{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:55:35Z","timestamp":1725573335520},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540352259"},{"type":"electronic","value":"9783540352266"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11775300_16","type":"book-chapter","created":{"date-parts":[[2006,6,14]],"date-time":"2006-06-14T07:51:04Z","timestamp":1150271464000},"page":"182-192","source":"Crossref","is-referenced-by-count":1,"title":["Object Placement and Caching Strategies on AN.P2P"],"prefix":"10.1007","author":[{"given":"Su","family":"Mu","sequence":"first","affiliation":[]},{"given":"Chi-Hung","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"HongGuang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Altnet. [online], http:\/\/www.altnet.com"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web Caching and Zipf-like Distributions: Evidence and Implications. In: Proceedings of INFOCOM (1999)","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Crovella, M.E., Bestavros, A.: Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. In: Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (1996)","DOI":"10.1145\/233013.233038"},{"key":"16_CR4","unstructured":"Composite Capabilities\/Preferences Profile, http:\/\/www.w3.org\/Mobile\/CCPP"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Dabek, F., Kaashoek, M.F., Karger, D.: Wide-area Cooperative Storage with CFS. In: Proceedings of Symposium of Operation System Principles (2001)","DOI":"10.1145\/502034.502054"},{"key":"16_CR6","unstructured":"Gnutella, http:\/\/www.gnutella.com"},{"key":"16_CR7","volume-title":"Securing Java: Getting Down to Business with Mobile code","author":"G. McGraw","year":"1999","unstructured":"McGraw, G., Felten, E.W.: Securing Java: Getting Down to Business with Mobile code. Wiley, Chichester (1999)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Gopalakrishnan, V., Silaghi, B., Bhattacharjee, B., Kelenher, P.: \u2018Adaptive Replication in Peer-to-Peer Systems. In: Proceedings of 24th Inter. Conf. on Distributed Computing System (2004)","DOI":"10.1109\/ICDCS.2004.1281601"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Iwata, T., Abe, T., Ueda, K., Sunaga, H.: A DRM System Suitable for P2P Content Delivery and the Study on its Implementation. In: Proceeding of the 9th Asia-Pacific Conf. on Comm., vol.\u00a02(21-24), pp. 806\u2013811 (2003)","DOI":"10.1109\/APCC.2003.1274471"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Iyer, S., Rowstron, A., Drusche, P.: Squirrel: A Decentralized Peer-to-peer Web Cache. In: Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (July 2002)","DOI":"10.1145\/571825.571861"},{"key":"16_CR11","unstructured":"KaZaA, http:\/\/www.kazaa.com"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Ku, W., Chi, C.-H.: Survey on the technological aspects of Digital Rights Management. In: Proceedings of the 7th Information Security Conference (2004)","DOI":"10.1007\/978-3-540-30144-8_33"},{"issue":"6","key":"16_CR13","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/JPROC.2004.827368","volume":"92","author":"T. Kalker","year":"2004","unstructured":"Kalker, T., Epema, D., Hartel, P., Lagendijk, I., Steen, M.v.: Music2Share \u2013 Copyrightcompliant Music Sharing in P2P Systems. Proceedings of the IEEE\u00a092(6), 961\u2013970 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"16_CR14","unstructured":"Kangasharju, J., Ross, K.W., Turner, D.A.: Adaptive Content Management in Structured P2P Communities. In: Proceedings of 21st ACM Symposium on Principles of Distributed Computing (2002)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Li, J., Yarvis, M., Reiher, P.: Securing distributed adaptation. In: Proceeding of Computer Networks, vol.\u00a038, pp. 347\u2013371 (2002)","DOI":"10.1016\/S1389-1286(01)00291-2"},{"key":"16_CR16","unstructured":"Napster, http:\/\/www.napster.com"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Storage Management and Caching in PAST, a Large-scale, Persistent Peer-to-peer Storage Utility. In: Proceedings of ACM Symposium on Operating Systems Principles (November 2001)","DOI":"10.1145\/502034.502053"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location and Routing for Large-scale Peer-to-peer Systems. In: Proceedings of the 18th IFIP\/ACM InternationalConference of Distributed Systems Platforms (November 2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Rubin, A.D., Greer, E.E.: Mobile Code Security. IEEE Internet Computing (November 1998)","DOI":"10.1109\/4236.735984"},{"key":"16_CR20","unstructured":"Su, M., Chi, C.-H.: Architecture and Performance of Application Networking for Pervasive Content Delivery. In: Proceedings of 21st International Conference on Data Engineering, Tokyo (2005)"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Su, M., Chi, C.-H.: Application Networking on Peer-to-peer Networks. In: Proceedings of the 14th International World Wide Web Conference, Japan (2005)","DOI":"10.1145\/1062745.1062905"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In: Proceedings of the 2001 ACM SIGCOMM Conference (2001)","DOI":"10.1145\/383059.383071"},{"key":"16_CR23","unstructured":"Waldvogel, M., Hurley, P., Bauer, D.: Dynamic Replica Management in Distributed Hash Tables, IBM Research Report (July 2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11775300_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:14:51Z","timestamp":1619507691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11775300_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540352259","9783540352266"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11775300_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}