{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T07:18:08Z","timestamp":1776755888186,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T00:00:00Z","timestamp":1355097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,10]]},"DOI":"10.1145\/2413176.2413179","type":"proceedings-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T15:12:21Z","timestamp":1355757141000},"page":"13-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Architecting for edge diversity"],"prefix":"10.1145","author":[{"given":"Fahad R.","family":"Dogar","sequence":"first","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]},{"given":"Peter","family":"Steenkiste","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,12,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Carnegie Mellon University Wireless Emulator. www.cs.cmu.edu\/~emulator\/.  Carnegie Mellon University Wireless Emulator. www.cs.cmu.edu\/~emulator\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Dynamic site acceleration. http:\/\/www.akamai.com\/html\/solutions\/dsa_curriculum.html.  Dynamic site acceleration. http:\/\/www.akamai.com\/html\/solutions\/dsa_curriculum.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Service Location Protocol. RFC 2608.  Service Location Protocol. RFC 2608."},{"key":"e_1_3_2_1_4_1","unstructured":"Vanlan. research.microsoft.com\/en-us\/projects\/vanlan\/.  Vanlan. research.microsoft.com\/en-us\/projects\/vanlan\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080849"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555355"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402997"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.580423"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080108"},{"key":"e_1_3_2_1_11_1","volume-title":"Performance enhancing proxies intended to mitigate link-related degradations","author":"Border J.","year":"2001","unstructured":"J. Border , Performance enhancing proxies intended to mitigate link-related degradations , 2001 . J. Border, et al. Performance enhancing proxies intended to mitigate link-related degradations, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52336"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/99517.99553"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/972426.944761"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1070873.1070887"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/972426.944763"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1403007.1403026"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814446"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409977"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409968"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863960"},{"key":"e_1_3_2_1_24_1","volume-title":"ACM Hotnets.","author":"Ford B.","year":"2008","unstructured":"B. Ford , J. Iyengar . Breaking up the transport logjam . In ACM Hotnets. 2008 . B. Ford, J. Iyengar. Breaking up the transport logjam. In ACM Hotnets. 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282403"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. 9th USENIX NSDI.","author":"Han D.","year":"2012","unstructured":"D. Han , : Efficient support for evolvable internetworking . In Proc. 9th USENIX NSDI. Apr. 2012 . D. Han, et al. XIA: Efficient support for evolvable internetworking. In Proc. 9th USENIX NSDI. Apr. 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_3_2_1_28_1","volume-title":"NSDI.","author":"Kandula S.","year":"2008","unstructured":"S. Kandula , FatVAP: Aggregating AP Backhaul Capacity to Maximize Throughput . In NSDI. April 2008 . S. Kandula, et al. FatVAP: Aggregating AP Backhaul Capacity to Maximize Throughput. In NSDI. April 2008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"e_1_3_2_1_30_1","first-page":"423","volume-title":"NSDI'09","author":"Li M.","year":"2009","unstructured":"M. Li , Block-switched networks: a new paradigm for wireless transport . In NSDI'09 , pp. 423 -- 436 . 2009 . M. Li, et al. Block-switched networks: a new paradigm for wireless transport. In NSDI'09, pp. 423--436. 2009."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851214"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. 9th USENIX NSDI.","author":"Nordstrom E.","year":"2012","unstructured":"E. Nordstrom , : An end-host stack for service-centric networking . In Proc. 9th USENIX NSDI. April 2012 . E. Nordstrom, et al. Serval: An end-host stack for service-centric networking. In Proc. 9th USENIX NSDI. April 2012."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868453"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/507670.507684"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633033"},{"key":"e_1_3_2_1_37_1","volume-title":"NSDI '06","author":"Tolia N.","unstructured":"N. Tolia , An architecture for internet data transfer . In NSDI '06 . N. Tolia, et al. An architecture for internet data transfer. In NSDI '06."},{"key":"e_1_3_2_1_38_1","first-page":"215","volume-title":"OSDI","author":"Walfish M.","year":"2004","unstructured":"M. Walfish , Middleboxes no longer considered harmful . OSDI , pp. 215 -- 230 , 2004 . M. Walfish, et al. Middleboxes no longer considered harmful. OSDI, pp. 215--230, 2004."}],"event":{"name":"CoNEXT '12: Conference on emerging Networking Experiments and Technologies","location":"Nice France","acronym":"CoNEXT '12","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 8th international conference on Emerging networking experiments and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413176.2413179","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2413176.2413179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:27Z","timestamp":1750234707000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413176.2413179"}},"subtitle":["supporting rich services over an unbundled transport"],"short-title":[],"issued":{"date-parts":[[2012,12,10]]},"references-count":36,"alternative-id":["10.1145\/2413176.2413179","10.1145\/2413176"],"URL":"https:\/\/doi.org\/10.1145\/2413176.2413179","relation":{},"subject":[],"published":{"date-parts":[[2012,12,10]]},"assertion":[{"value":"2012-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}