{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:59Z","timestamp":1750306919705,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,2,26]],"date-time":"2013-02-26T00:00:00Z","timestamp":1361836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,2,26]]},"DOI":"10.1145\/2444776.2444778","type":"proceedings-article","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T20:28:55Z","timestamp":1362515335000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Splitting the bill for mobile data with SIMlets"],"prefix":"10.1145","author":[{"given":"Himanshu","family":"Raj","sequence":"first","affiliation":[{"name":"Microsoft Research"}]},{"given":"Stefan","family":"Saroiu","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Alec","family":"Wolman","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Jitendra","family":"Padhye","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2013,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"University of Oregon Route Views Project. http:\/\/www.routeviews.org\/.  University of Oregon Route Views Project. http:\/\/www.routeviews.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"WindRider: A Mobile Network Neutrality Monitoring System. http:\/\/www.cs.northwestern.edu\/~ict992\/mobile.htm.  WindRider: A Mobile Network Neutrality Monitoring System. http:\/\/www.cs.northwestern.edu\/~ict992\/mobile.htm."},{"key":"e_1_3_2_1_3_1","volume-title":"ARM Technical White Paper","author":"Security ARM","year":"2005","unstructured":"ARM Security Technology -- Building a Secure System using TrustZone Technology . ARM Technical White Paper , 2005 -2009. ARM Security Technology -- Building a Secure System using TrustZone Technology. ARM Technical White Paper, 2005-2009."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/www.facebook.com\/blog\/blog.php? post=391295167130","author":"Free Facebook Mobile Fast","year":"2010","unstructured":"Fast and Free Facebook Mobile Access with 0.facebook.com. http:\/\/www.facebook.com\/blog\/blog.php? post=391295167130 , 2010 . Fast and Free Facebook Mobile Access with 0.facebook.com. http:\/\/www.facebook.com\/blog\/blog.php? post=391295167130, 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/thenextweb.com\/mobile\/2012\/11\/08\/google-and-globe-telecom-launch-freezone-for-mobile-access-to-web-and-select-google-sites\/","author":"Facebook The Phillipines","year":"2012","unstructured":"The Phillipines gets Facebook Zero-style free mobile access to Google services via Globe Telecom . http:\/\/thenextweb.com\/mobile\/2012\/11\/08\/google-and-globe-telecom-launch-freezone-for-mobile-access-to-web-and-select-google-sites\/ , 2012 . The Phillipines gets Facebook Zero-style free mobile access to Google services via Globe Telecom. http:\/\/thenextweb.com\/mobile\/2012\/11\/08\/google-and-globe-telecom-launch-freezone-for-mobile-access-to-web-and-select-google-sites\/, 2012."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of NSDI","author":"Dischinger M.","year":"2010","unstructured":"M. Dischinger , M. Marcon , S. Guha , K. P. Gummadi , R. Mahajan , and S. Saroiu . Glasnost: Enabling End Users to Detect Traffic Differentiation . In Proc. of NSDI , 2010 . M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan, and S. Saroiu. Glasnost: Enabling End Users to Detect Traffic Differentiation. In Proc. of NSDI, 2010."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of HotNets","author":"Gui C.","year":"2004","unstructured":"C. Gui , H. J. Wang , and W. Zhu . Smart-Phone Attacks and Defenses . In Proc. of HotNets , 2004 . C. Gui, H. J. Wang, and W. Zhu. Smart-Phone Attacks and Defenses. In Proc. of HotNets, 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342402"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814452"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_13_1","unstructured":"RYSAVY Research. Mobile Broadband Capacity Constraints And the Need for Optimization. http:\/\/www.rysavy.com\/Articles\/2010_02_Rysavy_Mobile_Broadband_Capacity_Constraints.pdf 2010.  RYSAVY Research. Mobile Broadband Capacity Constraints And the Need for Optimization. http:\/\/www.rysavy.com\/Articles\/2010_02_Rysavy_Mobile_Broadband_Capacity_Constraints.pdf 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184495"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294294"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398808"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633039"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658972"},{"key":"e_1_3_2_1_19_1","volume-title":"PC client specific TPM interface specification (TIS)","author":"Trusted Computing Group","year":"2005","unstructured":"Trusted Computing Group . PC client specific TPM interface specification (TIS) , 2005 . Trusted Computing Group. PC client specific TPM interface specification (TIS), 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"}],"event":{"name":"HotMobile '13: 14th Workshop on Mobile Computing Systems and Applications","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Jekyll Island Georgia","acronym":"HotMobile '13"},"container-title":["Proceedings of the 14th Workshop on Mobile Computing Systems and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2444776.2444778","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2444776.2444778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:20Z","timestamp":1750235720000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2444776.2444778"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,26]]},"references-count":20,"alternative-id":["10.1145\/2444776.2444778","10.1145\/2444776"],"URL":"https:\/\/doi.org\/10.1145\/2444776.2444778","relation":{},"subject":[],"published":{"date-parts":[[2013,2,26]]},"assertion":[{"value":"2013-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}