{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:08Z","timestamp":1750219808990,"version":"3.41.0"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,12,15]],"date-time":"2017-12-15T00:00:00Z","timestamp":1513296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2018,2,28]]},"abstract":"<jats:p>In developing countries, links are poor among domestic communities or internet service providers. Besides, international internet channels are suddenly blocked by such as Golden Shield (GS) in China. Offshore business communications are involved in these. To avoid such involvement, a seamless virtual network is proposed as an international business communication bridging solution. This uses Round Trip Time (RTT) based multiple thresholds for differential switch to Virtual Private Network (VPN) bypass. The characteristics are (1) using multiple threshold integrated differential calculus of RTT increase, a sign of the block is recognized as the steep staircase increase of RTT, (2) followed by the immediate automatic switch to VPN having RTT below 200ms. (3) Asymmetrically, only the absolute threshold value and continuation time are used to determine when to switch back. This method is analytically and statistically evaluated as being successful (below 3% errors), using around 200 cases of data on GS blocks. Furthermore, it has been validated by the real seamless usage in more than 20 offshore companies for three years. Besides response time in offshore applications, our method can also alleviate problems such as voice echoes and video jitters which irritate business users. These effects were validated analytically and by questionnaires to scores of business customers.<\/jats:p>","DOI":"10.1145\/3133325","type":"journal-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T13:22:44Z","timestamp":1513603364000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Seamless Virtual Network for International Business Continuity in Presence of Intentional Blocks"],"prefix":"10.1145","volume":"18","author":[{"given":"Hiroshi","family":"Fujikawa","sequence":"first","affiliation":[{"name":"Tokyo Denki University, Inzai, Chiba, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hirofumi","family":"Yamaki","sequence":"additional","affiliation":[{"name":"Tokyo Denki University, Inzai, Chiba, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Setsuo","family":"Tsuruta","sequence":"additional","affiliation":[{"name":"Tokyo Denki University, Inzai, Chiba, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,12,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1478462.1478502"},{"key":"e_1_2_1_2_1","volume-title":"Retrieved on","author":"China Amcham","year":"2016","unstructured":"Amcham China : American Chamber of Commerce in China. 2016 Business climate survey . Retrieved on May 29, 2016 from http:\/\/www.amchamchina.org\/policy-advocacy\/business-climate-survey\/. Amcham China: American Chamber of Commerce in China. 2016 Business climate survey. Retrieved on May 29, 2016 from http:\/\/www.amchamchina.org\/policy-advocacy\/business-climate-survey\/."},{"volume-title":"Proceedings of the 8th Annual Workshop on Hot Topics in Operating Systems (HotOS-VIII). 175--187","author":"Andersen D.","key":"e_1_2_1_3_1","unstructured":"D. Andersen , H. Balakrishnan , F. Kaashoek , and R. Morris . 2001. Resilient overlay networks . In Proceedings of the 8th Annual Workshop on Hot Topics in Operating Systems (HotOS-VIII). 175--187 . D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris. 2001. Resilient overlay networks. In Proceedings of the 8th Annual Workshop on Hot Topics in Operating Systems (HotOS-VIII). 175--187."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45550-0_20"},{"volume-title":"Proceedings of the 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies. 558--562","author":"Benetti D.","key":"e_1_2_1_5_1","unstructured":"D. Benetti , E. Damiani , and P. Houngue . 2008. VoIP echo suppression in critical environments . Proceedings of the 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies. 558--562 D. Benetti, E. Damiani, and P. Houngue. 2008. VoIP echo suppression in critical environments. Proceedings of the 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies. 558--562"},{"volume-title":"Proceedings of the Passive and Active Measurement Conference (PAM\u201907)","author":"Beverly R.","key":"e_1_2_1_6_1","unstructured":"R. Beverly , S. Bauer , and A. Berger . 2007. The internet's not a big truck: Toward quantifying network neutrality . In Proceedings of the Passive and Active Measurement Conference (PAM\u201907) . Louvain-la-neuve, Belgium, 135--144. R. Beverly, S. Bauer, and A. Berger. 2007. The internet's not a big truck: Toward quantifying network neutrality. In Proceedings of the Passive and Active Measurement Conference (PAM\u201907). Louvain-la-neuve, Belgium, 135--144."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2013.85"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the Conference on Passive and Active Measurement. 158--170","author":"Carlson R.","year":"2003","unstructured":"R. Carlson . 2003 . Developing the web100 based network diagnostic tool (NDT) . In Proceedings of the Conference on Passive and Active Measurement. 158--170 . R. Carlson. 2003. Developing the web100 based network diagnostic tool (NDT). In Proceedings of the Conference on Passive and Active Measurement. 158--170."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0432"},{"volume-title":"Proceedings of the USENIX Technical Conference. 7--19","author":"Cheng Y.-C.","key":"e_1_2_1_10_1","unstructured":"Y.-C. Cheng , U. Hoelzle , N. Cardwell , S. Savage , and G. M. Voelker . 2004. Monkey see, monkey do: A tool for TCP tracing and replaying . In Proceedings of the USENIX Technical Conference. 7--19 . Y.-C. Cheng, U. Hoelzle, N. Cardwell, S. Savage, and G. M. Voelker. 2004. Monkey see, monkey do: A tool for TCP tracing and replaying. In Proceedings of the USENIX Technical Conference. 7--19."},{"key":"e_1_2_1_11_1","volume-title":"Retrieved on","author":"North-South Divide China's","year":"2016","unstructured":"China's North-South Divide . 2016 . IIJ GIO CHINA Service: Overview . Retrieved on Jan. 21, 2017 from http:\/\/www.iij.ad.jp\/en\/svcsol\/service\/gio\/china\/. China's North-South Divide. 2016. IIJ GIO CHINA Service: Overview. Retrieved on Jan. 21, 2017 from http:\/\/www.iij.ad.jp\/en\/svcsol\/service\/gio\/china\/."},{"volume-title":"Regulation of commercial encryption codes","author":"China State Council","key":"e_1_2_1_12_1","unstructured":"China State Council . 2000. Regulation of commercial encryption codes . China State Council Directive No . 273. China State Council. 2000. Regulation of commercial encryption codes. China State Council Directive No. 273."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_2"},{"key":"e_1_2_1_14_1","volume-title":"Retrieved on","author":"Cohen B.","year":"2016","unstructured":"B. Cohen . The Bittorrent protocol specification bittorrent.org . Retrieved on March 24, 2016 from http:\/\/www.bittorrent.org\/beps\/bep_0003.html. B. Cohen. The Bittorrent protocol specification bittorrent.org. Retrieved on March 24, 2016 from http:\/\/www.bittorrent.org\/beps\/bep_0003.html."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586138"},{"key":"e_1_2_1_17_1","unstructured":"B. Davie and J. Gross. 2013. A stateless transport tunneling protocol for network virtualization (STT). Internet draft retrieved from Draft-davie-stt-08.pdf IETF. http:\/\/www.ibenit.com\/post\/22687196256\/a-stateless-transport-tunneling-protocol-for.  B. Davie and J. Gross. 2013. A stateless transport tunneling protocol for network virtualization (STT). Internet draft retrieved from Draft-davie-stt-08.pdf IETF. http:\/\/www.ibenit.com\/post\/22687196256\/a-stateless-transport-tunneling-protocol-for."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452523"},{"volume-title":"Proceedings of the USENIX Symposium on Networked System Design and Implementation (NSDI\u201910)","author":"Dischinger M.","key":"e_1_2_1_20_1","unstructured":"M. Dischinger , M. Marcon , S. Guha , K. P. Gummadi , R. Mahajan , and S. Saroiu . 2010. Glasnost: Enabling end users to detect traffic differentiation . In Proceedings of the USENIX Symposium on Networked System Design and Implementation (NSDI\u201910) . 405--418. M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan, and S. Saroiu. 2010. Glasnost: Enabling end users to detect traffic differentiation. In Proceedings of the USENIX Symposium on Networked System Design and Implementation (NSDI\u201910). 405--418."},{"key":"e_1_2_1_21_1","volume-title":"Project. Retrieved on","author":"EFF.","year":"2016","unstructured":"EFF. \u201c Test Your ISP \u201d Project. Retrieved on March 24, 2016 from http:\/\/www.eff.org\/testyourisp. EFF. \u201cTest Your ISP\u201d Project. Retrieved on March 24, 2016 from http:\/\/www.eff.org\/testyourisp."},{"key":"e_1_2_1_22_1","first-page":"375","article-title":"Provisioning IP backbone networks to support latency-sensitive traffic. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications","volume":"1","author":"Fraleigh C.","year":"2003","unstructured":"C. Fraleigh , F. Tobagi , and C. Diot . INFOCOM 2003 . Provisioning IP backbone networks to support latency-sensitive traffic. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications . IEEE Societies , 1 , 375 -- 385 .1. C. Fraleigh, F. Tobagi, and C. Diot. INFOCOM 2003. Provisioning IP backbone networks to support latency-sensitive traffic. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 1, 375--385.1.","journal-title":"IEEE Societies"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2015.128"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25560-1_22"},{"key":"e_1_2_1_25_1","volume-title":"Retrieved on","author":"China Great Firewall","year":"2016","unstructured":"Great Firewall of China . Retrieved on May 29, 2016 from www.greatfirewallofchina.org. Great Firewall of China. Retrieved on May 29, 2016 from www.greatfirewallofchina.org."},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"K. Hamzeh et al. 1999. RFC 2637\u2014Point-to-point tunneling protocol (PPTP). Network Working Group.   K. Hamzeh et al. 1999. RFC 2637\u2014Point-to-point tunneling protocol (PPTP). Network Working Group.","DOI":"10.17487\/rfc2637"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS\u201902)","author":"Ioannidis J.","key":"e_1_2_1_27_1","unstructured":"J. Ioannidis and S. M. Bellovin . 2002. Implementing pushback: Router-based defense against DDoS attacks . In Proceedings of the Network and Distributed System Security Symposium (NDSS\u201902) . 1--8. J. Ioannidis and S. M. Bellovin. 2002. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of the Network and Distributed System Security Symposium (NDSS\u201902). 1--8."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907294.2907318"},{"volume-title":"Proceedings of the International Conference on Computer Communications (INFOCOM\u201910)","author":"Kanuparthy P.","key":"e_1_2_1_29_1","unstructured":"P. Kanuparthy and C. Dovrolis . 2010. DiffProbe: Detecting ISP service discrimination . In Proceedings of the International Conference on Computer Communications (INFOCOM\u201910) . 113--126. P. Kanuparthy and C. Dovrolis. 2010. DiffProbe: Detecting ISP service discrimination. In Proceedings of the International Conference on Computer Communications (INFOCOM\u201910). 113--126."},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"S. Kent and K. Seo. 2005. RFC 4301\u2014Security architecture for the internet protocol. Network Working Group.  S. Kent and K. Seo. 2005. RFC 4301\u2014Security architecture for the internet protocol. Network Working Group.","DOI":"10.17487\/rfc4301"},{"key":"e_1_2_1_31_1","unstructured":"T. Koponen et al. 2014. Network virtualization in multi-tenant datacenters technical report TR2013-001E. International Computer Science Institute UC Berkeley.  T. Koponen et al. 2014. Network virtualization in multi-tenant datacenters technical report TR2013-001E. International Computer Science Institute UC Berkeley."},{"key":"e_1_2_1_32_1","doi-asserted-by":"crossref","unstructured":"J. Lau M. Townsley and I. Goyret. 2005. RFC 3931\u2014layer two tunneling protocol\u2014version 3 (L2TPv3). Network Working Group.  J. Lau M. Townsley and I. Goyret. 2005. RFC 3931\u2014layer two tunneling protocol\u2014version 3 (L2TPv3). Network Working Group.","DOI":"10.17487\/rfc3931"},{"volume-title":"Proceedings of 2016 World Automation Congress (WAC\u201916)","author":"Luo S.","key":"e_1_2_1_33_1","unstructured":"S. Luo , K. Ota , M. Dong , J. Wu , J. Li , and B. Pei . 2016. Toward high available SDN\/NFV-based virtual network service in multi-provider scenario . Proceedings of 2016 World Automation Congress (WAC\u201916) . 1--5. S. Luo, K. Ota, M. Dong, J. Wu, J. Li, and B. Pei. 2016. Toward high available SDN\/NFV-based virtual network service in multi-provider scenario. Proceedings of 2016 World Automation Congress (WAC\u201916). 1--5."},{"volume-title":"Citrix metaframe Xp: Advanced technical design guide. Brianmadden","author":"Madden B. S.","key":"e_1_2_1_34_1","unstructured":"B. S. Madden . 2003. Citrix metaframe Xp: Advanced technical design guide. Brianmadden . Com Publishing Group . B. S. Madden. 2003. Citrix metaframe Xp: Advanced technical design guide. Brianmadden.Com Publishing Group."},{"key":"e_1_2_1_35_1","volume-title":"Retrieved on","author":"Measurement Lab","year":"2016","unstructured":"Measurement Lab (M-Lab). Retrieved on March 24, 2016 from http:\/\/www.measurementlab.net\/. Measurement Lab (M-Lab). Retrieved on March 24, 2016 from http:\/\/www.measurementlab.net\/."},{"key":"e_1_2_1_36_1","volume-title":"Retrieved on","author":"National Science","year":"2016","unstructured":"National Science Foundation and the Plan\u00e8te group . Retrieved on March 24, 2016 from https:\/\/www.nsnam.org\/. National Science Foundation and the Plan\u00e8te group. Retrieved on March 24, 2016 from https:\/\/www.nsnam.org\/."},{"volume-title":"iPerf. Retrieved on","year":"2016","key":"e_1_2_1_37_1","unstructured":"NLANR\/DAST , iPerf. Retrieved on March 24, 2016 from http:\/\/sourceforge.net\/projects\/iperf\/. NLANR\/DAST, iPerf. Retrieved on March 24, 2016 from http:\/\/sourceforge.net\/projects\/iperf\/."},{"volume-title":"Proceedings of the USENIX Symposium on Networked System Design and Implementation (USENIX NSDI\u201914)","author":"Nobori D.","key":"e_1_2_1_38_1","unstructured":"D. Nobori and Y. Shinjo . 2014. VPN Gate: A volunteer-organized public VPN relay system with blocking resistance for bypassing government censorship firewalls . In Proceedings of the USENIX Symposium on Networked System Design and Implementation (USENIX NSDI\u201914) . 229--241. D. Nobori and Y. Shinjo. 2014. VPN Gate: A volunteer-organized public VPN relay system with blocking resistance for bypassing government censorship firewalls. In Proceedings of the USENIX Symposium on Networked System Design and Implementation (USENIX NSDI\u201914). 229--241."},{"key":"e_1_2_1_39_1","volume-title":"Retrieved on","author":"Ootsuka A.","year":"2017","unstructured":"A. Ootsuka . 2014. Retrieved on January 20, 2017 from http:\/\/ascii.jp\/elem\/000\/000\/933\/933306\/ (in Japanese) . A. Ootsuka. 2014. Retrieved on January 20, 2017 from http:\/\/ascii.jp\/elem\/000\/000\/933\/933306\/ (in Japanese)."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488222.2488265"},{"volume-title":"Proceedings of the SAINT Workshop. 108--209","author":"Paxson V.","key":"e_1_2_1_41_1","unstructured":"V. Paxson , A. K. Adams , and M. Mathis . 2002. Experiences with NIMI . Proceedings of the SAINT Workshop. 108--209 . V. Paxson, A. K. Adams, and M. Mathis. 2002. Experiences with NIMI. Proceedings of the SAINT Workshop. 108--209."},{"volume-title":"Retrieved on","year":"2016","key":"e_1_2_1_42_1","unstructured":"PlanetLab. Retrieved on March 24, 2016 from http:\/\/www.planet-lab.org\/. PlanetLab. Retrieved on March 24, 2016 from http:\/\/www.planet-lab.org\/."},{"key":"e_1_2_1_43_1","volume-title":"Retrieved on","author":"Business Run Skype","year":"2017","unstructured":"Run Skype for Business . 2016. Retrieved on Jan. 14, 2017 from https:\/\/www.citrix.com\/content\/dam\/citrix\/en_us\/documents\/products-solutions\/run-skype-for-business-as-a-secure-virtual-app-with-a-great-user-experience.pdf. Run Skype for Business. 2016. Retrieved on Jan. 14, 2017 from https:\/\/www.citrix.com\/content\/dam\/citrix\/en_us\/documents\/products-solutions\/run-skype-for-business-as-a-secure-virtual-app-with-a-great-user-experience.pdf."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102153"},{"volume-title":"Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS\u201914)","author":"Stojmenovic I.","key":"e_1_2_1_45_1","unstructured":"I. Stojmenovic and S. Wen . 2014. The fog computing paradigm: Scenarios and security issues . In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS\u201914) , 2, 1--8. I. Stojmenovic and S. Wen. 2014. The fog computing paradigm: Scenarios and security issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS\u201914), 2, 1--8."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658972"},{"key":"e_1_2_1_47_1","volume-title":"Retrieved on","author":"Project The DIMES","year":"2016","unstructured":"The DIMES Project . Retrieved on March 25, 2016 from http:\/\/www.netdimes.org\/. The DIMES Project. Retrieved on March 25, 2016 from http:\/\/www.netdimes.org\/."},{"key":"e_1_2_1_48_1","volume-title":"Retrieved on","author":"Broadband Speed Test The Global","year":"2016","unstructured":"The Global Broadband Speed Test . Retrieved on March 25, 2016 from http:\/\/www.speedtest.net. The Global Broadband Speed Test. Retrieved on March 25, 2016 from http:\/\/www.speedtest.net."},{"key":"e_1_2_1_49_1","volume-title":"Retrieved on","author":"Netalyzr The ICSI","year":"2016","unstructured":"The ICSI Netalyzr . Retrieved on March 25, 2016 from http:\/\/netalyzr.icsi.berkeley.edu. The ICSI Netalyzr. Retrieved on March 25, 2016 from http:\/\/netalyzr.icsi.berkeley.edu."},{"key":"e_1_2_1_50_1","volume-title":"Retrieved on","author":"Post The Washington","year":"2016","unstructured":"The Washington Post . 2016 . China's scary lesson to the world: Censoring the Internet works . Retrieved on March 25, 2016 from https:\/\/www.washingtonpost.com\/world\/asia_pacific\/chinas-scary-lesson-to-the-world-censoring-the-internet-works\/2016\/05\/23\/413afe78-fff3-11e5-8bb1-f124a43f84dc_story.html. The Washington Post. 2016. China's scary lesson to the world: Censoring the Internet works. Retrieved on March 25, 2016 from https:\/\/www.washingtonpost.com\/world\/asia_pacific\/chinas-scary-lesson-to-the-world-censoring-the-internet-works\/2016\/05\/23\/413afe78-fff3-11e5-8bb1-f124a43f84dc_story.html."},{"key":"e_1_2_1_51_1","volume-title":"In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS\u201915)","author":"Viptela","year":"2015","unstructured":"Viptela 2015 . In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS\u201915) . Retrieved on Jan. 22, 2017 from http:\/\/network-insight.net\/2015\/05\/viptela-software-defined-wan-sd-wan\/. Viptela 2015. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS\u201915). Retrieved on Jan. 22, 2017 from http:\/\/network-insight.net\/2015\/05\/viptela-software-defined-wan-sd-wan\/."},{"volume-title":"Retrieved on","year":"2016","key":"e_1_2_1_52_1","unstructured":"WebSitePulse. Website Monitoring 8 Web Server Monitoring Service by WebSitePulse . Retrieved on May 29, 2016 from http:\/\/www.websitepulse.com\/. WebSitePulse. Website Monitoring 8 Web Server Monitoring Service by WebSitePulse. Retrieved on May 29, 2016 from http:\/\/www.websitepulse.com\/."},{"volume-title":"Proceedings of the 7th ACM Workshop on Hot Topics in NetworksProc. 158--164","author":"Zhang Y.","key":"e_1_2_1_53_1","unstructured":"Y. Zhang , Z. M. Mao , and M. Zhang . 2008. Ascertaining the reality of network neutrality violation in backbone ISPs . Proceedings of the 7th ACM Workshop on Hot Topics in NetworksProc. 158--164 . Y. Zhang, Z. M. Mao, and M. Zhang. 2008. Ascertaining the reality of network neutrality violation in backbone ISPs. Proceedings of the 7th ACM Workshop on Hot Topics in NetworksProc. 158--164."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644905"},{"volume-title":"Retrieved on","year":"2016","key":"e_1_2_1_55_1","unstructured":"WeChat. Retrieved on May 30 2016 from http:\/\/www.wechat.com\/en\/. WeChat. Retrieved on May 30 2016 from http:\/\/www.wechat.com\/en\/."}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:34Z","timestamp":1750217434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,15]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,2,28]]}},"alternative-id":["10.1145\/3133325"],"URL":"https:\/\/doi.org\/10.1145\/3133325","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2017,12,15]]},"assertion":[{"value":"2016-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}