{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:23:57Z","timestamp":1725560637729},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540297550"},{"type":"electronic","value":"9783540316572"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11574781_5","type":"book-chapter","created":{"date-parts":[[2005,10,26]],"date-time":"2005-10-26T13:21:43Z","timestamp":1130332903000},"page":"54-61","source":"Crossref","is-referenced-by-count":0,"title":["A Policy for Electing Super-Nodes in Unstructured P2P Networks"],"prefix":"10.1007","author":[{"given":"Georgios","family":"Pitsilis","sequence":"first","affiliation":[]},{"given":"Panayiotis","family":"Periorellis","sequence":"additional","affiliation":[]},{"given":"Lindsay","family":"Marshall","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Chen, A.H., Schroeder, A.M.: A Modified Depensation Model of Peer to Peer Networks: Systematic Catastrophes and other potential Weaknesses. AMATH, vol.\u00a0383 (June 2002)"},{"key":"5_CR2","unstructured":"The Gnutella v0.4 protocol Specification, \n                    \n                      http:\/\/www.clip2.com"},{"key":"5_CR3","series-title":"Dept. of CS & Engineering","volume-title":"A quantitative Analysis of the Gnutella Network [4] Traffic","author":"D. Zeinalipour","year":"2002","unstructured":"Zeinalipour, D., Folias, T.: A quantitative Analysis of the Gnutella Network [4] Traffic. Dept. of CS & Engineering. University of California, Riverside (June 2002)"},{"key":"5_CR4","unstructured":"Massey, R., Bharath, S., Jain, A.: Gnutella-Pro:What bandwidth barrier?, \n                    \n                      http:\/\/www.cs.ucsd.edu\/classes\/wi01\/cse222\/projects\/reports\/gnutellapro-5.pdf"},{"key":"5_CR5","volume-title":"Proceedings of 2nd International Conference on Peer-to-Peer Computing P2P 2002","author":"R. Schollmeier","year":"2002","unstructured":"Schollmeier, R., Schollmeier, I.: Why Peer-to-Peer Does Scale:An analysis of P2P Traffic Patterns. In: Proceedings of 2nd International Conference on Peer-to-Peer Computing P2P 2002, IEEE, Los Alamitos (2002)"},{"issue":"6","key":"5_CR6","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1109\/JSAC.2003.814666","volume":"21","author":"G. Pandurangan","year":"2003","unstructured":"Pandurangan, G., Raghavan, P., Upfal, E.: Building Low-Diameter Peer-to-Peer Networks. IEEE Journal on Selected Areas in Communications (JSAC)\u00a021(6), 995\u20131002 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications (JSAC)"},{"key":"5_CR7","unstructured":"Prinkey, M.: An Efficient Scheme for Query Processing on Peer-to-Peer Networks. Aeolus Research Inc., Technical report (August 2002)"},{"key":"5_CR8","unstructured":"Rohrs, C., Singla, A.: Ultrapeers: Another Step Towards Gnutella Scalability (November 2002), \n                    \n                      http:\/\/www.limewire.com\/developer\/Ultrapeers.html"},{"key":"5_CR9","unstructured":"Miller, E.: Compulsory Licensing - The Death of Gnutella and the Triumph of Google, Yale Law school web site, \n                    \n                      http:\/\/research.yale.edu\/lawmeme\/"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Periorellis, P., et al.: Dealing with Complex Networks of Process Interactions: A Security Measure. In: Proceedings of the 9th IEEE International Conference on Engineering of Complex Computer Systems, Florence, Italy, April 14-16 (2004)","DOI":"10.1109\/ICECCS.2004.1310901"},{"key":"5_CR11","unstructured":"Ritter, J.: Why Gnutella Can\u2019t Scale. No, Really (February 2001), \n                    \n                      http:\/\/www.darkridge.com\/jpr5\/doc\/gnutella.html"},{"issue":"1","key":"5_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R. Albert","year":"2002","unstructured":"Albert, R., Barabasi, A.L.: Statistical mechanics of complex networks. Reviews of Modern Physics\u00a074(1), 47\u201397 (2002)","journal-title":"Reviews of Modern Physics"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A.L. Barabasi","year":"1999","unstructured":"Barabasi, A.L., Albert, R.: Emergence of scaling in random networks. Science\u00a0286, 509\u2013512 (1999)","journal-title":"Science"},{"key":"5_CR14","volume-title":"Graphs and Networks","author":"A. Carre","year":"1979","unstructured":"Carre, A.: Graphs and Networks. Clarendon Press, Oxford (1979)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-45431-4_6","volume-title":"Next Generation Information Technologies and Systems","author":"D. Zeinalipour-Yazti","year":"2002","unstructured":"Zeinalipour-Yazti, D., Dikaiakos, M.: Design and Implementation of a Distributed Crawler and Filtering Processor. In: Halevy, A.Y., Gal, A. (eds.) NGITS 2002. LNCS, vol.\u00a02382, pp. 58\u201374. Springer, Heidelberg (2002)"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"17102","DOI":"10.1103\/PhysRevE.68.017102","volume":"68","author":"A. Moura","year":"2003","unstructured":"Moura, A., Lai, Y., Motter, A.: Signatures of small-world and scale-free properties in large computer programs. Physical Review. E\u00a068, 17102 (2003)","journal-title":"Physical Review. E"},{"key":"5_CR17","unstructured":"Jovanovic, M., Annexstein, F.S., Berman, K.A.: Modeling Peer-to-Peer Network Topologies through Small World Modelsand Power Laws. In: TELFOR, Belgrade, Yugoslavia (November 2001)"},{"key":"5_CR18","volume-title":"Proceedings of the 19th International Conference on Data Engineering (ICDE)","author":"B. Yang","year":"2003","unstructured":"Yang, B., Garcia-Molina, H.: Designing a Super-Peer Network. In: Proceedings of the 19th International Conference on Data Engineering (ICDE), Bangalore, India, March 5-8, IEEE Computer Society, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Agents and Peer-to-Peer Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11574781_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:42:16Z","timestamp":1619505736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11574781_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540297550","9783540316572"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11574781_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}