{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:38:01Z","timestamp":1725514681350},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540686392"},{"type":"electronic","value":"9783540686422"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68642-2_10","type":"book-chapter","created":{"date-parts":[[2008,6,4]],"date-time":"2008-06-04T15:35:33Z","timestamp":1212593733000},"page":"112-125","source":"Crossref","is-referenced-by-count":1,"title":["Virtual Overlays: An Approach to the Management of Competing or Collaborating Overlay Structures"],"prefix":"10.1007","author":[{"given":"Paul M.","family":"Okanda","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sebastian","family":"Steinhauer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gordon","family":"Blair","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Grace, P., Coulson, G., Blair, G., Mathy, L., Yeung, W.K., Cai, W., et al.: GRIDKIT: Pluggable Overlay Networks for Grid Computing. In: Proceedings of Distributed Objects and Applications(DOA), Cyprus (2004)","DOI":"10.1007\/978-3-540-30469-2_40"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Loo, B.T., Condie, T., Hellerstein, H. M., Maniatis, P.: Implementing Declarative Overlays. In: Proceedings of ACM Symposium on Operating System Principles 2005 (SOSP), Brighton, UK (2005)","DOI":"10.1145\/1095810.1095818"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Cooper, F., B.: Trading Off Resources between overlapping Overlays. In: Proceedings of the ACM\/IFIP\/USENIX 7th Middleware Conference, Melbourne, Australia (2006)","DOI":"10.1007\/11925071_6"},{"key":"10_CR4","unstructured":"Aberer, K., Alima, L.: The essence of P2P: A Reference Architecture for Overlay Networks. In: Proceedings of the 5th IEEE Conference on Peer-to-Peer Computing, Konstanz, Germany (2005)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrsihnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: Proceedings of the ACM SIGCOMM Conference, San Diego, CA, USA (2001)","DOI":"10.1145\/383059.383071"},{"issue":"5","key":"10_CR6","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/52.156899","volume":"9","author":"A.M. Davis","year":"1992","unstructured":"Davis, A.M.: Operational Prototyping: A New Development Approach. IEEE Software\u00a09(5), 70\u201378 (1992)","journal-title":"IEEE Software"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable Decentralized Object Location and Routing for Large Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, Springer, Heidelberg (2001), 329 et sqq"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Mathy, L., Canonico, R., Hutchinson, D.: An Overlay Tree building Control Protocol. In: Proceedings of the 3rd International Workshop on Networked Group Communication, NGC, London (2001)","DOI":"10.1007\/3-540-45546-9_6"},{"key":"10_CR9","unstructured":"Coulson, G., Blair, G., Grace, P., Joolia, A.: A Component Model for Building Systems Software. In: Proceedings of IASTED Software Engineering and Applications (SEA), Cambridge, MA, USA (2004)"},{"key":"10_CR10","unstructured":"The Log4J Appender, http:\/\/logging.apache.org\/log4j\/docs\/index.html"},{"key":"10_CR11","unstructured":"Conoboy, B., Fichtner, E.: IP Filter Based Firewalls HOWTO Tutorial (2002), http:\/\/www.obfuscation.org\/ipf"},{"key":"10_CR12","unstructured":"IP Filter ver. 4.1.27, http:\/\/coombs.anu.edu.au\/~avalon\/"},{"key":"10_CR13","unstructured":"Toussaint, A. (ed.): Java Rule Engine API: JSR-94. Java Community Press (September 2003)"},{"key":"10_CR14","unstructured":"Friedman-Hill, E.: Jess Information, the Jess Engine for the Java Platform, http:\/\/www.jessrules.com\/jess\/index.shtml"},{"key":"10_CR15","unstructured":"JBoss: JBoss Rules Documentation Library, jboss.org, http:\/\/labs.jboss.com\/jbossrules\/docs"},{"key":"10_CR16","unstructured":"Hammurapi Group: Hammurapi Rules, http:\/\/www.hammurapi.biz\/hammurapi-biz\/ef\/xmenu\/products\/hammurapirules\/index.html"}],"container-title":["Lecture Notes in Computer Science","Distributed Applications and Interoperable Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68642-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T22:08:59Z","timestamp":1557612539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68642-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540686392","9783540686422"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68642-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}