{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:55:26Z","timestamp":1725566126140},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235644"},{"type":"electronic","value":"9783540302087"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30208-7_67","type":"book-chapter","created":{"date-parts":[[2010,9,21]],"date-time":"2010-09-21T22:17:23Z","timestamp":1285107443000},"page":"487-494","source":"Crossref","is-referenced-by-count":0,"title":["WCBF: Efficient and High-Coverage Search Schema in Unstructured Peer-to-Peer Network"],"prefix":"10.1007","author":[{"given":"Qianbing","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Yongwen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xicheng","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","unstructured":"http:\/\/www.caida.org\/analysis\/workload\/oc48"},{"key":"67_CR2","unstructured":"http:\/\/eddie.csd.sc.edu"},{"key":"67_CR3","unstructured":"WISC: (traffic statistics), http:\/\/wwwstats.net.wisc.edu"},{"key":"67_CR4","doi-asserted-by":"crossref","unstructured":"Ripeanu, M., Foster, I., Iamnitchi, A.: Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal 6-1 (2002)","DOI":"10.1007\/3-540-45748-8_8"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Jiang, S., Guo, L., Zhang, X.: Lightflood: an efficient flooding scheme for file search in unstructured peer-to-peer systems. In: Proceedings of ICPP (2003)","DOI":"10.1109\/ICPP.2003.1240631"},{"key":"67_CR6","doi-asserted-by":"crossref","unstructured":"Kalogeraki, V., Gunopulos, D., Zeinalipour-Yazti, D.: A local search mechanism for peer-to-peer networks. In: CIKM (2002)","DOI":"10.1145\/584792.584842"},{"key":"67_CR7","unstructured":"Yang, B., Garcia-Molina, H.: Efficient search in peer-to-peer networks. In: Proceedings of the ICDCS (2002)"},{"key":"67_CR8","doi-asserted-by":"crossref","unstructured":"Lv, Q., Cao, P., Cohen, E., Li, K., Shenker, S.: Search and replication in unstructured peer-to-peer networks. In: Proceedings of the annual ACM International Conference on supercomputing, vol.\u00a016 (2002)","DOI":"10.1145\/514191.514206"},{"key":"67_CR9","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O.: Freenet: A distributed anonymous information storage and retrieval system. In: Proceedings of the ICSI Workshop On Design Issues in Anonymity and Unobservability (2002)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"67_CR10","doi-asserted-by":"crossref","unstructured":"Tsoumakos, D., Roussopoulos, N.: Adaptive probabilistic search for peer-to-peer networks. In: 3rd IEEE Intl Conference on P2P computing (2003)","DOI":"10.1109\/PTP.2003.1231509"},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making gnutella-like p2p systems scalable. In: SIGCOMM (2003)","DOI":"10.1145\/863955.864000"},{"key":"67_CR12","doi-asserted-by":"crossref","unstructured":"Zhuang, Z., Liu, Y., Xiao, L., Ni, L.M.: Hybrid periodical flooding in unstructured peer-to-peer networks. In: Proceedings of ICPP (2003)","DOI":"10.1109\/ICPP.2003.1240578"},{"key":"67_CR13","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., Mihail, M., Saberi, A.: Random walks in peer-to-peer networks. In: INFOCOM (2004)","DOI":"10.1109\/INFCOM.2004.1354487"},{"key":"67_CR14","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/TNET.2002.803864","volume":"10","author":"M. Mitzenmacher","year":"2002","unstructured":"Mitzenmacher, M.: Compressed bloom filters. IEEE Transactions on Networking\u00a010, 604 (2002)","journal-title":"IEEE Transactions on Networking"},{"issue":"7","key":"67_CR15","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. Bloom","year":"1970","unstructured":"Bloom, B.: Space\/time tradeoffs in in hash coding with allowable errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"67_CR16","doi-asserted-by":"crossref","unstructured":"Whitaker, A., Wetherall, D.: Forwarding without loops in icarus. In: Proceedings of the Fifth OPENARCH, pp. 63\u201375 (2002)","DOI":"10.1109\/OPNARC.2002.1019229"},{"key":"67_CR17","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TCOM.1984.1096090","volume":"32","author":"J. Cleary","year":"1984","unstructured":"Cleary, J., Witten, I.: Data compression using adaptive coding and partial string matching. IEEE Transactions on Communications\u00a032, 396\u2013402 (1984)","journal-title":"IEEE Transactions on Communications"},{"key":"67_CR18","unstructured":"Jovanovic, M., Annexstein, F.S., Berman, K.A.: Modeling peer-to-peer network topologies through \u201csmall-world\u201d models and power laws. In: Proceedings of the TELFOR (2001)"},{"key":"67_CR19","unstructured":"Group, D.: Gnutella: To the bandwidth barrier and beyond. Technical report, DSS Group (2000)"},{"key":"67_CR20","doi-asserted-by":"crossref","unstructured":"Barabasi, A.L., Albert, R.: Emergence of scaling in random networks. Science 509 (1999)","DOI":"10.1126\/science.286.5439.509"},{"key":"67_CR21","unstructured":"Dreier, D.: Manual of operation: Barabasi graph generator v1.0, http:\/\/www.cs.ucr.edu\/~ddreier\/bman.pdf"},{"key":"67_CR22","volume-title":"The popularity of gnutella queries and its implications on scalability","author":"K. Sripanidkulchai","year":"2001","unstructured":"Sripanidkulchai, K.: The popularity of gnutella queries and its implications on scalability. O\u2019Reilly\u2019s, Sebastopol (2001), www.openp2p.com"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30208-7_67.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:49:17Z","timestamp":1605761357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30208-7_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235644","9783540302087"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30208-7_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}