{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:34:58Z","timestamp":1743053698891,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031226762"},{"type":"electronic","value":"9783031226779"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-22677-9_23","type":"book-chapter","created":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T09:04:32Z","timestamp":1673341472000},"page":"433-454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AS-cast: Lock Down\u00a0the\u00a0Traffic of\u00a0Decentralized Content Indexing at\u00a0the\u00a0Edge"],"prefix":"10.1007","author":[{"given":"Adrien","family":"Lebre","sequence":"first","affiliation":[]},{"given":"Brice","family":"N\u00e9delec","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Van Kempen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,11]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Afanasyev, A., Yi, C., Wang, L., Zhang, B., Zhang, L.: SNAMP: secure namespace mapping to scale NDN forwarding. In: IEEE Conference on Computer Communications Workshops (2015)","DOI":"10.1109\/INFCOMW.2015.7179398"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal, V., Feldmann, A., Scheideler, C.: Can ISPS and P2P users cooperate for improved performance? In: SIGCOMM Computer Communication Review (2007)","DOI":"10.1145\/1273445.1273449"},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/TNSM.2019.2896710","volume":"16","author":"A Asrese","year":"2019","unstructured":"Asrese, A., Eravuchira, S., Bajpai, V., Sarolahti, P., Ott, J.: Measuring web latency and rendering performance: method, tools & longitudinal dataset. IEEE Trans. Netw. Serv. Manage. 16, 535\u2013549 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Barjon, M., Casteigts, A., Chaumette, S., Johnen, C., Neggaz, Y.M.: Maintaining a spanning forest in highly dynamic networks: the synchronous case. In: International Conference on Principles of Distributed Systems (2014)","DOI":"10.1007\/978-3-319-14472-6_19"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Beaumont, O., Kermarrec, A.M., Marchal, L., Rivi\u00e8re, E.: VoroNet: a scalable object network based on Voronoi tessellations. In: IEEE International Parallel and Distributed Processing Symposium (2007)","DOI":"10.1109\/IPDPS.2007.370210"},{"key":"23_CR6","unstructured":"Benet, J.: IPFS - content addressed, versioned, P2P file system. CoRR abs\/1407.3561 (2014)"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/312203.312207","volume":"17","author":"KP Birman","year":"1999","unstructured":"Birman, K.P., Hayden, M., Ozkasap, O., Xiao, Z., Budiu, M., Minsky, Y.: Bimodal multicast. ACM Trans. Comput. Syst. 17, 41\u201388 (1999)","journal-title":"ACM Trans. Comput. Syst."},{"key":"23_CR8","unstructured":"Breitbart, Y., Garofalakis, M., Martin, C., Rastogi, R., Seshadri, S., Silberschatz, A.: Topology discovery in heterogeneous IP networks. In: IEEE INFOCOM. Conference on Computer Communications (2000)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Confais, B., Lebre, A., Parrein, B.: An object store service for a fog\/edge computing infrastructure based on IPFS and a scale-out NAS. In: IEEE International Conference on Fog and Edge Computing (2017)","DOI":"10.1109\/ICFEC.2017.13"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Confais, B., Lebre, A., Parrein, B.: Performance analysis of object store systems in a fog and edge computing infrastructure. In: Transactions on Large-Scale Data-and Knowledge-Centered Systems (2017)","DOI":"10.1007\/978-3-662-55696-2_2"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"D\u2019Ambrosio, M., Dannewitz, C., Karl, H., Vercellone, V.: MDHT: a hierarchical name resolution service for information-centric networks. In: ACM SIGCOMM Workshop on Information-centric Networking (2011)","DOI":"10.1145\/2018584.2018587"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2018.1800132","volume":"57","author":"TV Doan","year":"2019","unstructured":"Doan, T.V., Pajevic, L., Bajpai, V., Ott, J.: Tracing the path to YouTube: a quantification of path lengths and latencies toward content caches. IEEE Commun. Mag. 57, 80\u201386 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Drolia, U., Guo, K., Tan, J., Gandhi, R., Narasimhan, P.: Cachier: edge-caching for recognition applications. In: IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (2017)","DOI":"10.1109\/ICDCS.2017.94"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MC.2004.1297243","volume":"37","author":"PT Eugster","year":"2004","unstructured":"Eugster, P.T., Guerraoui, R., Kermarrec, A.M., Massouli\u00e9, L.: Epidemic information dissemination in distributed systems. Computer 37, 60\u201367 (2004)","journal-title":"Computer"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1109\/TMC.2017.2734658","volume":"17","author":"JJ Garcia-Luna-Aceves","year":"2018","unstructured":"Garcia-Luna-Aceves, J.J., Martinez-Castillo, J.E., Menchaca-Mendez, R.: Routing to multi-instantiated destinations: principles, practice, and applications. IEEE Trans. Mobile Comput. 17, 1696\u20131709 (2018)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Guo, P., Hu, B., Li, R., Hu, W.: FoggyCache: cross-device approximate computation reuse. In: Annual International Conference on Mobile Computing and Networking. MobiCom (2018)","DOI":"10.1145\/3241539.3241557"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Gupta, H., Ramachandran, U.: Fogstore: a geo-distributed key-value store guaranteeing low latency for strongly consistent access. In: ACM Conference on Distributed and Event-based Systems. DEBS (2018)","DOI":"10.1145\/3210284.3210297"},{"key":"23_CR18","unstructured":"Hadzilacos, V., Toueg, S.: A modular approach to fault-tolerant broadcasts and related problems. Technical report, USA (1994)"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Hasenburg, J., Grambow, M., Bermbach, D.: Towards a replication service for data-intensive fog applications. In: ACM Symposium on Applied Computing (2020)","DOI":"10.1145\/3341105.3374060"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Hemmati, E., Garcia-Luna-Aceves, J.J.: A new approach to name-based link-state routing for information-centric networks. In: Proceedings of the 2nd ACM Conference on Information-Centric Networking. ICN (2015)","DOI":"10.1145\/2810156.2810173"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Hoque, A.K.M.M., Amin, S.O., Alyyan, A., Zhang, B., Zhang, L., Wang, L.: NLSR: named-data link state routing protocol. In: ACM SIGCOMM Workshop on Information-centric Networking (2013)","DOI":"10.1145\/2491224.2491231"},{"key":"23_CR22","unstructured":"Hsiao, H.C., King, C.T.: Scoped broadcast in dynamic peer-to-peer networks. In: International Computer Software and Applications Conference (2005)"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Iyer, S., Rowstron, A., Druschel, P.: Squirrel: a decentralized peer-to-peer web cache. In: Symposium on Principles of Distributed Computing. PODC (2002)","DOI":"10.1145\/571825.571861"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11734697_1","volume-title":"Engineering Self-Organising Systems","author":"M Jelasity","year":"2006","unstructured":"Jelasity, M., Babaoglu, O.: T-Man: gossip-based overlay topology management. In: Brueckner, S.A., Di Marzo Serugendo, G., Hales, D., Zambonelli, F. (eds.) ESOA 2005. LNCS (LNAI), vol. 3910, pp. 1\u201315. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11734697_1"},{"key":"23_CR25","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s13174-015-0029-1","volume":"6","author":"AM Kermarrec","year":"2015","unstructured":"Kermarrec, A.M., Ta\u00efani, F.: Want to scale in centralized systems? Think P2P. J. Internet Serv. App. 6, 16 (2015). https:\/\/doi.org\/10.1186\/s13174-015-0029-1","journal-title":"J. Internet Serv. App."},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1109\/JSAC.2011.111002","volume":"29","author":"S Knight","year":"2011","unstructured":"Knight, S., Nguyen, H.X., Falkner, N., Bowden, R., Roughan, M.: The internet topology zoo. IEEE J. Sel. Areas Commun. 29, 1765\u20131775 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"7","key":"23_CR27","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558\u2013565 (1978)","journal-title":"Commun. ACM"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Lue, M.Y., King, C.T., Fang, H.: Scoped broadcast in structured P2P networks. In: Conference on Scalable Information Systems (2006)","DOI":"10.1145\/1146847.1146899"},{"key":"23_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Montresor, A., Jelasity, M.: PeerSim: a scalable P2P simulator. In: Proceedings of the 9th International Conference on Peer-to-Peer (2009)","DOI":"10.1109\/P2P.2009.5284506"},{"issue":"4","key":"23_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3239162","volume":"4","author":"AY Nur","year":"2018","unstructured":"Nur, A.Y., Tozal, M.E.: Geography and routing in the internet. ACM Trans. Spatial Algorithms Syst. 4(4), 1\u20136 (2018)","journal-title":"ACM Trans. Spatial Algorithms Syst."},{"key":"23_CR32","unstructured":"RFC2328: OSPF Version 2 (1998). https:\/\/tools.ietf.org\/html\/rfc2328"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Seedorf, J., Kiesel, S., Stiemerling, M.: Traffic localization for P2P-applications: the ALTO approach. In: 2009 IEEE 9th International Conference on Peer-to-Peer Computing, pp. 171\u2013177, September 2009","DOI":"10.1109\/P2P.2009.5284511"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Shapiro, M., Pregui\u00e7a, N., Baquero, C., Zawirski, M.: Conflict-free Replicated Data Types. Research Report RR-7687, July 2011","DOI":"10.1007\/978-3-642-24550-3_29"},{"issue":"5","key":"23_CR35","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet Things J."},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Sohier, D., Georgiadis, G., Ere, S., Papatriantafilou, M., Bui, A.: Physarum-inspired self-biased walkers for distributed clustering. In: International Conference on Principles of Distributed Systems (2012)","DOI":"10.1007\/978-3-642-35476-2_22"},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"Triukose, S., Wen, Z., Rabinovich, M.: Measuring a commercial content delivery network. In: Conference on World Wide Web (2011)","DOI":"10.1145\/1963405.1963472"},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Wang, L., Bayhan, S., Ott, J., Kangasharju, J., Sathiaseelan, A., Crowcroft, J.: Pro-Diluvian: understanding scoped-flooding for content discovery in information-centric networking. In: ACM Conference on Information-Centric Networking (2015)","DOI":"10.1145\/2810156.2810162"},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"Xie, J., Qian, C., Guo, D., Wang, M., Shi, S., Chen, H.: Efficient indexing mechanism for unstructured data sharing systems in edge computing. In: IEEE Conference on Computer Communications (2019)","DOI":"10.1109\/INFOCOM.2019.8737617"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22677-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T09:10:15Z","timestamp":1673341815000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22677-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031226762","9783031226779"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22677-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"91","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}