{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:51Z","timestamp":1750306611494,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T00:00:00Z","timestamp":1417478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1040781"],"award-info":[{"award-number":["CNS-1040781"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-06-3-0001"],"award-info":[{"award-number":["W911NF-06-3-0001"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"name":"US Army Research Laboratory and the UK Ministry of Defense","award":["W911NF-06-3-0001"],"award-info":[{"award-number":["W911NF-06-3-0001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,12,2]]},"DOI":"10.1145\/2674005.2675007","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"263-270","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["MSPlayer"],"prefix":"10.1145","author":[{"given":"Yung-Chih","family":"Chen","sequence":"first","affiliation":[{"name":"University of Massachusetts at Amherst, Amherst, MA, USA"}]},{"given":"Don","family":"Towsley","sequence":"additional","affiliation":[{"name":"University of Massachusetts at Amherst, Amherst, MA, USA"}]},{"given":"Ramin","family":"Khalili","sequence":"additional","affiliation":[{"name":"Deutsche Telekom\/TU-Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,12,2]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/INFCOM.2012.6195531"},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE INFOCOM","author":"Adhikari V. K.","year":"2012","unstructured":"V. K. Adhikari , S. Jain , Y. Chen , and Z.-L. Zhang . Vivisecting youtube : An active measurement study . In IEEE INFOCOM , 2012 . V. K. Adhikari, S. Jain, Y. Chen, and Z.-L. Zhang. Vivisecting youtube: An active measurement study. In IEEE INFOCOM, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/ICCCN.2011.6006028"},{"unstructured":"Adobe HTTP dynamic streaming. www.adobe.com\/products\/hds-dynamic-streaming.html.  Adobe HTTP dynamic streaming. www.adobe.com\/products\/hds-dynamic-streaming.html.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2229087.2229092"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1943552.1943574"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/RTSS.2013.14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2504730.2504751"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2043164.2018478"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2068816.2068849"},{"unstructured":"A. Ford C. Raiciu M. Handley and O. Bonaventure. RFC 6824: TCP Extensions for Multipath Operation with Multiple Addresses.  A. Ford C. Raiciu M. Handley and O. Bonaventure. RFC 6824: TCP Extensions for Multipath Operation with Multiple Addresses.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX ATC","author":"Ghobadi M.","year":"2012","unstructured":"M. Ghobadi , Y. Cheng , A. Jain , and M. Mathis . Trickle: Rate limiting youtube video streaming . In USENIX ATC , 2012 . M. Ghobadi, Y. Cheng, A. Jain, and M. Mathis. Trickle: Rate limiting youtube video streaming. In USENIX ATC, 2012."},{"unstructured":"Google APIs Client Library. https:\/\/developers.google.com\/api-client-library\/.  Google APIs Client Library. https:\/\/developers.google.com\/api-client-library\/.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/ICME.2011.6012028"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/2535828.2535830"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/2068816.2068834"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2486001.2486006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/2398776.2398800"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2413176.2413189"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2398776.2398799"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/2155555.2155558"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX NSDI","author":"Raiciu C.","year":"2012","unstructured":"C. Raiciu , C. Paasch , S. Barre , A. Ford , M. Honda , F. Duchene , O. Bonaventure , and M. Handley . How hard can it be? Designing and implementing a deployable multipath TCP . In USENIX NSDI , 2012 . C. Raiciu, C. Paasch, S. Barre, A. Ford, M. Honda, F. Duchene, O. Bonaventure, and M. Handley. How hard can it be? Designing and implementing a deployable multipath TCP. In USENIX NSDI, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/2079296.2079321"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1943552.1943572"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"CoNEXT '14","name":"CoNEXT '14: Conference on emerging Networking Experiments and Technologies","location":"Sydney Australia"},"container-title":["Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2674005.2675007","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2674005.2675007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:17:04Z","timestamp":1750227424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2674005.2675007"}},"subtitle":["Multi-Source and multi-Path LeverAged YoutubER"],"short-title":[],"issued":{"date-parts":[[2014,12,2]]},"references-count":24,"alternative-id":["10.1145\/2674005.2675007","10.1145\/2674005"],"URL":"https:\/\/doi.org\/10.1145\/2674005.2675007","relation":{},"subject":[],"published":{"date-parts":[[2014,12,2]]},"assertion":[{"value":"2014-12-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}