{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:16Z","timestamp":1750306156406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T00:00:00Z","timestamp":1474848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,26]]},"DOI":"10.1145\/2984356.2984359","type":"proceedings-article","created":{"date-parts":[[2016,9,7]],"date-time":"2016-09-07T12:19:28Z","timestamp":1473250768000},"page":"83-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Content-Centric Networking at Internet Scale through The Integration of Name Resolution and Routing"],"prefix":"10.1145","author":[{"given":"J.J.","family":"Garcia-Luna-Aceves","sequence":"first","affiliation":[{"name":"UCSC"}]},{"given":"Maziar","family":"Mirzazad-Barijough","sequence":"additional","affiliation":[{"name":"UCSC"}]},{"given":"Ehsan","family":"Hemmati","sequence":"additional","affiliation":[{"name":"UCSC"}]}],"member":"320","published-online":{"date-parts":[[2016,9,26]]},"reference":[{"key":"e_1_3_2_1_1_2","volume-title":"ndnSIM: NDN simulator for ns-3","author":"Afanasyev A.","year":"2012","unstructured":"A. Afanasyev , \u201c ndnSIM: NDN simulator for ns-3 \u201d, University of California , Los Angeles , Tech. Rep, 2012 . A. Afanasyev et al., \u201cndnSIM: NDN simulator for ns-3\u201d, University of California, Los Angeles, Tech. Rep, 2012."},{"key":"e_1_3_2_1_2_2","volume-title":"Proc. IFIP Networking \u201813","author":"Afanasyev A.","year":"2013","unstructured":"A. Afanasyev , \u201c Interest-flooding Attack and Countermeasures in Named Data Networking ,\u201d Proc. IFIP Networking \u201813 , May 2013 . A. Afanasyev et al., \u201cInterest-flooding Attack and Countermeasures in Named Data Networking,\u201d Proc. IFIP Networking \u201813, May 2013."},{"key":"e_1_3_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179398"},{"key":"e_1_3_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"e_1_3_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384450"},{"key":"e_1_3_2_1_6_2","unstructured":"Content Centric Networking Project (CCN) {online}. http:\/\/www.ccnx.org\/releases\/latest\/doc\/technical\/  Content Centric Networking Project (CCN) {online}. http:\/\/www.ccnx.org\/releases\/latest\/doc\/technical\/"},{"key":"e_1_3_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660143"},{"key":"e_1_3_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497205"},{"key":"e_1_3_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2396556.2396600"},{"key":"e_1_3_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1977.1093711"},{"key":"e_1_3_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660141"},{"key":"e_1_3_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.35"},{"key":"e_1_3_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145302"},{"key":"e_1_3_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.5555\/2772722.2772741"},{"key":"e_1_3_2_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2015.7333306"},{"key":"e_1_3_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440637"},{"key":"e_1_3_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497197"},{"key":"e_1_3_2_1_18_2","volume-title":"Efficient Multicasting in Content-Centric Networks Using Datagrams","author":"Garcia-Luna-Aceves J.J.","year":"2016","unstructured":"J.J. Garcia-Luna-Aceves and M. Mirzazad-Barijough , \u201c Efficient Multicasting in Content-Centric Networks Using Datagrams ,\u201d IEEE Globecom \u201816, Washington, D.C. , 4\u20138 Dec. 2016 . J.J. Garcia-Luna-Aceves and M. Mirzazad-Barijough, \u201cEfficient Multicasting in Content-Centric Networks Using Datagrams,\u201d IEEE Globecom \u201816, Washington, D.C., 4\u20138 Dec. 2016."},{"key":"e_1_3_2_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"e_1_3_2_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070563"},{"key":"e_1_3_2_1_21_2","volume-title":"Proc. USENIX Symposium on Internet Technologies and Systems","author":"Gritter M.","year":"2001","unstructured":"M. Gritter and D. Cheriton , \u201c An Architecture for Content Routing Support in The Internet ,\u201d Proc. USENIX Symposium on Internet Technologies and Systems , Sept. 2001 . M. Gritter and D. Cheriton, \u201cAn Architecture for Content Routing Support in The Internet,\u201d Proc. USENIX Symposium on Internet Technologies and Systems, Sept. 2001."},{"key":"e_1_3_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/944773.944779"},{"key":"e_1_3_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810173"},{"key":"e_1_3_2_1_25_2","doi-asserted-by":"publisher","DOI":"10.5555\/1895726.1895741"},{"key":"e_1_3_2_1_26_2","unstructured":"NDN Pro ject {online}. http:\/\/www.named-data.net\/  NDN Pro ject {online}. http:\/\/www.named-data.net\/"},{"key":"e_1_3_2_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660155"},{"key":"e_1_3_2_1_28_2","first-page":"552","article-title":"System and Method for Information Object Routing in Computer Networks","volume":"7","author":"Raju J.","year":"2009","unstructured":"J. Raju , \u201c System and Method for Information Object Routing in Computer Networks ,\u201d U.S. Patent 7 , 552 ,233, June 23, 2009 J. Raju et al., \u201cSystem and Method for Information Object Routing in Computer Networks,\u201d U.S. Patent 7,552,233, June 23, 2009","journal-title":"U.S. Patent"},{"key":"e_1_3_2_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497240"},{"key":"e_1_3_2_1_30_2","doi-asserted-by":"publisher","DOI":"10.5555\/2537857.2537892"},{"key":"e_1_3_2_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810166"},{"key":"e_1_3_2_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/378580.378581"},{"key":"e_1_3_2_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2342488.2342505"},{"key":"e_1_3_2_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970719"},{"key":"e_1_3_2_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491225"},{"key":"e_1_3_2_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316227"},{"key":"e_1_3_2_1_37_2","volume-title":"IFIP Networking \u201813","author":"Wahlisch M.","year":"2013","unstructured":"M. Wahlisch , \u201c Lessons from the Past: Why Data-driven States Harm Future Information-Centric Networking ,\u201d IFIP Networking \u201813 , May 2013 . M. Wahlisch et al., \u201cLessons from the Past: Why Data-driven States Harm Future Information-Centric Networking,\u201d IFIP Networking \u201813, May 2013."},{"key":"e_1_3_2_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.009"},{"key":"e_1_3_2_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.35"},{"key":"e_1_3_2_1_40_2","volume-title":"USENIX NSDI \u201813","author":"Wang Y.","year":"2013","unstructured":"Y. Wang , \u201c Wire Speed Name Lookup: A GPU-based Approach ,\u201d USENIX NSDI \u201813 , 2013 . Y. Wang et al., \u201cWire Speed Name Lookup: A GPU-based Approach,\u201d USENIX NSDI \u201813, 2013."},{"key":"e_1_3_2_1_41_2","volume-title":"IEEE Communication Surveys and Tutorials","author":"Xylomenos G.","year":"2013","unstructured":"G. Xylomenos , \u201c A Survey of Information-centric Networking Research ,\u201d IEEE Communication Surveys and Tutorials , July 2013 . G. Xylomenos et al., \u201cA Survey of Information-centric Networking Research,\u201d IEEE Communication Surveys and Tutorials, July 2013."},{"key":"e_1_3_2_1_42_2","volume-title":"Reliably Scalable Name Prefix Lookup","author":"Yuan H.","year":"2012","unstructured":"H. Yuan and P. Crowley , \u201c Reliably Scalable Name Prefix Lookup ,\u201d proc. IEEE ICCCN \u201812, 2012 . H. Yuan and P. Crowley, \u201cReliably Scalable Name Prefix Lookup,\u201d proc. IEEE ICCCN \u201812, 2012."},{"key":"e_1_3_2_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"}],"event":{"name":"ICN'16: 3rd International Conference on Information-Centric Networking","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Kyoto Japan","acronym":"ICN'16"},"container-title":["Proceedings of the 3rd ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2984356.2984359","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2984356.2984359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:45Z","timestamp":1750217985000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2984356.2984359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,26]]},"references-count":42,"alternative-id":["10.1145\/2984356.2984359","10.1145\/2984356"],"URL":"https:\/\/doi.org\/10.1145\/2984356.2984359","relation":{},"subject":[],"published":{"date-parts":[[2016,9,26]]},"assertion":[{"value":"2016-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}