throbber
DECLARATION OF MARTIN L. KNOTT
`
`Juniper Ex. 1015-p. 1
`Juniper v Implicit
`
`

`

`Declaration of Martin L. Knott Regarding
`Authentication and Public Accessibility of Publication
`
`I, Martin L. Knott, declare as follows:
`
`
`
`1.
`
`I am a librarian and Metadata and Linked Data Strategist within the
`
`University of Michigan Library’s Technical Services Department, located at 913 S.
`
`University, Ann Arbor, MI 48109-1190. I hold a Master of Science in Information from
`
`the University of Michigan, where I studied library and information science. I joined
`
`the University Library in August of 1992. Through the course of my employment and
`
`based on the University Library’s business records, I have personal knowledge of the
`
`University Library’s normal business practices, including during the time period starting
`
`in the early 1990s. The University Library’s normal business practices, which follows
`
`standard library practices, are described in further detail below.
`
`2.
`
`This Declaration relates to the dates of receipt and public availability of the
`
`following:
`
`Decasper, D., Dittia, Z., Parulkar, G., & Plattner, B. (1998).
`Router plugins: a software architecture for next generation
`routers. In Computer Communication Review, v. 28, no. 4, 229–
`240. New York : ACM Special Interest Group on Data
`Communication.
`
`Standard operating procedures for materials at the University of Michigan
`
`3.
`
`Libraries. During the late 1980s and through 2007, when a journal volume or other
`
`publication was or is received by the University Library, it would be checked in,
`
`stamped or inscribed with the date of receipt, added to library holdings records, and
`
`made available to library patrons or visitors (i.e., the general public) for review,
`
`
`
`2
`
`Juniper Ex. 1015-p. 2
`Juniper v Implicit
`
`

`

`Declaration of Martin L. Knott Regarding
`Authentication and Public Accessibility of Publication
`
`
`photocopying, and/or borrowing as soon after its arrival as possible. This procedure
`
`normally took and still takes a few days or at most 2 to 3 weeks.
`
`4.
`The image attached to this Declaration is a true and accurate copy of pages
`
`
`
`
`
`
`
`
`
`
`
`from Computer Communication Review, v. 28, no. 4 from the University of Michigan
`
`
`
`
`
`
`
`
`
`
`
`Library collection containing Router plugins: a software architecture for next
`
`
`
`
`
`
`
`generation routers. The date stamp indicating when this copy of Computer
`
`
`
`
`
`
`
`Communication Review, v. 28, no. 4 was received by the University of Michigan
`
`
`
`
`
`
`
`
`
`Library is located on the cover of the issue as was standard when the book was
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`acquired.
`
`
`
`
`
`5.
`
`Based on the information in the attached image, it is clear that this copy of
`
`Computer Communication Review, v. 28, no. 4 was received by the University of
`
`Michigan Library on January 21, 1999 and catalogued and available to the public within
`
`a few days or at most 2 to 3 weeks after January 21, 1999 after which the public could
`
`search for it by at least subject matter, conference proceeding title, editor, year, and/or
`
`topic in the University of Michigan Library’s online catalog, for example, by
`
`alphabetical or numerical year order or through printed journal indexes available at the
`
`time.
`
`I declare that all statements made herein of my own knowledge are true and that
`
`all statements made on information and belief are believed to be true; and further that
`
`these statements were made with the knowledge that willful false statements and the like
`
`
`
`3
`
`Juniper Ex. 1015-p. 3
`Juniper v Implicit
`
`

`

`Declaration of Martin L. Knott Regarding
`Authentication and Public Accessibility of Publication
`
`
`so made are punishable by fine or imprisonment, or both, under Section 1001 of Title 18
`
`of the United States Code.
`
`Date: January 22, 2020
`
`University of Michigan Library
`913 S. University
`Ann Arbor, MI 48109-1190
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`________________________________
`Martin L. Knott
`Metadata and Linked Data Strategist
`
`
`
`
`
`4
`
`Juniper Ex. 1015-p. 4
`Juniper v Implicit
`
`

`

`NOTICE CONCERNING
`COPYRIGHT RESTRICTIONS
`
`
`The material copied here may be protected by copyright
`law in the United States and/or in other jurisdictions. This
`copy was made in compliance with U.S. copyright law and
`is provided to you for the purposes of private study,
`scholarship, or research.
`
`If you use the copy for a different purpose, such as posting
`on a course website, the copyright analysis that supported
`making the copy does not apply. It is your responsibility to
`address copyright for any other uses. For assistance, you
`may wish to consult the library’s guides to Copyright
`Basics and Copyright and Course Websites. You can also
`contact the University of Michigan Library Copyright Office
`at copyright@umich.edu.
`
`Juniper Ex. 1015-p. 5
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 6
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 7
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 8
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 9
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 10
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 11
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 12
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 13
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 14
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 15
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 16
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 17
`Juniper v Implicit
`
`

`

`Juniper Ex. 1015-p. 18
`Juniper v Implicit
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket