001.","key":"e_1_3_2_1_17_1"},{"volume-title":"Retrieved","year":"2010","key":"e_1_3_2_1_18_1"},{"volume-title":"Studying Black Holes in the Internet with Hubble. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)","year":"2008","author":"Katz-Bassett E.","key":"e_1_3_2_1_19_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/1273445.1273450"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/ICNP.2007.4375839"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1544012.1544021"},{"year":"1998","journal-title":"G. Malkin. RIP Version","first-page":"2","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"crossref","unstructured":"D. Meyer L. Zhang and K. Fall. Report from the IAB Workshop on Routing and Addressing 2007. Request for Comments 4984.  D. Meyer L. Zhang and K. Fall. Report from the IAB Workshop on Routing and Addressing 2007. Request for Comments 4984.","key":"e_1_3_2_1_25_1","DOI":"10.17487\/rfc4984"},{"volume-title":"Cisco Press","year":"2004","author":"Oppenheimer P.","key":"e_1_3_2_1_26_1"},{"volume-title":"ACM Workshop on Hot Topics in Networks (HotNets-VII)","year":"2008","author":"Wang L.","key":"e_1_3_2_1_27_1"},{"volume-title":"Cisco Press","year":"2005","author":"White R.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1016\/j.comnet.2007.07.004"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.5555\/1833515.1833656"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"Co-NEXT '11","name":"Co-NEXT '11: Conference on emerging Networking Experiments and Technologies","location":"Tokyo Japan"},"container-title":["Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2079296.2079302","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2079296.2079302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:16Z","timestamp":1750241176000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2079296.2079302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,6]]},"references-count":29,"alternative-id":["10.1145\/2079296.2079302","10.1145\/2079296"],"URL":"https:\/\/doi.org\/10.1145\/2079296.2079302","relation":{},"subject":[],"published":{"date-parts":[[2011,12,6]]},"assertion":[{"value":"2011-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}