{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:36:29Z","timestamp":1743129389606,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319093772"},{"type":"electronic","value":"9783319093789"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09378-9_3","type":"book-chapter","created":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T10:44:42Z","timestamp":1410777882000},"page":"25-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Socially-Aware Traffic Management"],"prefix":"10.1007","author":[{"given":"Michael","family":"Seufert","sequence":"first","affiliation":[]},{"given":"George","family":"Darzanos","sequence":"additional","affiliation":[]},{"given":"Ioanna","family":"Papafili","sequence":"additional","affiliation":[]},{"given":"Roman","family":"\u0141apacz","sequence":"additional","affiliation":[]},{"given":"Valentin","family":"Burger","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Ho\u00dffeld","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,20]]},"reference":[{"key":"3_CR1","unstructured":"Alimi R, Penno R, Yang Y (2013) ALTO protocol. Technical report, Internet engineering task force application-layer traffic optimization working group. http:\/\/tools.ietf.org\/wg\/alto\/"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone\u2019s an influencer: quantifying influence on Twitter. In: Proceedings of the 4th ACM international conference on web search and data mining (WSDM \u201911), New York","DOI":"10.1145\/1935826.1935845"},{"key":"3_CR3","unstructured":"Biancani M, Cruschelli P (eds) (2013) Deliverable D1.2 report on cloud service classifications and scenarios, SmartenIT Consortium (European FP7 STREP No. 317846)"},{"key":"3_CR4","unstructured":"Cisco (2012) Cisco visual networking index: forecast and methodology, 2011\u20132016. Technical report, Cisco"},{"issue":"5","key":"3_CR5","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1109\/JSAC.2008.080602","volume":"26","author":"P Costa","year":"2008","unstructured":"Costa P, Mascolo C, Musolesi M, Picco GP (2008) Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks. IEEE J Sel Areas Commun 26(5):748\u2013760","journal-title":"IEEE J Sel Areas Commun"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Dinh TN, Xuan Y, Thai MT (2009) Towards social-aware routing in dynamic communication networks. In: Proceedings of the 28th IEEE international performance computing and communications conference (IPCCC), Phoenix","DOI":"10.1109\/PCCC.2009.5403845"},{"key":"3_CR7","first-page":"251","volume-title":"The Sybil attack","author":"JR Douceur","year":"2002","unstructured":"Douceur JR (2002) The Sybil attack. In: Peer-to-peer systems. Springer, Berlin\/Heidelberg pp 251\u2013260"},{"issue":"2","key":"3_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MNET.2010.5430142","volume":"24","author":"M Fiedler","year":"2010","unstructured":"Fiedler M, Hossfeld T, Tran-Gia P (2010) A generic quantitative relationship between quality of experience and quality of service. IEEE Netw 24(2):36\u201341","journal-title":"IEEE Netw"},{"key":"3_CR9","unstructured":"Ganley B (2013) Optimize the virtual desktop experience through strong back-end design. Technical report, Dell Power Solutions. http:\/\/i.dell.com\/sites\/doccontent\/business\/solutions\/power\/en\/Documents\/ps4q13-20130371-ganley.pdf"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Gautam N, Petander H, Noel J (2013) A comparison of the cost and energy efficiency of prefetching and streaming of mobile video. In: Proceedings of the 5th workshop on mobile video (MoVid \u201913), New York","DOI":"10.1145\/2457413.2457416"},{"key":"3_CR11","unstructured":"Hausheer D, R\u00fcckert J (eds) (2013) Deliverable D3.1 report on initial system architecture, SmartenIT Consortium (European FP7 STREP No. 317846)"},{"key":"3_CR12","first-page":"24","volume-title":"An economic traffic management approach to enable the TripleWin for users, ISPs, and overlay providers","author":"T Ho\u00dffeld","year":"2009","unstructured":"Ho\u00dffeld T, Hausheer D, Hecht F, Lehrieder F, Oechsner S, Papafili I, Racz P, Soursos S, Staehle D, Stamoulis GD, Tran-Gia P, Stiller B (2009) An economic traffic management approach to enable the TripleWin for users, ISPs, and overlay providers. In: Towards the future internet \u2013 a European research perspective, Future internet assembly, pp 24\u201334"},{"issue":"4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCOM.2012.6178833","volume":"50","author":"S Ickin","year":"2012","unstructured":"Ickin S, Wac K, Fiedler M, Janowski L, Hong JH, Dey AK (2012) Factors influencing quality of experience of commonly used mobile applications. IEEE Commun Mag 50(4):48\u201356","journal-title":"IEEE Commun Mag"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Kaup F, Hausheer D (2013) Optimizing energy consumption and QoE on mobile devices. In: Proceedings of the IEEE international conference on network protocols (ICNP 2013), G\u00f6ttingen","DOI":"10.1109\/ICNP.2013.6733641"},{"key":"3_CR15","volume-title":"SocialTube: P2P-assisted video sharing in online social networks","author":"Z Li","year":"2012","unstructured":"Li Z, Shen H, Wang H, Liu G, Li J (2012) SocialTube: P2P-assisted video sharing in online social networks. In: Proceedings of the IEEE INFOCOM, Orlando"},{"key":"3_CR16","volume-title":"Incentives and algorithms for broadband access sharing","author":"L Mamatas","year":"2010","unstructured":"Mamatas L, Psaras I, Pavlou G (2010) Incentives and algorithms for broadband access sharing. In: Proceedings of the ACM SIGCOMM workshop on home networks, New Delhi"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T (2011) The NIST definition of cloud computing. Technical report, Recommendations of the National Institute of Standards and Technology","DOI":"10.6028\/NIST.SP.800-145"},{"key":"3_CR18","first-page":"254","volume-title":"Anonymity in the wild: mixes on unstructured networks","author":"S Nagaraja","year":"2007","unstructured":"Nagaraja S (2007) Anonymity in the wild: mixes on unstructured networks. In: Privacy enhancing technologies. Springer, Berlin\/Heidelberg, pp 254\u2013271"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Ruhela A, Tripathy RM, Triukose S, Ardon S, Bagchi A, Seth A (2011) Towards the use of online social networks for efficient internet content distribution. In: Proceedings of the IEEE 5th international conference on advanced networks and telecommunication systems (ANTS), Bangalore","DOI":"10.1109\/ANTS.2011.6163677"},{"key":"3_CR20","unstructured":"Sastry N, Crowcroft J, Sollins K (2007) Architecting citywide ubiquitous Wi-Fi access. In: Proceedings of the 6th workshop on hot topics in networks (HotNets), Atlanta"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Sastry N, Yoneki E, Crowcroft J (2009) Buzztraq: predicting geographical access patterns of social cascades using social networks. In: Proceedings of the 2nd ACM EuroSys workshop on social network systems (SocialNets), Nuremberg","DOI":"10.1145\/1578002.1578009"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Scellato S, Mascolo C, Musolesi M, Crowcroft J (2011) Track globally, deliver locally: improving content delivery networks by tracking geographic social cascades. In: Proceedings of the 20th international conference on world wide web (WWW2011), Hyderabad","DOI":"10.1145\/1963405.1963471"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Seufert M, Burger V, Ho\u00dffeld T (2013) HORST \u2013 home router sharing based on trust. In: Proceedings of the workshop on social-aware economic traffic management for overlay and cloud applications (SETM 2013), Zurich","DOI":"10.1109\/CNSM.2013.6727865"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Traverso S, Huguenin K, Triestan I, Erramilli V, Laoutaris N, Papagiannaki K (2012) TailGate: handling long-tail content with a little help from friends. In: Proceedings of the 21st international conference on world wide web (WWW2012), Lyon","DOI":"10.1145\/2187836.2187858"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Valancius V, Laoutaris N, Massouli\u00e9 L, Diot C, Rodriguez P (2009) Greening the internet with nano data centers. In: Proceedings of the 5th international conference on emerging networking experiments and technologies (Co-NEXT \u201909), Rome","DOI":"10.1145\/1658939.1658944"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Vidales P, Manecke A, Solarski M (2009) Metropolitan public WiFi access based on broadband sharing. In: Proceedings of the Mexican international conference on computer science (ENC 2009), Mexico City","DOI":"10.1109\/ENC.2009.22"},{"key":"3_CR27","volume-title":"Guiding internet-scale video service deployment using microblog-based prediction","author":"Z Wang","year":"2012","unstructured":"Wang Z, Sun L, Wu C, Yang S (2012) Guiding internet-scale video service deployment using microblog-based prediction. In: Proceedings of the IEEE INFOCOM, Orlando"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Wittie MP, Pejovic V, Deek L, Almeroth KC, Zhao BY (2010) Exploiting locality of interest in online social networks. In: Proceedings of the 6th international conference on emerging networking experiments and technologies (Co-NEXT \u201910), Philadelphia","DOI":"10.1145\/1921168.1921201"},{"key":"3_CR29","unstructured":"Yoshida H (2011) The differences between tiering and HSM. http:\/\/blogs.hds.com\/hu\/2011\/05\/the-differences-between-tiering-and-hsm-hierarchical-storage-management.html"},{"issue":"4","key":"3_CR30","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/1151659.1159945","volume":"36","author":"H Yu","year":"2006","unstructured":"Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) SybilGuard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267\u2013278","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Zhou F, Zhang L, Franco E, Mislove A, Revis R, Sundaram R (2012) WebCloud: recruiting social network users to assist in content distribution. In: Proceedings of the 11th IEEE international symposium on network computing and applications (NCA), Cambridge","DOI":"10.1109\/NCA.2012.41"}],"container-title":["Springer Proceedings in Complexity","Socioinformatics - The Social Impact of Interactions between Humans and IT"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09378-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T13:31:50Z","timestamp":1676899910000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09378-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319093772","9783319093789"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09378-9_3","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"type":"print","value":"2213-8684"},{"type":"electronic","value":"2213-8692"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"20 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}