{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:20:11Z","timestamp":1740097211733,"version":"3.37.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261478"},{"type":"electronic","value":"9783319261485"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26148-5_13","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T01:50:57Z","timestamp":1444787457000},"page":"219-236","source":"Crossref","is-referenced-by-count":1,"title":["Utilizing the Hive Mind \u2013 How to Manage Knowledge in Fully Distributed Environments"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Bach","sequence":"first","affiliation":[]},{"given":"Muhammad Adnan","family":"Tariq","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Mayer","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Rothermel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Ashbrook, D., Starner, T.: Using GPS to learn significant locations and predict movement across multiple users. Personal and Ubiquitous Computing 7(5) (2003)","DOI":"10.1007\/s00779-003-0240-0"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-31838-5_6","volume-title":"Databases, Information Systems, and Peer-to-Peer Computing","author":"M Batko","year":"2005","unstructured":"Batko, M., Gennaro, C., Zezula, P.: A scalable nearest neighbor search in P2P systems. In: Ng, W.S., Ooi, B.-C., Ouksel, A.M., Sartori, C. (eds.) DBISP2P 2004. LNCS, vol. 3367, pp. 79\u201392. Springer, Heidelberg (2005)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Bharambe, A.R., Agrawal, M., Seshan, S.: Mercury: supporting scalable multi-attribute range queries. In: ACM SIGCOMM Computer Communication Review, vol. 34, pp. 353\u2013366. ACM (2004)","DOI":"10.1145\/1030194.1015507"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/11766254_8","volume-title":"Flexible Query Answering Systems","author":"D Chen","year":"2006","unstructured":"Chen, D., Zhou, J., Le, J.: Reverse nearest neighbor search in peer-to-peer systems. In: Larsen, H.L., Pasi, G., Ortiz-Arroyo, D., Andreasen, T., Christiansen, H. (eds.) FQAS 2006. LNCS (LNAI), vol. 4027, pp. 87\u201396. Springer, Heidelberg (2006)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Chen, X., Yin, W., Tu, P., Zhang, H.: Weighted k-means algorithm based text clustering. In: Proceedings of the 2009 International Symposium on Information Engineering and Electronic Commerce, IEEC 2009, pp. 51\u201355. IEEE Computer Society, Washington, DC (2009). \n                      http:\/\/dx.doi.org\/10.1109\/IEEC.2009.17","DOI":"10.1109\/IEEC.2009.17"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, C., Cimet, I., Kumar, S.: A protocol to maintain a minimum spanning tree in a dynamic topology. In: Symposium Proceedings on Communications Architectures and Protocols, SIGCOMM 1988. ACM (1988)","DOI":"10.1145\/52324.52357"},{"key":"13_CR7","unstructured":"Cisco: Cisco global cloud index: Forecast and methodology, 2013\u20132018 (2014). \n                      http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/global-cloud-index-gci\/Cloud_Index_White_Paper.html"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Ganesan, P., Yang, B., Garcia-Molina, H.: One torus to rule them all: multi-dimensional queries in p2p systems. In: Proc. of the 7th Int. Workshop on the Web and Databases: Colocated with ACM SIGMOD\/PODS 2004. ACM (2004)","DOI":"10.1145\/1017074.1017081"},{"key":"13_CR9","unstructured":"Hamerly, G., Elkan, C.: Learning the k in k-means. In: Thrun, S., Saul, L., Sch\u00f6lkopf, B. (eds.) Advances in Neural Information Processing Systems, vol. 16, pp. 281\u2013288. MIT Press (2004)"},{"key":"13_CR10","unstructured":"Hern\u00e1dv\u00f6lgyi, I.: Generating random vectors from the multivariate normal istribution. Tech. rep., University of Ottawa, Canada, Ottawa, ON (1998)"},{"key":"13_CR11","unstructured":"informationisbeautiful.net: World\u2019s biggest data breaches (2015). \n                      http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/"},{"issue":"3","key":"13_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/BF02289588","volume":"32","author":"S Johnson","year":"1967","unstructured":"Johnson, S.: Hierarchical clustering schemes. Psychometrika 32(3), 241\u2013254 (1967)","journal-title":"Psychometrika"},{"key":"13_CR13","unstructured":"Li, M., Lee, W.C., Sivasubramaniam, A.: Semantic small world: an overlay network for peer-to-peer search. In: Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004, pp. 228\u2013238. IEEE (2004)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Lindley, D.V.: Introduction to probability and statistics from bayesian viewpoint, part 1 probability, vol.\u00a01. CUP Archive (1965)","DOI":"10.1017\/CBO9780511662973"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Lu, Y., Cohen, I., Zhou, X.S., Tian, Q.: Feature selection using principal feature analysis. In: Proc. of the 15th Int. Conf. on Multimedia, pp. 301\u2013304. ACM (2007)","DOI":"10.1145\/1291233.1291297"},{"key":"13_CR16","unstructured":"Madden, M.: Privacy and cybersecurity: Key findings from pew research (2015). \n                      http:\/\/www.pewresearch.org\/key-data-points\/privacy\/"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.is.2013.10.006","volume":"45","author":"Y Malkov","year":"2014","unstructured":"Malkov, Y., Ponomarenko, A., Logvinov, A., Krylov, V.: Approximate nearest neighbor algorithm based on navigable small world graphs. Information Systems 45, 61\u201368 (2014)","journal-title":"Information Systems"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Montresor, A., Jelasity, M.: Peersim: a scalable p2p simulator. In: IEEE Ninth Int. Conf. on Peer-to-Peer Computing, P2P 2009, pp. 99\u2013100. IEEE (2009)","DOI":"10.1109\/P2P.2009.5284506"},{"key":"13_CR19","unstructured":"Ogallo, H.G., Jha, M.K., Marroquin, O.: Studying the impacts of vehicular congestion and offering sustainable solutions to city living. In: Proceedings of the 2nd International Conference on Sustainable Cities, Urban Sustainability and Transportation (SCUST 2013) (2013)"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1145\/964723.383072","volume":"31","author":"S Ratnasamy","year":"2001","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network. ACM SIGCOMM Computer Communication Review 31, 161\u2013172 (2001)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-31838-5_5","volume-title":"Databases, Information Systems, and Peer-to-Peer Computing","author":"OD Sahin","year":"2005","unstructured":"Sahin, O.D., Emekci, F., Agrawal, D.P., El Abbadi, A.: Content-based similarity search over peer-to-peer systems. In: Ng, W.S., Ooi, B.-C., Ouksel, A.M., Sartori, C. (eds.) DBISP2P 2004. LNCS, vol. 3367, pp. 61\u201378. Springer, Heidelberg (2005)"},{"issue":"7","key":"13_CR23","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1016\/j.jpdc.2008.02.003","volume":"68","author":"C Schmidt","year":"2008","unstructured":"Schmidt, C., Parashar, M.: Squid: Enabling search in dht-based systems. Journal of Parallel and Distributed Computing 68(7), 962\u2013975 (2008)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"13_CR24","unstructured":"Shu, Y., Ooi, B.C., Tan, K.L., Zhou, A.: Supporting multi-dimensional range queries in peer-to-peer systems. In: Fifth IEEE International Conference on Peer-to-Peer Computing, P2P 2005, pp. 173\u2013180. IEEE (2005)"},{"issue":"4","key":"13_CR25","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/964723.383071","volume":"31","author":"I Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Computer Communication Review 31(4), 149\u2013160 (2001)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"1","key":"13_CR26","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/774763.774777","volume":"33","author":"C Tang","year":"2003","unstructured":"Tang, C., Xu, Z., Mahalingam, M.: pSearch: Information retrieval in structured overlays. ACM SIGCOMM Computer Communication Review 33(1), 89\u201394 (2003)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"13_CR27","unstructured":"Tariq, M.A., Koldehofe, B., Bhowmik, S., Rothermel, K.: Pleroma: a SDN-based high performance publish\/subscribe middleware. In: Proceedings of the 15th International Middleware Conference, Middleware 2014, pp. 217\u2013228. ACM, New York (2014). \n                      http:\/\/doi.acm.org\/10.1145\/2663165.2663338"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Tariq, M.A., Koldehofe, B., Koch, G.G., Rothermel, K.: Distributed spectral cluster management: a method for building dynamic publish\/subscribe systems. In: Proceedings of the 6th ACM int. Conf. on Distributed Event-Based Systems, pp. 213\u2013224. ACM (2012)","DOI":"10.1145\/2335484.2335508"},{"key":"13_CR29","first-page":"856","volume":"3","author":"L Yu","year":"2003","unstructured":"Yu, L., Liu, H.: Feature selection for high-dimensional data: a fast correlation-based filter solution. ICML 3, 856\u2013863 (2003)","journal-title":"ICML"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Li, Q., Chen, Y., Xie, X., Ma, W.Y.: Understanding mobility based on GPS data. In: Proceedings of the 10th International Conference on Ubiquitous Computing, pp. 312\u2013321. ACM (2008)","DOI":"10.1145\/1409635.1409677"},{"issue":"2","key":"13_CR31","first-page":"32","volume":"33","author":"Y Zheng","year":"2010","unstructured":"Zheng, Y., Xie, X., Ma, W.Y.: Geolife: A collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull. 33(2), 32\u201339 (2010)","journal-title":"IEEE Data Eng. Bull."},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Zhang, L., Xie, X., Ma, W.Y.: Mining interesting locations and travel sequences from GPS trajectories. In: Proceedings of the 18th International Conference on World Wide Web, pp. 791\u2013800. ACM (2009)","DOI":"10.1145\/1526709.1526816"},{"issue":"12","key":"13_CR33","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1002\/sec.795","volume":"7","author":"JH Ziegeldorf","year":"2014","unstructured":"Ziegeldorf, J.H., Morchon, O.G., Wehrle, K.: Privacy in the internet of things: threats and challenges. Security and Communication Networks 7(12), 2728\u20132742 (2014)","journal-title":"Security and Communication Networks"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2015 Conferences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26148-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T02:01:37Z","timestamp":1559268097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26148-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261478","9783319261485"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26148-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}