{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:37:38Z","timestamp":1742402258745,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,27]]},"DOI":"10.1145\/2486001.2486023","type":"proceedings-article","created":{"date-parts":[[2013,8,13]],"date-time":"2013-08-13T12:31:21Z","timestamp":1376397081000},"page":"147-158","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":161,"title":["Less pain, most of the gain"],"prefix":"10.1145","author":[{"given":"Seyed Kaveh","family":"Fayazbakhsh","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, USA"}]},{"given":"Yin","family":"Lin","sequence":"additional","affiliation":[{"name":"Duke University, Durham, USA"}]},{"given":"Amin","family":"Tootoonchian","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, Canada"}]},{"given":"Ali","family":"Ghodsi","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, USA"}]},{"given":"Teemu","family":"Koponen","sequence":"additional","affiliation":[{"name":"VMware, San Francisco, USA"}]},{"given":"Bruce","family":"Maggs","sequence":"additional","affiliation":[{"name":"Duke University, Durham, USA"}]},{"given":"K.C.","family":"Ng","sequence":"additional","affiliation":[{"name":"Akamai, Cambridge, USA"}]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, USA"}]},{"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,8,27]]},"reference":[{"issue":"7","key":"e_1_3_2_1_1_1","first-page":"2012","volume":"50","author":"Ahlgren B.","unstructured":"B. Ahlgren , C. Dannewitz , C. Imbrenda , D. Kutscher , and B. Ohlman . A survey of information-centric networking. Communications Magazine, IEEE , 50 ( 7 ), july 2012 . B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman. A survey of information-centric networking. Communications Magazine, IEEE, 50(7), july 2012.","journal-title":"A survey of information-centric networking. Communications Magazine, IEEE"},{"key":"e_1_3_2_1_2_1","unstructured":"P. A. Aranda M. Zitterbart Z. Boudjemil M. Ghader G. H. Garcia M. Johnsson A. Karouia G. Lazar M. Majanen P. Mannersalo D. Martin M. T. Nguyen S. P. Sanchez P. Phelan M. Ponce de Leon G. Schultz M. Sollner Y. Zaki and L. Zhao. 4WARD. http:\/\/www.4ward-project.eu\/ 2010. P. A. Aranda M. Zitterbart Z. Boudjemil M. Ghader G. H. Garcia M. Johnsson A. Karouia G. Lazar M. Majanen P. Mannersalo D. Martin M. T. Nguyen S. P. Sanchez P. Phelan M. Ponce de Leon G. Schultz M. Sollner Y. Zaki and L. Zhao. 4WARD. http:\/\/www.4ward-project.eu\/ 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018589"},{"key":"e_1_3_2_1_4_1","unstructured":"Browser Support for PAC and WPAD. http:\/\/findproxyforurl.com\/browser-support\/. Browser Support for PAC and WPAD. http:\/\/findproxyforurl.com\/browser-support\/."},{"key":"e_1_3_2_1_5_1","unstructured":"B. Baccala. Data-oriented networking. http:\/\/tools.ietf.org\/html\/draft-baccala-datanetworking-00 2002. B. Baccala. Data-oriented networking. http:\/\/tools.ietf.org\/html\/draft-baccala-datanetworking-00 2002."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. OSDI","author":"Beaver D.","year":"2010","unstructured":"D. Beaver , S. Kumar , H. C. Li , J. Sobel , and P. Vajgel . Finding a needle in haystack: Facebook's photo storage . In Proc. OSDI , 2010 . D. Beaver, S. Kumar, H. C. Li, J. Sobel, and P. Vajgel. Finding a needle in haystack: Facebook's photo storage. In Proc. OSDI, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"e_1_3_2_1_8_1","volume-title":"June","author":"Bryan A.","year":"2011","unstructured":"A. Bryan , N. McNab , T. Tsujikawa , P. Poeml , and H. Nordstrom . Metalink\/HTTP: Mirrors and Hashes. RFC 6249 (Proposed Standard) , June 2011 . A. Bryan, N. McNab, T. Tsujikawa, P. Poeml, and H. Nordstrom. Metalink\/HTTP: Mirrors and Hashes. RFC 6249 (Proposed Standard), June 2011."},{"key":"e_1_3_2_1_9_1","unstructured":"Emerging Network Consortium Brings Industries Together to Innovate with Content-Centric Networking (CCN). http:\/\/www.mach.com\/en\/News-Events\/Press-Room\/Press-Releases\/Emerging-Network-Consortium-Brings-Industries-Togetherto-Innovate-with-Content-Centric-Networking-CCN. Emerging Network Consortium Brings Industries Together to Innovate with Content-Centric Networking (CCN). http:\/\/www.mach.com\/en\/News-Events\/Press-Room\/Press-Releases\/Emerging-Network-Consortium-Brings-Industries-Togetherto-Innovate-with-Content-Centric-Networking-CCN."},{"key":"e_1_3_2_1_10_1","volume-title":"May","author":"Cheshire S.","year":"2005","unstructured":"S. Cheshire , B. Aboba , and E. Guttman . Dynamic Configuration of IPv4 Link-Local Addresses. RFC 3927 (Proposed Standard) , May 2005 . S. Cheshire, B. Aboba, and E. Guttman. Dynamic Configuration of IPv4 Link-Local Addresses. RFC 3927 (Proposed Standard), May 2005."},{"key":"e_1_3_2_1_11_1","volume-title":"IETF","author":"Cheshire S.","year":"2011","unstructured":"S. Cheshire and M. Krochmal . Multicast DNS. Technical report , IETF , December 2011 . S. Cheshire and M. Krochmal. Multicast DNS. Technical report, IETF, December 2011."},{"key":"e_1_3_2_1_12_1","unstructured":"CloudFlare security. http:\/\/www.cloudflare.com\/features-security. CloudFlare security. http:\/\/www.cloudflare.com\/features-security."},{"key":"e_1_3_2_1_13_1","unstructured":"COntent Mediator architecture for content-aware nETworks (COMET). http:\/\/www.comet-project.org\/. COntent Mediator architecture for content-aware nETworks (COMET). http:\/\/www.comet-project.org\/."},{"key":"e_1_3_2_1_14_1","volume-title":"IETF","author":"Cooper I.","year":"2001","unstructured":"I. Cooper , P. Gauthier , J. Cohen , M. Dunsmuir , and C. Perkins . Web proxy auto-discovery protocol. Technical report , IETF , May 2001 . I. Cooper, P. Gauthier, J. Cohen, M. Dunsmuir, and C. Perkins. Web proxy auto-discovery protocol. Technical report, IETF, May 2001."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. BROADNETS","author":"Fotiou N.","year":"2010","unstructured":"N. Fotiou , P. Nikander , D. Trossen , and G. C. Polyzos . Developing information networking further: From PSIRP to PURSUIT . In Proc. BROADNETS , 2010 . N. Fotiou, P. Nikander, D. Trossen, and G. C. Polyzos. Developing information networking further: From PSIRP to PURSUIT. In Proc. BROADNETS, 2010."},{"key":"e_1_3_2_1_16_1","volume-title":"DoS and DDoS in named-data networking. CoRR, abs\/1208.0952","author":"Gasti P.","year":"2012","unstructured":"P. Gasti , G. Tsudik , E. Uzun , and L. Zhang . DoS and DDoS in named-data networking. CoRR, abs\/1208.0952 , 2012 . P. Gasti, G. Tsudik, E. Uzun, and L. Zhang. DoS and DDoS in named-data networking. CoRR, abs\/1208.0952, 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018586"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070563"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070565"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298310"},{"key":"e_1_3_2_1_21_1","unstructured":"M. Gritter and D. R. Cheriton. TRIAD: A New Next-Generation Internet Architecture. http:\/\/www-dsg.stanford.edu\/triad\/ 2000. M. Gritter and D. R. Cheriton. TRIAD: A New Next-Generation Internet Architecture. http:\/\/www-dsg.stanford.edu\/triad\/ 2000."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. NSDI","author":"Han D.","year":"2012","unstructured":"D. Han , A. Anand , F. Dogar , B. Li , H. Lim , M. Machado , A. Mukundan , W. Wu , A. Akella , D. G. Andersen , J. W. Byers , S. Seshan , and P. Steenkiste . XIA: efficient support for evolvable internetworking . In Proc. NSDI , 2012 . D. Han, A. Anand, F. Dogar, B. Li, H. Lim, M. Machado, A. Mukundan, W. Wu, A. Akella, D. G. Andersen, J. W. Byers, S. Seshan, and P. Steenkiste. XIA: efficient support for evolvable internetworking. In Proc. NSDI, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_3_2_1_24_1","unstructured":"V. Jacobson J. D. Thornton D. K. Smetters B. Zhang G. Tsudik k. claffy D. Krioukov D. Massey C. Papadopoulos T. Abdelzaher L. Wang P. Crowley and E. Yeh. Named Data Networking (NDN) project. http:\/\/named-data.net\/techreport\/TR001ndn proj.pdf 2010. V. Jacobson J. D. Thornton D. K. Smetters B. Zhang G. Tsudik k. claffy D. Krioukov D. Massey C. Papadopoulos T. Abdelzaher L. Wang P. Crowley and E. Yeh. Named Data Networking (NDN) project. http:\/\/named-data.net\/techreport\/TR001ndn proj.pdf 2010."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555377"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592592"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342488.2342492"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"e_1_3_2_1_29_1","unstructured":"L. Li X. Xu J. Wang and Z. Hao. Information-centric network in an ISP. http:\/\/tools.ietf.org\/html\/draft-li-icnrg-icn-isp-01 2013. L. Li X. Xu J. Wang and Z. Hao. Information-centric network in an ISP. http:\/\/tools.ietf.org\/html\/draft-li-icnrg-icn-isp-01 2013."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"e_1_3_2_1_31_1","unstructured":"G. Mohr. Magnet uri scheme draft 2002. http:\/\/magneturi.sourceforge.net\/magnet-draft-overview.txt. G. Mohr. Magnet uri scheme draft 2002. http:\/\/magneturi.sourceforge.net\/magnet-draft-overview.txt."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. NSDI","author":"Nordstrom E.","year":"2012","unstructured":"E. Nordstrom , D. Shue , P. Gopalan , R. Kiefer , M. Arye , S. Ko , J. Rexford , , and M. J. Freedman . Serval: An end-host stack for service-centric networking . In Proc. NSDI , 2012 . E. Nordstrom, D. Shue, P. Gopalan, R. Kiefer, M. Arye, S. Ko, J. Rexford, , and M. J. Freedman. Serval: An end-host stack for service-centric networking. In Proc. NSDI, 2012."},{"volume-title":"Netscape Navigator Documentation","year":"1996","key":"e_1_3_2_1_33_1","unstructured":"Navigator proxy auto-config file format . Netscape Navigator Documentation , March 1996 . Navigator proxy auto-config file format. Netscape Navigator Documentation, March 1996."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018596"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2378956.2378960"},{"key":"e_1_3_2_1_36_1","volume-title":"August","author":"Rescorla E.","year":"1999","unstructured":"E. Rescorla and A. Schiffman . The Secure HyperText Transfer Protocol. RFC 2660 (Experimental) , August 1999 . E. Rescorla and A. Schiffman. The Secure HyperText Transfer Protocol. RFC 2660 (Experimental), August 1999."},{"key":"e_1_3_2_1_37_1","unstructured":"Scalable and Adaptive Internet Solutions (SAIL). http:\/\/www.sail-project.eu\/. Scalable and Adaptive Internet Solutions (SAIL). http:\/\/www.sail-project.eu\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465529.2465764"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187926"},{"key":"e_1_3_2_1_41_1","unstructured":"D. Skeen. Vitria's publish-subscribe architecture: Publish-subscribe overview. http:\/\/www.vitria.com\/ 1998. D. Skeen. Vitria's publish-subscribe architecture: Publish-subscribe overview. http:\/\/www.vitria.com\/ 1998."},{"key":"e_1_3_2_1_42_1","volume-title":"PARC","author":"Smetters D.","year":"2009","unstructured":"D. Smetters and V. Jacobson . Securing Network Content. Technical report , PARC , October 2009 . D. Smetters and V. Jacobson. Securing Network Content. Technical report, PARC, October 2009."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"e_1_3_2_1_44_1","volume-title":"November","author":"Sun S.","year":"2003","unstructured":"S. Sun , L. Lannom , and B. Boesch . Handle System Overview. RFC 3650 (Informational) , November 2003 . S. Sun, L. Lannom, and B. Boesch. Handle System Overview. RFC 3650 (Informational), November 2003."},{"key":"e_1_3_2_1_45_1","volume-title":"September","author":"Thomson S.","year":"2007","unstructured":"S. Thomson , T. Narten , and T. Jinmei . IPv6 Stateless Address Autoconfiguration. RFC 4862 (Draft Standard) , September 2007 . S. Thomson, T. Narten, and T. Jinmei. IPv6 Stateless Address Autoconfiguration. RFC 4862 (Draft Standard), September 2007."},{"key":"e_1_3_2_1_46_1","unstructured":"Tibco enterprise message service. http:\/\/www.tibco.com\/. Tibco enterprise message service. http:\/\/www.tibco.com\/."},{"key":"e_1_3_2_1_47_1","unstructured":"Your gadgets are slowly breaking the internet. http:\/\/www.technologyreview.com\/news\/509721\/yourgadgets-are-slowly-breaking-the internet\/. Your gadgets are slowly breaking the internet. http:\/\/www.technologyreview.com\/news\/509721\/yourgadgets-are-slowly-breaking-the internet\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187858"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018588"},{"key":"e_1_3_2_1_50_1","volume-title":"Extensible resource identifier (XRI) resolution version 2.0. Committee Draft, 3","author":"Wachob G.","year":"2008","unstructured":"G. Wachob , D. Reed , L. Chasen , W. Tan , and S. Churchill . Extensible resource identifier (XRI) resolution version 2.0. Committee Draft, 3 , 2008 . G. Wachob, D. Reed, L. Chasen, W. Tan, and S. Churchill. Extensible resource identifier (XRI) resolution version 2.0. Committee Draft, 3, 2008."},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. NSDI","author":"Walfish M.","year":"2004","unstructured":"M. Walfish , H. Balakrishnan , and S. Shenker . Untangling the Web from DNS . In Proc. NSDI , 2004 . M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In Proc. NSDI, 2004."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319153"},{"key":"e_1_3_2_1_53_1","unstructured":"The IETF Zeroconf Working Group 2004. http:\/\/datatracker.ietf.org\/wg\/zeroconf\/charter\/. The IETF Zeroconf Working Group 2004. http:\/\/datatracker.ietf.org\/wg\/zeroconf\/charter\/."}],"event":{"name":"SIGCOMM'13: ACM SIGCOMM 2013 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Hong Kong China","acronym":"SIGCOMM'13"},"container-title":["Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2486001.2486023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T19:33:48Z","timestamp":1693856028000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2486001.2486023"}},"subtitle":["incrementally deployable ICN"],"short-title":[],"issued":{"date-parts":[[2013,8,27]]},"references-count":53,"alternative-id":["10.1145\/2486001.2486023","10.1145\/2486001"],"URL":"https:\/\/doi.org\/10.1145\/2486001.2486023","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2534169.2486023","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2013,8,27]]},"assertion":[{"value":"2013-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}