{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:26:02Z","timestamp":1745209562988},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403173"},{"type":"electronic","value":"9783540448921"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44892-6_1","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T10:51:40Z","timestamp":1187261500000},"page":"1-20","source":"Crossref","is-referenced-by-count":32,"title":["Approximate Object Location and Spam Filtering on Peer-to-Peer Systems"],"prefix":"10.1007","author":[{"given":"Feng","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Li","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Anthony D.","family":"Joseph","sequence":"additional","affiliation":[]},{"given":"John","family":"Kubiatowicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Broder, A. Z. Some applications of rabin\u2019s fingerprint method. In Sequences II: Methods in Communications, Security, and Computer Science, R. Capocelli, A. D. Santis, and U. Vaccaro, Eds. Springer Verlag, 1993, pp. 143\u2013152.","DOI":"10.1007\/978-1-4613-9323-8_11"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Dabek, F., Zhao, B.Y., Druschel, P., Kubiatowicz, J., AND Stoica, I. Towards a common API for structured P2P overlays. In Proceedings of IPTPS (Berkeley, CA, February 2003).","DOI":"10.1007\/978-3-540-45172-3_3"},{"key":"1_CR3","unstructured":"Distributed checksum clearinghouse. http:\/\/www.rhyolite.com\/anti-spam\/dcc\/ ."},{"key":"1_CR4","unstructured":"Harvey, N. J. A., Jones, M. B., Saroiu, S., Theimer, M., AND Wolman, A. Skipnet: A scalable overlay network with practical locality properties. In Proceedings of USITS(Seattle, WA, March 2003), USENIX."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Hildrum, K., Kubiatowicz, J. D., Rao, S., AND Zhao, B.Y. Distributed object location in a dynamic network. In Proceedings of ACM SPAA (Winnipeg, Canada, August 2002).","DOI":"10.1145\/564875.564877"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Li, J., Loo, B. T., Hellerstein, J., Kaashoek, F., Karger, D. R., AND Morris, R. On the feasibility of peer-to-peer web indexing and search. In 2nd International Workshop on Peer-to-Peer Systems (Berkeley, California, 2003).","DOI":"10.1007\/978-3-540-45172-3_19"},{"key":"1_CR7","unstructured":"Manber, U. Finding similar files in a large file system. In Proceedings of Winter USENIX Conference (1994)."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Maymounkov, P., AND Mazieres, D. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS) (Cambridge, MA, March 2002).","DOI":"10.1007\/3-540-45748-8_5"},{"key":"1_CR9","unstructured":"Mozilla spam filtering. http:\/\/www.mozilla.org\/mailnews\/spam.html ."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., AND Schenker, S. A scalable content-addressable network. In Proceedings of SIGCOMM (August 2001).","DOI":"10.1145\/383059.383072"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Rowstron, A., AND Druschel, P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of IFIP\/ACM Middleware 2001 (November 2001).","DOI":"10.1007\/3-540-45518-3_18"},{"key":"1_CR12","unstructured":"Sahami, M., Dumais, S., Heckerman, D., AND Horvitz, E. A bayesian approach to filtering junk email. In AAAI Workshop on Learning for Text Categorization (Madison, Wisconsin, July 1998)."},{"key":"1_CR13","unstructured":"Spamassassin. http:\/\/spamassassin.org ."},{"key":"1_CR14","unstructured":"Spamnet. http:\/\/www.cloudmark.com ."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., AND Balakrishnan, H. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of SIGCOMM (August 2001).","DOI":"10.1145\/383059.383071"},{"key":"1_CR16","unstructured":"Vipul\u2019s razor. http:\/\/www.razor.sourceforge.net\/ ."},{"key":"1_CR17","unstructured":"Witten, I. H., Moffat, A., AND Bell, T. C. Managing Gigabytes: Compressing and Indexing Documents and Images, second ed. Morgan Kaufmann Publishing, 1999."},{"key":"1_CR18","unstructured":"Zhao, B. Y., Kubiatowicz, J. D., AND Joseph, A. D. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Tech. Rep. UCB\/CSD-01-1141, U.C. Berkeley, April 2001."}],"container-title":["Lecture Notes in Computer Science","Middleware 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44892-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T04:24:06Z","timestamp":1556771046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44892-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403173","9783540448921"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-44892-6_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}