{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T05:16:36Z","timestamp":1738300596132,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540686392"},{"type":"electronic","value":"9783540686422"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68642-2_12","type":"book-chapter","created":{"date-parts":[[2008,6,4]],"date-time":"2008-06-04T15:35:33Z","timestamp":1212593733000},"page":"140-153","source":"Crossref","is-referenced-by-count":0,"title":["Managing Peer-to-Peer Live Streaming Applications"],"prefix":"10.1007","author":[{"given":"Raymond","family":"Cunningham","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bartosz","family":"Biskupski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ren\u00e9","family":"Meier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Castro, M., Drushel, P., Kermarrec, A., Nandi, A., Rowstron, A., Singh, A.: Splitstream: High-Bandwidth Multicast in Cooperative Environments. In: SOSP (2003)","DOI":"10.1145\/945445.945474"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Kostic, D., Rodriguez, A., Albrecht, J., Vahdat, A.: Bullet: high bandwidth data dissemination using an overlay mesh. In: Symposium on Operating System Principles (2003)","DOI":"10.1145\/945445.945473"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/11558989_12","volume-title":"Peer-to-Peer Systems IV","author":"V.S. Pai","year":"2005","unstructured":"Pai, V.S., Kumar, K., Tamilmani, K., Sambamurthy, V.: Chainsaw: Eliminating trees from overlay multicast. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol.\u00a03640, pp. 127\u2013140. Springer, Heidelberg (2005)"},{"key":"12_CR4","unstructured":"Jannotti, J., Gifford, D.K., Johnson, K.L., Kaashoek, M.F., O\u2019Toole, J.: Overcast: Reliable multicasting with an overlay network. In: OSDI (2000)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Castro, M., Drushel, P., Kermarrec, A., Rowstron, A.: SCRIBE: A large-scale decentralised application level multicast infrastructure. IEEE JSAC, 1\u20139 (2002)","DOI":"10.1109\/JSAC.2002.803069"},{"key":"12_CR6","unstructured":"Zhang, X., Liu, J., Li, B., Yum, T.S.P.: Coolstreaming\/donet: A data-driven overlay network for peer-to-peer live media streaming (2005)"},{"key":"12_CR7","first-page":"4","volume-title":"AAA-IDEA 2006: Proceedings of the 2nd international workshop on Advanced architectures and algorithms for internet delivery and applications","author":"B. Biskupski","year":"2006","unstructured":"Biskupski, B., Cunningham, R., Dowling, J., Meier, R.: High-bandwidth mesh-based overlay multicast in heterogeneous environments. In: AAA-IDEA 2006: Proceedings of the 2nd international workshop on Advanced architectures and algorithms for internet delivery and applications, p. 4. ACM, New York (2006)"},{"key":"12_CR8","unstructured":"Hiclanan, K., Elgamal, T.: The SSL protocol. Internet draft, Netscape Communications Corp. Technical report (1995)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Kohl, J.T., Neuman, B.C.: The Kerberos network authentication service (V5). Technical Report 1510 (1993)","DOI":"10.17487\/rfc1510"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Jelasity, M., Babaoglu, O.: T-man: Gossip-based overlay topology management. In: 3rd International Workshop on Engineering Self-Organising Applications (2005)","DOI":"10.1007\/11734697_1"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Rao, A., Lakshminarayanan, K., Surana, S., Karp, R., Stoica, I.: load balancing in structured p2p systems. In: 2nd International Workshop on Peer-to-Peer Systems (2003)","DOI":"10.1007\/978-3-540-45172-3_6"},{"key":"12_CR12","unstructured":"Jelasity, M., van Steen, M.: Large-scale newscast computing on the Internet. Technical Report IR-503, Department of Computer Science Vrije Universiteit, Amsterdam, The Netherlands (2002)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Jelasity, M., Montresor, A.: Epidemic-style proactive aggregation in large overlay networks. In: Proceedings of the 24th International Conference on Distributed Computing Systems, pp. 102\u2013109 (2004)","DOI":"10.1109\/ICDCS.2004.1281573"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Jelasity, M., Montresor, A., Babaoglu, O.: Robust aggregation protocols for large-scale overlay networks. In: International Conference on Dependable Systems and Networks, pp. 19\u201328 (2004)","DOI":"10.1109\/DSN.2004.1311873"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Kempe, D., Dobra, A., Gehrke, J.: Gossip-based computation of aggregate information. In: 44th IEEE Symposium on Foundations of Computer Science, pp. 482\u2013491 (2003)","DOI":"10.1109\/SFCS.2003.1238221"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/ISM.2007.4412380","volume-title":"Proceedings of the 9th IEEE International Symposium on Multimedia (ISM 2007)","author":"B. Biskupski","year":"2007","unstructured":"Biskupski, B., Cunningham, R., Meier, R.: Improving throughput and node proximity of p2p live video streaming through overlay adaptation. In: Proceedings of the 9th IEEE International Symposium on Multimedia (ISM 2007), pp. 245\u2013252. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"3","key":"12_CR17","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/90.611099","volume":"5","author":"T.V. Lakshman","year":"1997","unstructured":"Lakshman, T.V., Madhow, U.: The performance of TCP\/IP for networks with high bandwidth-delay products and random loss. IEEE\/ACM Trans. Netw.\u00a05(3), 336\u2013350 (1997)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-30229-2_5","volume-title":"Middleware 2004","author":"M. Jelasity","year":"2004","unstructured":"Jelasity, M., Guerraoui, R., Kermarrec, A.M., van Steen, M.: The peer sampling service: experimental evaluation of unstructured gossip-based implementations. In: Jacobsen, H.-A. (ed.) Middleware 2004. LNCS, vol.\u00a03231, pp. 79\u201398. Springer, New York (2004)"},{"key":"12_CR19","unstructured":"McCanne, S., Floyd, S.: ns\u2014Network Simulator, http:\/\/www.isi.edu\/nsnam\/ns"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Gummadi, P.K., Gribble, S.D.: A measurement study of peer-to-peer file sharing systems. In: Proceedings of Multimedia Computing and Networking (2002)","DOI":"10.1117\/12.449977"},{"issue":"5","key":"12_CR21","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/79.952806","volume":"18","author":"V.K. Goyal","year":"2001","unstructured":"Goyal, V.K.: Multiple description coding: Compression meets the network. IEEE Signal Processing Magazine\u00a018(5), 74\u201393 (2001)","journal-title":"IEEE Signal Processing Magazine"},{"key":"12_CR22","unstructured":"Kostic, D., Rodriguez, A., Albrecht, J., Bhirud, A., Vahdat, A.: Using random subsets to build scalable network services. In: Proceedings of 4th USENIX Symposium on Internet Technologies and Systems (USITS) (2003)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Floyd, S., Handley, M., Padhye, J., Widmer, J.: Equation-based congestion control for unicast applications. In: SIGCOMM 2000, Stockholm, Sweden, August 2000, pp. 43\u201356 (2000)","DOI":"10.1145\/347059.347397"}],"container-title":["Lecture Notes in Computer Science","Distributed Applications and Interoperable Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68642-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T15:27:07Z","timestamp":1738250827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68642-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540686392","9783540686422"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68642-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}