{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:43Z","timestamp":1750220623589,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T00:00:00Z","timestamp":1594944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,17]]},"DOI":"10.1145\/3411174.3411189","type":"proceedings-article","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T04:07:41Z","timestamp":1598501261000},"page":"103-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["MIR"],"prefix":"10.1145","author":[{"given":"Xinchun","family":"Zhang","sequence":"first","affiliation":[{"name":"Shenzhen Graduate School, Peking University, University Town, Shenzhen, P.R.China"}]},{"given":"Qinshu","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangdong Communications &amp; Networks Institute, Guangzhou, P.R.China"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"Shenzhen Graduate School, Peking University, University Town, Shenzhen, P.R.China"}]}],"member":"320","published-online":{"date-parts":[[2020,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ali M Nelson J Shea R etal Blockstack: A global naming and storage system secured by blockchains[C]\/\/2016 Annual Technical Conference 16). 2016: 181--194.  Ali M Nelson J Shea R et al. Blockstack: A global naming and storage system secured by blockchains[C]\/\/2016 Annual Technical Conference 16). 2016: 181--194."},{"key":"e_1_3_2_1_2_1","first-page":"961","article-title":"DNS server access control system and method","volume":"6","author":"Cook J","year":"2005","unstructured":"Cook J , Wu H , Foster L . DNS server access control system and method : U.S. Patent 6 , 961 ,783[P]. 2005 -11-1. Cook J, Wu H, Foster L. DNS server access control system and method: U.S. Patent 6,961,783[P]. 2005-11-1.","journal-title":"U.S. Patent"},{"key":"e_1_3_2_1_3_1","first-page":"158","article-title":"Named data networking (ndn) project[J]. Relat\u00f3rio T\u00e9cnico NDN-0001","volume":"157","author":"Zhang L","year":"2010","unstructured":"Zhang L , Estrin D , Burke J , Named data networking (ndn) project[J]. Relat\u00f3rio T\u00e9cnico NDN-0001 , Xerox Palo Alto Research Center-PARC , 2010 , 157 : 158 . Zhang L, Estrin D, Burke J, et al. Named data networking (ndn) project[J]. Relat\u00f3rio T\u00e9cnico NDN-0001, Xerox Palo Alto Research Center-PARC, 2010, 157: 158.","journal-title":"Xerox Palo Alto Research Center-PARC"},{"key":"e_1_3_2_1_4_1","unstructured":"(Research on End-to-End Model of Reconfigurable Information Communication Basal Network). \u8ba1\u7b97\u673a\u79d1\u5b66 44(6): 114--120 (2017)  (Research on End-to-End Model of Reconfigurable Information Communication Basal Network). \u8ba1\u7b97\u673a\u79d1\u5b66 44(6): 114--120 (2017)"},{"key":"e_1_3_2_1_5_1","volume-title":"AND WAI HO MOW, \"MIN: Co-Governing Multi-Identifier Network Architecture and Its Prototype on Operator's Network","author":"Hui LI","year":"2020","unstructured":"Hui LI , Jiangxing WU , Xin YANG, HAN WANG, KE XU, YUNYONG ZHANG, SHISHENG CHEN, FUSHENG ZHU, YIQIN LU , AND WAI HO MOW, \"MIN: Co-Governing Multi-Identifier Network Architecture and Its Prototype on Operator's Network \", IEEE Access , 2020 , 02 Hui LI, Jiangxing WU, Xin YANG, HAN WANG, KE XU, YUNYONG ZHANG, SHISHENG CHEN, FUSHENG ZHU, YIQIN LU, AND WAI HO MOW, \"MIN: Co-Governing Multi-Identifier Network Architecture and Its Prototype on Operator's Network\", IEEE Access, 2020, 02"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE 19th International Conference on High Performance Computing and Communications (HPCC). 466--473","author":"Kejiao Li","year":"2017","unstructured":"Kejiao Li , Hui Li, Hanxu Hou , Kedan Li, and Yongle Chen . 2017 . Proof of vote: A high-performance consensus proto-col based on vote mechanism & consortium blockchain . In IEEE 19th International Conference on High Performance Computing and Communications (HPCC). 466--473 . Kejiao Li, Hui Li, Hanxu Hou, Kedan Li, and Yongle Chen. 2017. Proof of vote: A high-performance consensus proto-col based on vote mechanism & consortium blockchain. In IEEE 19th International Conference on High Performance Computing and Communications (HPCC). 466--473."},{"key":"e_1_3_2_1_7_1","first-page":"6965","volume-title":"Proc of ICASSP","author":"Seltzer J.","year":"2013","unstructured":"M. L. Seltzer , J. Droppo, Multi-task learning in deep neural networks for improved phoneme recognition , Proc of ICASSP , pp. 6965 -- 6969 , May 2013 . M. L. Seltzer, J. Droppo, Multi-task learning in deep neural networks for improved phoneme recognition, Proc of ICASSP, pp. 6965--6969, May 2013."},{"key":"e_1_3_2_1_8_1","first-page":"3","volume-title":"Wireless Networks","author":"Cyberspace Mimic Defense","year":"2020","unstructured":"Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security. Wireless Networks , Springer 2020 , ISBN 978-3-030-29843-2, pp. 3 -- 735 Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security. Wireless Networks, Springer 2020, ISBN 978-3-030-29843-2, pp. 3--735"},{"key":"e_1_3_2_1_9_1","unstructured":"Sina Weibo weibo_senti_100k (DB\/OL) https:\/\/github.com\/SophonPlus\/blob\/master\/datasets\/intro.ipynb  Sina Weibo weibo_senti_100k (DB\/OL) https:\/\/github.com\/SophonPlus\/blob\/master\/datasets\/intro.ipynb"}],"event":{"name":"ICCCM'20: 2020 The 8th International Conference on Computer and Communications Management","sponsor":["Natl University of Singapore National University of Singapore","SFU Simon Fraser University","Western Michigan University Western Michigan University","University of Sydney Australia"],"location":"Singapore Singapore","acronym":"ICCCM'20"},"container-title":["Proceedings of the 8th International Conference on Computer and Communications Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411174.3411189","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411174.3411189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:27Z","timestamp":1750197687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411174.3411189"}},"subtitle":["Multi-Identifier Router and Its Prototype"],"short-title":[],"issued":{"date-parts":[[2020,7,17]]},"references-count":9,"alternative-id":["10.1145\/3411174.3411189","10.1145\/3411174"],"URL":"https:\/\/doi.org\/10.1145\/3411174.3411189","relation":{},"subject":[],"published":{"date-parts":[[2020,7,17]]},"assertion":[{"value":"2020-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}