{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:56:05Z","timestamp":1725551765840},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308034"},{"type":"electronic","value":"9783540322962"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596042_78","type":"book-chapter","created":{"date-parts":[[2005,11,24]],"date-time":"2005-11-24T10:14:40Z","timestamp":1132827280000},"page":"756-765","source":"Crossref","is-referenced-by-count":0,"title":["A Churn-Resistant Strategy for a Highly Reliable P2P System"],"prefix":"10.1007","author":[{"given":"Giscard","family":"Wepiw\u00e9","sequence":"first","affiliation":[]},{"given":"Sahin","family":"Albayrak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"78_CR1","doi-asserted-by":"crossref","unstructured":"Wepiw\u00e9, G., Simeonov, P.L.: A concentric multi-ring overlay for highly reliable p2p systems. In: Network Computing and Applications (NCA 2005), Cambridge, MA, USA. IEEE Computer Society, Los Alamitos (2005) (to Appear)","DOI":"10.1109\/NCA.2005.1"},{"key":"78_CR2","first-page":"768","volume":"49","author":"N.G. Bruijn","year":"1946","unstructured":"de Bruijn, N.G.: A combinatorial problem. Nederl. Akad. Wetensh. Proc.\u00a049, 768\u2013764 (1946)","journal-title":"Nederl. Akad. Wetensh. Proc."},{"key":"78_CR3","doi-asserted-by":"crossref","unstructured":"Du, D.-Z., Hsu, D.F.: Combinatorial Network Theory. In: De Bruijn Digraphs, Kautz Digraphs, and Their Generalizations. 1948-III Series, ch. 3, vol.\u00a01, pp. 65\u2013105. Kluwer Academic Publishers, the Netherlands (1996)","DOI":"10.1007\/978-1-4757-2491-2"},{"key":"78_CR4","unstructured":"Rhea, S., Geels, D., Roscoe, T., Kubiatowicz, J.: Handling churn in a DHT. In: Proceedings of the 2004 USENIX Annual Technical Conference (USENIX 2004), Boston, Massachusetts (June 2004)"},{"issue":"4","key":"78_CR5","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/964723.383071","volume":"31","author":"I. Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. SIGCOMM Comput. Commun. Rev.\u00a031(4), 149\u2013160 (2001)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"78_CR6","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1145\/1012888.1005712","volume":"32","author":"S.S. Lam","year":"2004","unstructured":"Lam, S.S., Liu, H.: Failure recovery for structured p2p networks: protocol design and performance evaluation. SIGMETRICS Perform. Eval. Rev.\u00a032(1), 199\u2013210 (2004)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"78_CR7","doi-asserted-by":"crossref","unstructured":"Zhuang, S., Geels, D., Stoica, I., Katz, R.: On failure detection algorithms in overlay networks. In: INFOCOM 2005 (2005) (to appear)","DOI":"10.1109\/INFCOM.2005.1498487"},{"issue":"1","key":"78_CR8","first-page":"41","volume":"22","author":"B.Y. Zhao","year":"2004","unstructured":"Zhao, B.Y., Huang, L., Rhea, S.C., Stribling, J., Joseph, A.D., Kubiatowicz, J.D.: Tapestry: A global-scale overlay for rapid service deployment. IEEE J-SAC\u00a022(1), 41\u201353 (2004)","journal-title":"IEEE J-SAC"},{"key":"78_CR9","doi-asserted-by":"crossref","unstructured":"Biggs Norman, L.: Algebraic Graph Theory, 2nd edn., vol.\u00a01974. Cambridge Math. Library (1993)","DOI":"10.1017\/CBO9780511608704"},{"key":"78_CR10","doi-asserted-by":"crossref","unstructured":"Paxson, V., Allman, M.: Computing TCP\u2019s Retransmission Timer. In: Request for Comments, vol.\u00a02988 (November 2000)","DOI":"10.17487\/rfc2988"},{"key":"78_CR11","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1145\/945445.945475","volume-title":"SOSP 2003: Proceedings of the nineteenth ACM symposium on Operating systems principles","author":"K.P. Gummadi","year":"2003","unstructured":"Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: SOSP 2003: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 314\u2013329. ACM Press, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596042_78.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:54:12Z","timestamp":1619492052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596042_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308034","9783540322962"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11596042_78","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}