{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:46:54Z","timestamp":1773082014928,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540407249","type":"print"},{"value":"9783540451723","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45172-3_15","type":"book-chapter","created":{"date-parts":[[2011,1,17]],"date-time":"2011-01-17T18:40:01Z","timestamp":1295289601000},"page":"160-169","source":"Crossref","is-referenced-by-count":104,"title":["Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead"],"prefix":"10.1007","author":[{"given":"Indranil","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Ken","family":"Birman","sequence":"additional","affiliation":[]},{"given":"Prakash","family":"Linga","sequence":"additional","affiliation":[]},{"given":"Al","family":"Demers","sequence":"additional","affiliation":[]},{"given":"Robbert","family":"van Renesse","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","volume-title":"Epidemic Theory of Infectious Diseases and its Applications","author":"N.T.J. Bailey","year":"1975","unstructured":"Bailey, N.T.J.: Epidemic Theory of Infectious Diseases and its Applications, 2nd edn. Hafner Press, New York (1975)","edition":"2"},{"issue":"2","key":"15_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/312203.312207","volume":"17","author":"K.P. Birman","year":"1999","unstructured":"Birman, K.P., Hayden, M., Ozkasap, O., Xiao, Z., Budiu, M., Minsky, Y.: Bimodal Multicast. ACM Trans. Comp. Syst.\u00a017(2), 41\u201388 (1999)","journal-title":"ACM Trans. Comp. Syst."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Dabek, F., Brunskill, E., Kaashoek, M.F., Karger, D.: Building peer-to-peer systems with Chord, a distributed lookup service. In: Proc. 8th Wshop. Hot Topics in Operating Syst., HOTOS-VIII (May 2001)","DOI":"10.1109\/HOTOS.2001.990065"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Demers, A., Greene, D.H., Hauser, J., Irish, W., Larson, J.: Epidemic algorithms for replicated database maintenance. In: Proc. 6th ACM Symp. Principles of Distributed Computing (PODC), pp. 1\u201312 (1987)","DOI":"10.1145\/41840.41841"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Demers, A.: Spatial gossip and resource location protocols. In: Proc. 33rd ACM Symp. Theory of Computing (STOC), pp. 163\u2013172 (2001)","DOI":"10.1145\/380752.380796"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, p. 329. Springer, Heidelberg (2001)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"van Renesse, R., Minsky, Y., Hayden, M.: A gossip-style failure detection service. In: Proc. IFIP Middleware (1998)","DOI":"10.1007\/978-1-4471-1283-9_4"},{"key":"15_CR8","unstructured":"Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, Springer, Heidelberg (2002)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Gummadi, P.K., Gribble, S.D.: A measurement study of peer-to-peer file sharing systems. In: Proc. Multimedia Computing and Networking, MMCN (2002)","DOI":"10.1117\/12.449977"},{"key":"15_CR10","unstructured":"Internet Traffic Archive, http:\/\/ita.ee.lbl.gov"},{"key":"15_CR11","unstructured":"Fireflies of Selangor River, Malaysia, http:\/\/www.firefly-selangor-msia.com\/fabout.htm"}],"container-title":["Lecture Notes in Computer Science","Peer-to-Peer Systems II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45172-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T21:42:34Z","timestamp":1740865354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45172-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407249","9783540451723"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45172-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}