{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:23:35Z","timestamp":1725618215126},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/ifipnetworking.2015.7145304","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T17:28:09Z","timestamp":1436203689000},"page":"1-9","source":"Crossref","is-referenced-by-count":12,"title":["Traffic duplication through segmentable disjoint paths"],"prefix":"10.1109","author":[{"given":"Francois","family":"Aubry","sequence":"first","affiliation":[]},{"given":"David","family":"Lebrun","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Deville","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1993","author":"ahuja","journal-title":"Network Flows Theory Algorithms and Applications","key":"ref32"},{"year":"2004","author":"grover","journal-title":"Mesh-Based Survivable Networks","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TNET.2011.2144616"},{"key":"ref10","article-title":"Segment Routing Architecture","author":"filsfils","year":"2014","journal-title":"Internet draft draft-filsfils-spring-segment-routing-00 work in progress"},{"year":"2014","author":"lebrun","journal-title":"Supporting IPv6 Segment Routing in the Linux kernel","key":"ref11"},{"key":"ref12","article-title":"Segment Routing Use Cases","author":"filsfils","year":"2014","journal-title":"Internet draft draft-filsfils-spring-segment-routing-use-cases-00 work in progress"},{"key":"ref13","article-title":"Deprecation of Type 0 Routing Headers in IPv 6","author":"abley","year":"2007","journal-title":"RFC 5095 (Proposed Standard)"},{"key":"ref14","article-title":"IPv6 Segment Routing Security Considerations","author":"vyncke","year":"2015","journal-title":"internet draft draft-vyncke-6man-segment-routing-security-02 work in progress"},{"year":"0","author":"russell","journal-title":"Netfilter Architecture","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2413176.2413206"},{"year":"2014","author":"aubry","journal-title":"Technical report Traffic duplication using segmentable disjoint paths","key":"ref17"},{"year":"2001","author":"cormen","journal-title":"Introduction to Algorithms","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/49.265708"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/JPROC.2010.2093850"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2535372.2535392"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/49.221209"},{"key":"ref3","article-title":"Wall street's quest to process data at the speed of light","author":"martin","year":"2007","journal-title":"Information Week"},{"year":"2004","author":"vasseur","journal-title":"Network Recovery Protection and Restoration of Optical SONET-SDH IP and MPLS","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/65.730750"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/COMST.2014.2375213"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2486001.2486014"},{"key":"ref7","article-title":"Tuning tcp parameters for the 21st century","author":"chu","year":"0","journal-title":"IETF"},{"year":"0","author":"insider","article-title":"Elite traders are getting access to data before everyone else","key":"ref2"},{"key":"ref9","article-title":"IPv6 Segment Routing Header (SRH)","author":"previdi","year":"2014","journal-title":"Internet draft draft-previdi-6man-segment-routing-header-03 work in progress"},{"key":"ref1","article-title":"Raging bulls: How wall street got addicted to light-speed trading","author":"adler","year":"2012","journal-title":"Wired"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/0166-218X(90)90024-7"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1070873.1070877"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TNET.2003.822655"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/972426.944766"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/40.748796"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/INFCOM.2013.6567015"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TNET.2007.893888"}],"event":{"name":"2015 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2015,5,20]]},"location":"Toulouse, France","end":{"date-parts":[[2015,5,22]]}},"container-title":["2015 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7128766\/7145285\/07145304.pdf?arnumber=7145304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:12:25Z","timestamp":1490364745000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7145304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ifipnetworking.2015.7145304","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}