{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:00:55Z","timestamp":1725552055714},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540312536"},{"type":"electronic","value":"9783540324386"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11613022_26","type":"book-chapter","created":{"date-parts":[[2005,12,15]],"date-time":"2005-12-15T01:47:04Z","timestamp":1134611224000},"page":"322-329","source":"Crossref","is-referenced-by-count":11,"title":["Modeling of Epidemic Diffusion in Peer-to-Peer File-Sharing Networks"],"prefix":"10.1007","author":[{"given":"Kenji","family":"Leibnitz","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Ho\u00dffeld","sequence":"additional","affiliation":[]},{"given":"Naoki","family":"Wakamiya","sequence":"additional","affiliation":[]},{"given":"Masayuki","family":"Murata","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Gnutella Protocol Development Website, http:\/\/rfc-gnutella.sourceforge.net\/"},{"key":"26_CR2","unstructured":"eDonkey2000 Home Page, http:\/\/www.eDonkey2000.com\/"},{"key":"26_CR3","unstructured":"The Official BitTorrent Home Page, http:\/\/www.bittorrent.com\/"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Liang, J., Kumar, R., Xi, Y., Ross, K.: Pollution in P2P file sharing systems. In: IEEE INFOCOM, Miami, FL (2005)","DOI":"10.1109\/INFCOM.2005.1498344"},{"key":"26_CR5","unstructured":"Schollmeier, R.: A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: IEEE 2001 International Conference on Peer-to-Peer Computing (P2P 2001), Link\u00f6ping, Sweden (2001)"},{"key":"26_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/b98868","volume-title":"Mathematical Biology, I: An introduction","author":"J. Murray","year":"2002","unstructured":"Murray, J.: Mathematical Biology, I: An introduction, 3rd edn. Springer, Heidelberg (2002)","edition":"3"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Verriest, E., Delmotte, F., Egerstedt, M.: Control of epidemics by vaccination. In: American Control Conference, Portland, OR (2005)","DOI":"10.1109\/ACC.2005.1470088"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Khelil, A., Becker, C., Tian, J., Rothermel, K.: An epidemic model for information diffusion in MANETs. In: 5th ACM MSWiM, Atlanta, GA, pp. 54\u201360 (2002)","DOI":"10.1145\/570758.570768"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Qiu, D., Srikant, R.: Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In: ACM SIGCOMM 2004, Portland, OR (2004)","DOI":"10.1145\/1015467.1015508"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Lo Piccolo, F., Neglia, G., Bianchi, G.: The effect of heterogeneous link capacities in BitTorrent-like file sharing systems. In: Intern. Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P 2004), Volendam, The Nederlands, pp. 40\u201347 (2004)","DOI":"10.1109\/PTPSYS.2004.21"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-540-24668-8_2","volume-title":"Passive and Active Network Measurement","author":"K. Tutschku","year":"2004","unstructured":"Tutschku, K.: A measurement-based traffic profile of the eDonkey filesharing service. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 12\u201321. Springer, Heidelberg (2004)"},{"key":"26_CR12","unstructured":"Ho\u00dffeld, T., Leibnitz, K., Pries, R., Tutschku, K., Tran-Gia, P., Pawlikowski, K.: Information diffusion in eDonkey-like P2P networks. In: Australian Telecommun. Networks and Applications Conference (ATNAC), Bondi Beach, Australia (2004)"}],"container-title":["Lecture Notes in Computer Science","Biologically Inspired Approaches to Advanced Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11613022_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:11:10Z","timestamp":1619493070000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11613022_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540312536","9783540324386"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11613022_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}