{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:27Z","timestamp":1750307067357,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2342488.2342495","type":"proceedings-article","created":{"date-parts":[[2012,8,21]],"date-time":"2012-08-21T13:06:35Z","timestamp":1345554395000},"page":"25-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["An open content delivery infrastructure using data lockers"],"prefix":"10.1145","author":[{"given":"Richard","family":"Alimi","sequence":"first","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]},{"given":"Lijiang","family":"Chen","sequence":"additional","affiliation":[{"name":"HP Labs China, Beijing, China"}]},{"given":"Dirk","family":"Kutscher","sequence":"additional","affiliation":[{"name":"NEC Lab Europe, Heidelberg, Germany"}]},{"given":"Hongqiang Harry","family":"Liu","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, USA"}]},{"given":"Akbar","family":"Rahman","sequence":"additional","affiliation":[{"name":"InterDigital, Montreal, Canada"}]},{"given":"Haibin","family":"Song","sequence":"additional","affiliation":[{"name":"Huawei, Nanjing, China"}]},{"given":"Yang Richard","family":"Yang","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]},{"given":"David","family":"Zhang","sequence":"additional","affiliation":[{"name":"PPLive, Shanghai, China"}]},{"given":"Ning","family":"Zong","sequence":"additional","affiliation":[{"name":"Huawei, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(03)00033-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1403000"},{"key":"e_1_3_2_1_4_1","volume-title":"June","author":"Networking Cisco Visual","year":"2010","unstructured":"Cisco Visual Networking Index (VNI). Hyperconnectivity and the approaching zettabyte era , June 2010 . http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/VNI_Hyperconnectivity_WP.html. Cisco Visual Networking Index (VNI). Hyperconnectivity and the approaching zettabyte era, June 2010. http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/VNI_Hyperconnectivity_WP.html."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. 3rd GI\/ITG KuVS Workshop on The Future Internet","author":"Dannewitz C.","year":"2009","unstructured":"C. Dannewitz . NetInf : An information-centric design for the future Internet . In Proc. 3rd GI\/ITG KuVS Workshop on The Future Internet , 2009 . C. Dannewitz. NetInf: An information-centric design for the future Internet. In Proc. 3rd GI\/ITG KuVS Workshop on The Future Internet, 2009."},{"key":"e_1_3_2_1_6_1","unstructured":"IETF DECADE Working Group. http:\/\/www.ietf.org\/html.charters\/decade-charter.html.  IETF DECADE Working Group. http:\/\/www.ietf.org\/html.charters\/decade-charter.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945475"},{"key":"e_1_3_2_1_8_1","unstructured":"M. Hefeeda C. Hsu and K. Mokhtarian. pCache: A proxy cache for peer-to-peer traffic. ACM SIGCOMM'08 Technical Demonstration.  M. Hefeeda C. Hsu and K. Mokhtarian. pCache: A proxy cache for peer-to-peer traffic. ACM SIGCOMM'08 Technical Demonstration."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2008.4664146"},{"key":"e_1_3_2_1_10_1","volume-title":"Workshop. http:\/\/www.ietf.org\/internet-drafts\/draft-p2pi-cooper-workshop-report-00","author":"Pi IETF","year":"2008","unstructured":"IETF P2 Pi Workshop. http:\/\/www.ietf.org\/internet-drafts\/draft-p2pi-cooper-workshop-report-00 .txt, 2008 . IETF P2Pi Workshop. http:\/\/www.ietf.org\/internet-drafts\/draft-p2pi-cooper-workshop-report-00.txt, 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251092"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of WCW","author":"Leibowitz N.","year":"2002","unstructured":"N. Leibowitz , A. Bergman , R. Ben-Shaul , and A. Shavit . Are file swapping networks cacheable? characterizing P2P traffic . In Proc. of WCW , Boulder, CO , 2002 . N. Leibowitz, A. Bergman, R. Ben-Shaul, and A. Shavit. Are file swapping networks cacheable? characterizing P2P traffic. In Proc. of WCW, Boulder, CO, 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402987"},{"key":"e_1_3_2_1_16_1","unstructured":"MaxMind. http:\/\/www.maxmind.com\/.  MaxMind. http:\/\/www.maxmind.com\/."},{"key":"e_1_3_2_1_17_1","author":"Nakao A.","year":"2008","unstructured":"A. Nakao , K. Sasaki , and S. Yamamoto . A remedy for network operators against increasing P2P traffic: Enabling packet cache for P2P applications. IEICE Transactions on Communications , 2008 . A. Nakao, K. Sasaki, and S. Yamamoto. A remedy for network operators against increasing P2P traffic: Enabling packet cache for P2P applications. IEICE Transactions on Communications, 2008.","journal-title":"IEICE Transactions on Communications"},{"key":"e_1_3_2_1_18_1","unstructured":"Oversi. http:\/\/www.oversi.com\/index.php?option=com_content&task=view&id=48&Itemid=103.  Oversi. http:\/\/www.oversi.com\/index.php?option=com_content&task=view&id=48&Itemid=103."},{"key":"e_1_3_2_1_19_1","unstructured":"PeerApp. http:\/\/www.peerapp.com\/products-ultraband-How-Caching-Works.aspx.  PeerApp. http:\/\/www.peerapp.com\/products-ultraband-How-Caching-Works.aspx."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060319"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of IPTPS","author":"Shen G.","year":"2007","unstructured":"G. Shen , Y. Wang , Y. Xiong , B. Y. Zhao , and Z.-L. Zhang . HPTP : Relieving the tension between ISPs and P2P . In Proc. of IPTPS , Bellevue, WA , Feb. 2007 . G. Shen, Y. Wang, Y. Xiong, B. Y. Zhao, and Z.-L. Zhang. HPTP: Relieving the tension between ISPs and P2P. In Proc. of IPTPS, Bellevue, WA, Feb. 2007."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of GP2P","author":"Wierzbicki A.","year":"2004","unstructured":"A. Wierzbicki , N. Leibowitz , M. Ripeanu , and R. Wozniak . Cache replacement policies revisited . In Proc. of GP2P , Chicago, IL , 2004 . A. Wierzbicki, N. Leibowitz, M. Ripeanu, and R. Wozniak. Cache replacement policies revisited. In Proc. of GP2P, Chicago, IL, 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250844"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402999"},{"key":"e_1_3_2_1_27_1","volume-title":"Oct.","author":"Zhang L.","year":"2010","unstructured":"L. Zhang and V. Jacobson . Named data networking (NDN) project , Oct. 2010 . L. Zhang and V. Jacobson. Named data networking (NDN) project, Oct. 2010."}],"event":{"name":"SIGCOMM '12: ACM SIGCOMM 2012 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Helsinki Finland","acronym":"SIGCOMM '12"},"container-title":["Proceedings of the second edition of the ICN workshop on Information-centric networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342488.2342495","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2342488.2342495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:23Z","timestamp":1750238483000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342488.2342495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":25,"alternative-id":["10.1145\/2342488.2342495","10.1145\/2342488"],"URL":"https:\/\/doi.org\/10.1145\/2342488.2342495","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}