{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:54:44Z","timestamp":1725504884149},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540786627"},{"type":"electronic","value":"9783540786634"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78663-4_8","type":"book-chapter","created":{"date-parts":[[2008,3,8]],"date-time":"2008-03-08T06:00:01Z","timestamp":1204956001000},"page":"90-107","source":"Crossref","is-referenced-by-count":0,"title":["Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems"],"prefix":"10.1007","author":[{"given":"Luigi","family":"Liquori","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michel","family":"Cosnard","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/3-540-44751-2_15","volume-title":"Cooperative Information Systems","author":"K. Aberer","year":"2001","unstructured":"Aberer, K.: P-Grid: A Self-Organizing Access Structure for P2P Information Systems. In: Batini, C., Giunchiglia, F., Giorgini, P., Mecella, M. (eds.) CoopIS 2001. LNCS, vol.\u00a02172, pp. 179\u2013194. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Alexander, S., Droms, R.: RFC2132, DHCP Options and BOOTP Vendor Extensions. Technical report, IETF (1997)","key":"8_CR2","DOI":"10.17487\/rfc2132"},{"unstructured":"AEOLUS. Deliverable D2.1.1: Resource Discovery: State of the Art Survey and Algorithmic Solutions (2006)","key":"8_CR3"},{"unstructured":"Ariwheels. Arigatoni on wheels, http:\/\/www-sop.inria.fr\/mascotte\/Luigi.Liquori\/ARIGATONI\/Ariwheels.htm","key":"8_CR4"},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/320764.320766","volume":"1","author":"J.W. Backus","year":"1954","unstructured":"Backus, J.W.: The IBM 701 Speedcoding System. J. ACM\u00a01(1), 4\u20136 (1954)","journal-title":"J. ACM"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/JVA.2006.7","volume-title":"JVA, John Vincent Atanasoff International Symposium on Modern Computing","author":"D. Benza","year":"2006","unstructured":"Benza, D., Cosnard, M., Liquori, L., Vesin, M.: Arigatoni: Overlaying Internet via Low Level Network Protocols. In: JVA, John Vincent Atanasoff International Symposium on Modern Computing, pp. 82\u201391. IEEE, Los Alamitos (2006)"},{"doi-asserted-by":"crossref","unstructured":"Banavar, G., Chandra, T., Mukherjee, B., Nagarajarao, J., Strom, R.E., Sturman, D.C.: An efficient multicast protocol for content-based publish-subscribe systems. In: Proc. of ICDCS (1999)","key":"8_CR7","DOI":"10.1109\/ICDCS.1999.776528"},{"unstructured":"BitTorrent, Inc., http:\/\/www.bittorrent.com\/","key":"8_CR8"},{"issue":"1","key":"8_CR9","first-page":"27","volume":"8","author":"L. Cardelli","year":"1995","unstructured":"Cardelli, L.: A language with distributed scope. Computing Systems\u00a08(1), 27\u201359 (1995)","journal-title":"Computing Systems"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"I2CS, International Workshop on Innovative Internet Community Systems","author":"R. Chand","year":"2006","unstructured":"Chand, R., Cosnard, M., Liquori, L.: Resource Discovery in the Arigatoni Overlay Network. In: I2CS, International Workshop on Innovative Internet Community Systems. LNCS, Springer, Heidelberg (2006)"},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.future.2007.02.009","volume":"24","author":"R. Chand","year":"2008","unstructured":"Chand, R., Cosnard, M., Liquori, L.: Powerful resource discovery for Arigatoni overlay network. Future Generation Computer Systems\u00a024(1), 31\u201338 (2008)","journal-title":"Future Generation Computer Systems"},{"doi-asserted-by":"crossref","unstructured":"Chand, R., Felber, P.: XNet: A Reliable Content-Based Publish\/Subscribe System. In: Proc. of SRDS: Symposium on Reliable Distributed Systems (2004)","key":"8_CR12","DOI":"10.1109\/RELDIS.2004.1353027"},{"unstructured":"Grand\u00a0UK Challenge. Global Computing and Pervasive Computing, http:\/\/www-dse.doc.ic.ac.uk\/Projects\/UbiNet\/GC\/","key":"8_CR13"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-71270-1_8","volume-title":"Architecture of Computing Systems - ARCS 2007","author":"R. Chand","year":"2007","unstructured":"Chand, R., Liquori, L., Cosnard, M.: Improving Resource Discovery in the Arigatoni Overlay Network. In: Lukowicz, P., Thiele, L., Tr\u00f6ster, G. (eds.) ARCS 2007. LNCS, vol.\u00a04415, pp. 98\u2013111. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Cosnard, M., Liquori, L., Chand, R.: Virtual Organizations in Arigatoni. DCM, International Workshop on Development in Computational Models\u00a0171(3) (2007)","key":"8_CR15","DOI":"10.1016\/j.entcs.2006.11.035"},{"doi-asserted-by":"crossref","unstructured":"Carzaniga, A., Rosenblum, D.S., Wolf, A.L.: Design and Evaluation of a Wide-Area Event Notification Service. ACM TOCS\u00a019(3) (2001)","key":"8_CR16","DOI":"10.1145\/380749.380767"},{"issue":"2","key":"8_CR17","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"P.T. Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P., Guerraoui, R., Kermarrec, A.M.: The Many Faces of Publish\/Subscribe. Computing Survey\u00a035(2), 114\u2013131 (2003)","journal-title":"Computing Survey"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-3-540-45172-3_4","volume-title":"Peer-to-Peer Systems II","author":"M.J. Freedman","year":"2003","unstructured":"Freedman, M.J., Mazi\u00e8res, D.: Sloppy Hashing and Self-Organizing Clusters. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735, pp. 45\u201355. Springer, Heidelberg (2003)"},{"key":"8_CR19","first-page":"263","volume-title":"Proc. of ICDCS","author":"P. Ganesan","year":"2004","unstructured":"Ganesan, P., Krishna, P., Garcia-Molina, H.: Canon in G-major: Designing DHTS with Hierarchical Structure. In: Proc. of ICDCS, pp. 263\u2013272. IEEE, Los Alamitos (2004)"},{"unstructured":"Globus Alliance, http:\/\/www.globus.org\/","key":"8_CR20"},{"unstructured":"Grid 5000 Consortium, http:\/\/www.grid5000.org","key":"8_CR21"},{"doi-asserted-by":"crossref","unstructured":"Gulbrandsen, A., Vixie, P., Esibov, L.: RFC2782, A DNS RR for specifying the location of services (DNS SRV). Technical report, IETF (2000)","key":"8_CR22","DOI":"10.17487\/rfc2782"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","first-page":"176","volume-title":"Selected Areas in Cryptography","author":"D. Heimbigner","year":"2001","unstructured":"Heimbigner, D.: Adapting publish\/subscribe middleware to achieve gnutella-like functionality. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 176\u2013181. Springer, Heidelberg (2001)"},{"unstructured":"IBM. Business Process Execution Language, http:\/\/www.ibm.com\/developerworks\/library\/specification\/ws-bpel\/","key":"8_CR24"},{"unstructured":"INRIA. Strategic Plan 2008-2012 (to appear)","key":"8_CR25"},{"key":"8_CR26","first-page":"661","volume-title":"Proc. of VLDB","author":"H.V. Jagadish","year":"2005","unstructured":"Jagadish, H.V., Ooiand, B.C., Vu, Q.H.: BATON: A Balanced Tree Structure for Peer-to-Peer Networks. In: Proc. of VLDB, pp. 661\u2013672. ACM, New York (2005)"},{"unstructured":"JXTA Community, http:\/\/www.jxta.org\/","key":"8_CR27"},{"key":"8_CR28","volume-title":"ADVCOMP, International Conference on Advanced Engineering Computing and Applications in Sciences","author":"L. Liquori","year":"2007","unstructured":"Liquori, L., Cosnard, M.: Weaving Arigatoni with a Graph Topology. In: ADVCOMP, International Conference on Advanced Engineering Computing and Applications in Sciences, IEEE Computer Society Press, Los Alamitos (2007)"},{"doi-asserted-by":"crossref","unstructured":"Linn, J.: RFC 2743, Generic Security Service Application Program Interface Version 2, Update 1. Technical report, IETF (2000)","key":"8_CR29","DOI":"10.17487\/rfc2743"},{"unstructured":"LogNet. Arigamulator, http:\/\/www-sop.inria.fr\/mascotte\/Luigi.Liquori\/ARIGATONI\/index.html","key":"8_CR30"},{"unstructured":"Nain, P., Casetti, C., Liquori, L.: A Stochastic Model of an Arigatoni Overlay Computer. Research report, Politecnico di Torino (2007)","key":"8_CR31"},{"unstructured":"Nokia. N810 Internet Terminal","key":"8_CR32"},{"unstructured":"OSGi Alliance. Open Services Gateway Initiative, http:\/\/www.osgi.org\/","key":"8_CR33"},{"unstructured":"Pautasso, C.: JOpera: Process Support for more than Web Services, http:\/\/www.jopera.org\/","key":"8_CR34"},{"key":"8_CR35","first-page":"493","volume-title":"Handbook of Mathematical Psychology","author":"A. Rapoport","year":"1963","unstructured":"Rapoport, A.: Mathematical models of social interaction. In: Handbook of Mathematical Psychology, vol.\u00a0II, pp. 493\u2013579. John Wiley and Sons, Chichester (1963)"},{"doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Weinberger, J., Huitema, C., Mahy, R.: RFC3489, STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs). Technical report, IETF (2003)","key":"8_CR36","DOI":"10.17487\/rfc3489"},{"issue":"4","key":"8_CR37","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/MAHC.1988.10045","volume":"10","author":"J. Neumann von","year":"1988","unstructured":"von Neumann, J.: The Principles of Large-Scale Computing Machines. IEEE Ann. Hist. Comput.\u00a010(4), 243\u2013256 (1988)","journal-title":"IEEE Ann. Hist. Comput."},{"unstructured":"White, J.E.: Telescript Technology: The Foundation for the Electronic Marketplace. White Paper. General Magic, Inc. (1994)","key":"8_CR38"},{"key":"8_CR39","volume-title":"Proc. of Peer-to-Peer Computing","author":"Y. Wang","year":"2003","unstructured":"Wang, Y., Vassileva, J.: Trust and Reputation Model in Peer-to-Peer Networks. In: Proc. of Peer-to-Peer Computing, IEEE Computer Society, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78663-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:17:54Z","timestamp":1619522274000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78663-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540786627","9783540786634"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78663-4_8","relation":{},"subject":[]}}