{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:32:17Z","timestamp":1725564737502},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307679"},{"type":"electronic","value":"9783540322498"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596370_3","type":"book-chapter","created":{"date-parts":[[2005,11,24]],"date-time":"2005-11-24T08:20:56Z","timestamp":1132820456000},"page":"19-21","source":"Crossref","is-referenced-by-count":1,"title":["Query Incentive Networks"],"prefix":"10.1007","author":[{"given":"Prabhakar","family":"Raghavan","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Adamic, L.A., Buyukkokten, O., Adar, E.: A social network caught in the Web. First Monday\u00a08(6) (2003)","DOI":"10.5210\/fm.v8i6.1057"},{"key":"3_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-65371-1","volume-title":"Branching Processes","author":"K.B. Athreya","year":"1972","unstructured":"Athreya, K.B., Ney, P.E.: Branching Processes. Springer, Heidelberg (1972)"},{"key":"3_CR3","unstructured":"Blanc, A., Liu, Y.-K., Vahdat, A.: Designing Incentives for Peer-to-Peer Routing. In: 2nd Workshop on Economics of Peer-to-peer systems (2004)"},{"key":"3_CR4","unstructured":"Broder, A., Krauthgamer, R., Mitzenmacher, M.: Improved Classification via Connectivity Information. In: Proc. 11th Annual ACM-SIAM Symposium on Discrete Algorithms (2000)"},{"key":"3_CR5","unstructured":"Brodsky, A., Pippenger, N.: The Boolean Functions Computed by Random Boolean Formulas OR How to Grow the Right Function. UBC Computer Science Technical Report, TR-2003-02 (2003)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Charikar, M., Fagin, R., Guruswami, V., Kleinberg, J., Raghavan, P., Sahai, A.: Query Strategies for Priced Information. In: Proc. 32nd ACM Symposium on Theory of Computing (2000)","DOI":"10.1145\/335305.335382"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: International Workshop on Design Issues in Anonymity and Unobservability (2000)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Etzioni, O., Hanks, S., Jiang, T., Karp, R.M., Madani, O., Waarts, O.: Efficient information gathering on the Internet. In: Proc. IEEE Symposium on Foundations of Computer Science (1996)","DOI":"10.1109\/SFCS.1996.548482"},{"issue":"6","key":"3_CR9","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"M. Granovetter","year":"1973","unstructured":"Granovetter, M.: The strength of weak ties. American Journal of Sociology\u00a078(6), 1360\u20131380 (1973)","journal-title":"American Journal of Sociology"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Jackson, M.: A Survey of Models of Network Formation: Stability and Efficiency. In: Demange, G., Wooders, M. (eds.) Group Formation in Economics: Networks, Clubs and Coalitions, Cambridge (2004)","DOI":"10.1017\/CBO9780511614385.002"},{"key":"3_CR11","unstructured":"Kakade, S., Kearns, M., Ortiz, L., Pemantle, R., Suri, S.: Economic Properties of Social Networks. In: Proc. NIPS (2004)"},{"key":"3_CR12","unstructured":"Kamvar, S., Yang, B., Garcia-Molina, H.: Addressing the Non-Cooperation Problem in Competitive P2P Systems. In: 1st Workshop on Economics of Peer-to-peer systems (2003)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Kautz, H., Selman, B., Shah, M.: ReferralWeb: Combining Social Networks and Collaborative Filtering. Communications of the ACM (1997)","DOI":"10.1145\/245108.245123"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.M., Raghavan, P.: Query Incentive Networks. In: IEEE Symposium on Foundations of Computer Science (2005)","DOI":"10.1109\/SFCS.2005.63"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Krishnan, R., Smith, M., Telang, R.: The Economics of Peer-to-Peer Networks. SSRN Working Paper (September 2003)","DOI":"10.2139\/ssrn.504062"},{"key":"3_CR16","unstructured":"Li, C., Yu, B., Sycara, K.: An Incentive Mechanism for Message Relaying in Peer-to-Peer Discovery. In: 2nd Workshop on Economics of Peer-to-peer systems (2004)"},{"key":"3_CR17","unstructured":"Lua, E.-K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A Survey and Comparison of Peer-to-Peer Overlay Network Schemes. IEEE Communications Survey and Tutorial (March 2004)"},{"key":"3_CR18","unstructured":"Luby, M., Mitzenmacher, M., Shokrollahi, A.: Analysis of Random Processes via And-Or Tree Evaluation. In: Proc. 9th Annual ACM-SIAM Symposium on Discrete Algorithms (1998)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Papadimitriou, C.H.: Algorithms, Games, and the Internet. In: Proc. 33rd ACM Symposium on Theory of Computing (2001)","DOI":"10.1145\/380752.380883"},{"key":"3_CR20","unstructured":"Raghavan, B., Snoeren, A.: Priority Forwarding in Ad Hoc Networks with Self-Interested Parties. In: 1st Workshop on Economics of Peer-to-peer systems (2003)"},{"issue":"12","key":"3_CR21","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation Systems. Communications of the ACM\u00a043(12), 45\u201348 (2000)","journal-title":"Communications of the ACM"},{"key":"3_CR22","unstructured":"Salkever, A.: BusinessWeek, October 28 (2003)"},{"issue":"2","key":"3_CR23","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1137\/S0040585X97976933","volume":"43","author":"B.A. Sevastyanov","year":"1999","unstructured":"Sevastyanov, B.A.: Asymptotic Behavior of the Extinction Probabilities for Stopped Branching Processes. Theory Prob. Appl.\u00a043(2), 315\u2013322 (1999)","journal-title":"Theory Prob. Appl."},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Tardos, \u00c9.: Network Games. In: Proc. 36th ACM Symposium on Theory of Computing (2004)","DOI":"10.1145\/1007352.1007356"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/0196-6774(84)90016-6","volume":"5","author":"L.G. Valiant","year":"1984","unstructured":"Valiant, L.G.: Short monotone formulae for the majority function. Journal of Algorithms\u00a05, 363\u2013366 (1984)","journal-title":"Journal of Algorithms"},{"key":"3_CR26","unstructured":"Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: KARMA: A Secure Economic Framework for P2P Resource Sharing. In: 1st Workshop on Economics of Peer-to-peer systems (2003)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Vivacqua, A., Lieberman, H.: Agents to Assist in Finding Help. In: Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems (2000)","DOI":"10.1145\/332040.332408"},{"issue":"1","key":"3_CR28","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1177\/1461444804040633","volume":"6","author":"B. Wellman","year":"2004","unstructured":"Wellman, B.: The Three Ages of Internet Studies: Ten, Five and Zero Years Ago. New Media and Society\u00a06(1), 123\u2013129 (2004)","journal-title":"New Media and Society"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Yu, B., Singh, M.P.: Searching Social Networks. In: Proc. 2nd International Joint Conference on Autonomous Agents and Multi-Agent Systems (2003)","DOI":"10.1145\/860575.860587"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Yu, B., Singh, M.P.: Incentive Mechanisms for Peer-to-Peer Systems. In: Proc. 2nd International Workshop on Agents and Peer-to-Peer Computing (2003)","DOI":"10.1007\/978-3-540-25840-7_9"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, J., Van Alstyne, M.: SWIM: fostering social network based information search. In: Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems (2004)","DOI":"10.1145\/985921.986144"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science \u2013 ASIAN 2005. Data Management on the Web"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596370_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:55:09Z","timestamp":1619492109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596370_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307679","9783540322498"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11596370_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}