{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:29:36Z","timestamp":1743006576516,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705864"},{"type":"electronic","value":"9783540705871"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-70587-1_21","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"211-215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enabling Next Generation Peer-to-Peer Services"],"prefix":"10.1007","author":[{"given":"Fabio Victora","family":"Hecht","sequence":"first","affiliation":[]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"21_CR1","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1273445.1273449","volume":"37","author":"V. Aggarwal","year":"2007","unstructured":"Aggarwal, V., Feldmann, A., Scheideler, C.: Can ISPS and P2P users cooperate for improved performance? ACM SIGCOMM Computer Communication Review\u00a037(3), 29\u201340 (2007)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"21_CR2","unstructured":"Bit Torrent (last visited: February 22, 2008), http:\/\/www.bittorrent.com"},{"key":"21_CR3","unstructured":"Brecht, S., Racz, P., Stiller, B. (eds.): Investigation of Application-level Routing, University of Federal Armed Forces Munich (UniBwM), Information Systems Laboratory IIS, Master Thesis (2003)"},{"key":"21_CR4","unstructured":"Cohen, B.: Incentives build robustness in BitTorrent. In: First Workshop on the Economics of Peer-to-Peer Systems, Berkeley, California, U.S.A (June 2003)"},{"key":"21_CR5","unstructured":"Constantinou, F., Mavrommatis, P.: Identifying Known and Unknown Peer-to-Peer Traffic. In: Fifth IEEE International Symposium on Network Computing and Applications (NCA 2006), Cambridge, Massachusetts, U.S.A, pp. 93\u2013102 (2006)"},{"issue":"1","key":"21_CR6","first-page":"2","volume":"2","author":"G. Huston","year":"1999","unstructured":"Huston, G.: Interconnection, Peering, and Settlements. The Internet Protocol Journal\u00a02(1), 2\u201316 (1999)","journal-title":"The Internet Protocol Journal"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Claffy, K.C., Faloutsos, M.: Is P2P dying or just hiding? In: IEEE Global Telecommunications Conference, 2004 (GLOBECOM 2004), Dallas, Texas, U.S.A, December 2004, vol.\u00a03, pp. 1532\u20131538 (2004)","DOI":"10.1109\/GLOCOM.2004.1378239"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Le, H., Hong, D., Simmonds, A.: A self-organising model for topology-aware overlay formation. In: 2005 IEEE International Conference on Communications (ICC 2005), Seuol, Korea, May 2005, vol.\u00a03, pp. 1566\u20131571 (2005)","DOI":"10.1109\/ICC.2005.1494607"},{"key":"21_CR9","unstructured":"Swisscom (last visited: February 22, 2008), http:\/\/www.swisscom.com"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Zink, M., Mauthe, A.: P2P streaming using multiple description coded video. In: 16th Euromicro Conference, Sicily, Italy, August\/September 2004, pp. 240\u2013247 (2004)","DOI":"10.1109\/EURMIC.2004.1333377"}],"container-title":["Lecture Notes in Computer Science","Resilient Networks and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70587-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T12:14:33Z","timestamp":1738325673000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-70587-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540705864","9783540705871"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70587-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}