{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T06:00:25Z","timestamp":1763704825531,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,15]],"date-time":"2013-04-15T00:00:00Z","timestamp":1365984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0964465, CNS-1054233"],"award-info":[{"award-number":["IIS-0964465, CNS-1054233"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"name":"AmazonWeb Services in Education"},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["IIS-0964465, CNS-1054233"],"award-info":[{"award-number":["IIS-0964465, CNS-1054233"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,15]]},"DOI":"10.1145\/2465351.2465379","type":"proceedings-article","created":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T19:57:35Z","timestamp":1366228655000},"page":"281-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Maygh"],"prefix":"10.1145","author":[{"given":"Liang","family":"Zhang","sequence":"first","affiliation":[{"name":"Northeastern University"}]},{"given":"Fangfei","family":"Zhou","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Alan","family":"Mislove","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Ravi","family":"Sundaram","sequence":"additional","affiliation":[{"name":"Northeastern University"}]}],"member":"320","published-online":{"date-parts":[[2013,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"NSDI","author":"Aditya P.","year":"2012","unstructured":"P. Aditya , M. Zhao , Y. Lin , A. Haeberlen , P. Druschel , B. Maggs , and B. Wishon . Reliable Client Accounting for P2P-Infrastructure Hybrids . NSDI , 2012 . P. Aditya, M. Zhao, Y. Lin, A. Haeberlen, P. Druschel, B. Maggs, and B. Wishon. Reliable Client Accounting for P2P-Infrastructure Hybrids. NSDI, 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"e_1_3_2_1_3_1","unstructured":"Adblock Plus: Statistics for Adblock Plus. http:\/\/bit.ly\/10WEytx.  Adblock Plus: Statistics for Adblock Plus. http:\/\/bit.ly\/10WEytx."},{"key":"e_1_3_2_1_4_1","unstructured":"Akamai NetSession. http:\/\/www.akamai.com\/client.  Akamai NetSession. http:\/\/www.akamai.com\/client."},{"key":"e_1_3_2_1_5_1","unstructured":"Alexa - Top Sites in the United States. http:\/\/www.alexa.com\/topsites\/countries;1\/US.  Alexa - Top Sites in the United States. http:\/\/www.alexa.com\/topsites\/countries;1\/US."},{"key":"e_1_3_2_1_6_1","unstructured":"Alexa Top 500 Global Sites. http:\/\/www.alexa.com\/topsites.  Alexa Top 500 Global Sites. http:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_1_7_1","unstructured":"ArcusNode. https:\/\/github.com\/OpenRTMFP\/ArcusNode.  ArcusNode. https:\/\/github.com\/OpenRTMFP\/ArcusNode."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/967900.968238"},{"key":"e_1_3_2_1_9_1","unstructured":"BitTorrent. http:\/\/www.bittorrent.com.  BitTorrent. http:\/\/www.bittorrent.com."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390252"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945458"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298313"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516410"},{"key":"e_1_3_2_1_14_1","unstructured":"Etsy. http:\/\/www.etsy.com.  Etsy. http:\/\/www.etsy.com."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285287"},{"key":"e_1_3_2_1_16_1","volume-title":"IETF","author":"Fielding R.","year":"1999","unstructured":"R. Fielding , J. Gettys , J. Mogul , H. Frystyk , L. Masinter , P. Leach , and T. Berners-Lee . Hypertext Transfer Protocol -- HTTP\/1.1. RFC 2616 , IETF , 1999 . R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext Transfer Protocol -- HTTP\/1.1. RFC 2616, IETF, 1999."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_3_2_1_18_1","volume-title":"NSDI","author":"Freedman M. J.","year":"2004","unstructured":"M. J. Freedman , E. Freudenthal , and D. Mazi\u00e8res . Democratizing content publication with Coral . NSDI , 2004 . M. J. Freedman, E. Freudenthal, and D. Mazi\u00e8res. Democratizing content publication with Coral. NSDI, 2004."},{"key":"e_1_3_2_1_19_1","unstructured":"Adobe Flash Player Statistics. http:\/\/www.adobe.com\/products\/flashplatformruntimes\/statistics.html.  Adobe Flash Player Statistics. http:\/\/www.adobe.com\/products\/flashplatformruntimes\/statistics.html."},{"key":"e_1_3_2_1_20_1","volume-title":"HotOS","author":"Gupta A.","year":"2003","unstructured":"A. Gupta , B. Liskov , and R. Rodrigues . One Hop Lookups for Peer-to-Peer Overlays . HotOS , 2003 . A. Gupta, B. Liskov, and R. Rodrigues. One Hop Lookups for Peer-to-Peer Overlays. HotOS, 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2007.907451"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571861"},{"key":"e_1_3_2_1_23_1","volume-title":"Thesis","author":"Ihm S.","year":"2011","unstructured":"S. Ihm . Understanding and Improving Modern Web Traffic Caching. Ph.D . Thesis , Princeton University , 2011 . S. Ihm. Understanding and Improving Modern Web Traffic Caching. Ph.D. Thesis, Princeton University, 2011."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068845"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"e_1_3_2_1_27_1","volume-title":"NSDI","author":"Kandula S.","year":"2005","unstructured":"S. Kandula , D. Katabi , M. Jacob , and A. Berger . Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds . NSDI , 2005 . S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds. NSDI, 2005."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835513"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX ATC","author":"Lillibridge M.","year":"2003","unstructured":"M. Lillibridge , S. Elnikety , A. Birrell , M. Burrows , and M. Isard . A Cooperative Internet Backup Scheme . USENIX ATC , 2003 . M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. A Cooperative Internet Backup Scheme. USENIX ATC, 2003."},{"key":"e_1_3_2_1_30_1","volume-title":"NFL Pushes HD Video, with Help from Akamai","author":"Lawler R.","year":"2010","unstructured":"R. Lawler . NFL Pushes HD Video, with Help from Akamai . 2010 . http:\/\/gigaom.com\/2010\/09\/22\/nfl-pushes-hd-video-with-help-from-akamai\/. R. Lawler. NFL Pushes HD Video, with Help from Akamai. 2010. http:\/\/gigaom.com\/2010\/09\/22\/nfl-pushes-hd-video-with-help-from-akamai\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_32_1","unstructured":"Most Popular Extensions:: Add-ons for Firefox. http:\/\/bit.ly\/122o6ge.  Most Popular Extensions:: Add-ons for Firefox. http:\/\/bit.ly\/122o6ge."},{"key":"e_1_3_2_1_33_1","first-page":"Q1","year":"2010","unstructured":"Mozilla Metrics Report , Q1 2010 . http:\/\/mzl.la\/aplroe. Mozilla Metrics Report, Q1 2010. http:\/\/mzl.la\/aplroe.","journal-title":"Mozilla Metrics Report"},{"key":"e_1_3_2_1_34_1","unstructured":"Node.js Framework. http:\/\/nodejs.org\/.  Node.js Framework. http:\/\/nodejs.org\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879145"},{"key":"e_1_3_2_1_36_1","volume-title":"NSDI","author":"Park K.","year":"2006","unstructured":"K. Park and V. S. Pai . Scale and Performance in the CoBlitz Large-File Distribution Service . NSDI , 2006 . K. Park and V. S. Pai. Scale and Performance in the CoBlitz Large-File Distribution Service. NSDI, 2006."},{"key":"e_1_3_2_1_37_1","volume-title":"IETF","author":"Rosenberg J.","year":"2010","unstructured":"J. Rosenberg . Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer\/Answer Protocols. RFC 5245 , IETF , 2010 . J. Rosenberg. Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer\/Answer Protocols. RFC 5245, IETF, 2010."},{"key":"e_1_3_2_1_38_1","volume-title":"IETF","author":"Rosenberg J.","year":"2008","unstructured":"J. Rosenberg , R. Mahy , P. Matthews , and D. Wing . Session Traversal Utilities for NAT (STUN). RFC 5389 (Proposed Standard) , IETF , 2008 . J. Rosenberg, R. Mahy, P. Matthews, and D. Wing. Session Traversal Utilities for NAT (STUN). RFC 5389 (Proposed Standard), IETF, 2008."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2007.79"},{"key":"e_1_3_2_1_40_1","unstructured":"Real-Time Media Flow Protocol (RTMFP) FAQ. http:\/\/www.adobe.com\/products\/flashmediaserver\/rtmfp_faq\/.  Real-Time Media Flow Protocol (RTMFP) FAQ. http:\/\/www.adobe.com\/products\/flashmediaserver\/rtmfp_faq\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2022157"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/645532.656170"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5160956"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963471"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687941"},{"key":"e_1_3_2_1_49_1","unstructured":"Stanford Javascript Crypto Library. http:\/\/crypto.stanford.edu\/sjcl\/.  Stanford Javascript Crypto Library. http:\/\/crypto.stanford.edu\/sjcl\/."},{"key":"e_1_3_2_1_50_1","volume-title":"IPTPS","author":"Terrace J.","year":"2009","unstructured":"J. Terrace , H. Laidlaw , H. E. Liu , S. Stern , and M. J. Freedman . Bringing P2P to the Web: Security and Privacy in the Firecoral Network . IPTPS , 2009 . J. Terrace, H. Laidlaw, H. E. Liu, S. Stern, and M. J. Freedman. Bringing P2P to the Web: Security and Privacy in the Firecoral Network. IPTPS, 2009."},{"key":"e_1_3_2_1_51_1","volume-title":"Dynamic replica placement and traffic redirection in content delivery networks","author":"Vicari C.","year":"2007","unstructured":"C. Vicari , C. Petrioli , and F. L. Presti . Dynamic replica placement and traffic redirection in content delivery networks . 2007 . C. Vicari, C. Petrioli, and F. L. Presti. Dynamic replica placement and traffic redirection in content delivery networks. 2007."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319153"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080103"},{"key":"e_1_3_2_1_54_1","volume-title":"USENIX ATC","author":"Wang L.","year":"2004","unstructured":"L. Wang , K. Park , R. Pang , V. S. Pai , and L. Peterson . Reliability and Security in the CoDeeN Content Distribution Network . USENIX ATC , 2004 . L. Wang, K. Park, R. Pang, V. S. Pai, and L. Peterson. Reliability and Security in the CoDeeN Content Distribution Network. USENIX ATC, 2004."},{"key":"e_1_3_2_1_55_1","volume-title":"NETWORKING","author":"Wang X.","year":"2002","unstructured":"X. Wang , W. S. Ng , B. C. Ooi , K.-L. Tan , and A. Zhou . BuddyWeb: A P2P-Based Collaborative Web Caching System . NETWORKING , 2002 . X. Wang, W. S. Ng, B. C. Ooi, K.-L. Tan, and A. Zhou. BuddyWeb: A P2P-Based Collaborative Web Caching System. NETWORKING, 2002."},{"key":"e_1_3_2_1_56_1","unstructured":"W3C Indexed Database API. http:\/\/www.w3.org\/TR\/IndexedDB.  W3C Indexed Database API. http:\/\/www.w3.org\/TR\/IndexedDB."},{"key":"e_1_3_2_1_57_1","unstructured":"W3C Real-Time Communications Working Group. http:\/\/www.w3.org\/2011\/04\/webrtc-charter.html.  W3C Real-Time Communications Working Group. http:\/\/www.w3.org\/2011\/04\/webrtc-charter.html."},{"key":"e_1_3_2_1_58_1","unstructured":"W3C Web Workers. http:\/\/www.w3.org\/TR\/workers\/.  W3C Web Workers. http:\/\/www.w3.org\/TR\/workers\/."},{"key":"e_1_3_2_1_59_1","unstructured":"W3C WebStorage. http:\/\/www.w3.org\/TR\/webstorage\/.  W3C WebStorage. http:\/\/www.w3.org\/TR\/webstorage\/."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2012.41"},{"key":"e_1_3_2_1_61_1","unstructured":"N. C. Zakas. How many users have JavaScript disabled? 2010. http:\/\/developer.yahoo.com\/blogs\/ydn\/posts\/2010\/10\/how-many-users-have-javascript-disabled\/.  N. C. Zakas. How many users have JavaScript disabled? 2010. http:\/\/developer.yahoo.com\/blogs\/ydn\/posts\/2010\/10\/how-many-users-have-javascript-disabled\/."}],"event":{"name":"EuroSys '13: Eighth Eurosys Conference 2013","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Prague Czech Republic","acronym":"EuroSys '13"},"container-title":["Proceedings of the 8th ACM European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2465351.2465379","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2465351.2465379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:36Z","timestamp":1750235976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2465351.2465379"}},"subtitle":["building a CDN from client web browsers"],"short-title":[],"issued":{"date-parts":[[2013,4,15]]},"references-count":59,"alternative-id":["10.1145\/2465351.2465379","10.1145\/2465351"],"URL":"https:\/\/doi.org\/10.1145\/2465351.2465379","relation":{},"subject":[],"published":{"date-parts":[[2013,4,15]]},"assertion":[{"value":"2013-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}