`
`Juniper Ex. 1015-p. 1
`Juniper v Implicit
`
`
`
`Declaration of Martin L. Knott Regarding
`Authentication and Public Accessibility of Publication
`
`I, Martin L. Knott, declare as follows:
`
`
`
`1.
`
`I am a librarian and Metadata and Linked Data Strategist within the
`
`University of Michigan Library’s Technical Services Department, located at 913 S.
`
`University, Ann Arbor, MI 48109-1190. I hold a Master of Science in Information from
`
`the University of Michigan, where I studied library and information science. I joined
`
`the University Library in August of 1992. Through the course of my employment and
`
`based on the University Library’s business records, I have personal knowledge of the
`
`University Library’s normal business practices, including during the time period starting
`
`in the early 1990s. The University Library’s normal business practices, which follows
`
`standard library practices, are described in further detail below.
`
`2.
`
`This Declaration relates to the dates of receipt and public availability of the
`
`following:
`
`Decasper, D., Dittia, Z., Parulkar, G., & Plattner, B. (1998).
`Router plugins: a software architecture for next generation
`routers. In Computer Communication Review, v. 28, no. 4, 229–
`240. New York : ACM Special Interest Group on Data
`Communication.
`
`Standard operating procedures for materials at the University of Michigan
`
`3.
`
`Libraries. During the late 1980s and through 2007, when a journal volume or other
`
`publication was or is received by the University Library, it would be checked in,
`
`stamped or inscribed with the date of receipt, added to library holdings records, and
`
`made available to library patrons or visitors (i.e., the general public) for review,
`
`
`
`2
`
`Juniper Ex. 1015-p. 2
`Juniper v Implicit
`
`
`
`Declaration of Martin L. Knott Regarding
`Authentication and Public Accessibility of Publication
`
`
`photocopying, and/or borrowing as soon after its arrival as possible. This procedure
`
`normally took and still takes a few days or at most 2 to 3 weeks.
`
`4.
`The image attached to this Declaration is a true and accurate copy of pages
`
`
`
`
`
`
`
`
`
`
`
`from Computer Communication Review, v. 28, no. 4 from the University of Michigan
`
`
`
`
`
`
`
`
`
`
`
`Library collection containing Router plugins: a software architecture for next
`
`
`
`
`
`
`
`generation routers. The date stamp indicating when this copy of Computer
`
`
`
`
`
`
`
`Communication Review, v. 28, no. 4 was received by the University of Michigan
`
`
`
`
`
`
`
`
`
`Library is located on the cover of the issue as was standard when the book was
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`acquired.
`
`
`
`
`
`5.
`
`Based on the information in the attached image, it is clear that this copy of
`
`Computer Communication Review, v. 28, no. 4 was received by the University of
`
`Michigan Library on January 21, 1999 and catalogued and available to the public within
`
`a few days or at most 2 to 3 weeks after January 21, 1999 after which the public could
`
`search for it by at least subject matter, conference proceeding title, editor, year, and/or
`
`topic in the University of Michigan Library’s online catalog, for example, by
`
`alphabetical or numerical year order or through printed journal indexes available at the
`
`time.
`
`I declare that all statements made herein of my own knowledge are true and that
`
`all statements made on information and belief are believed to be true; and further that
`
`these statements were made with the knowledge that willful false statements and the like
`
`
`
`3
`
`Juniper Ex. 1015-p. 3
`Juniper v Implicit
`
`
`
`Declaration of Martin L. Knott Regarding
`Authentication and Public Accessibility of Publication
`
`
`so made are punishable by fine or imprisonment, or both, under Section 1001 of Title 18
`
`of the United States Code.
`
`Date: January 22, 2020
`
`University of Michigan Library
`913 S. University
`Ann Arbor, MI 48109-1190
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`________________________________
`Martin L. Knott
`Metadata and Linked Data Strategist
`
`
`
`
`
`4
`
`Juniper Ex. 1015-p. 4
`Juniper v Implicit
`
`
`
`NOTICE CONCERNING
`COPYRIGHT RESTRICTIONS
`
`
`The material copied here may be protected by copyright
`law in the United States and/or in other jurisdictions. This
`copy was made in compliance with U.S. copyright law and
`is provided to you for the purposes of private study,
`scholarship, or research.
`
`If you use the copy for a different purpose, such as posting
`on a course website, the copyright analysis that supported
`making the copy does not apply. It is your responsibility to
`address copyright for any other uses. For assistance, you
`may wish to consult the library’s guides to Copyright
`Basics and Copyright and Course Websites. You can also
`contact the University of Michigan Library Copyright Office
`at copyright@umich.edu.
`
`Juniper Ex. 1015-p. 5
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 6
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 7
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 8
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 9
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 10
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 11
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 12
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 13
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 14
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 15
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 16
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 17
`Juniper v Implicit
`
`
`
`Juniper Ex. 1015-p. 18
`Juniper v Implicit
`
`