{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:47:53Z","timestamp":1725511673268},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540788485"},{"type":"electronic","value":"9783540788492"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78849-2_46","type":"book-chapter","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:49:01Z","timestamp":1209390541000},"page":"456-467","source":"Crossref","is-referenced-by-count":2,"title":["Building a Scalable P2P Network with Small Routing Delay"],"prefix":"10.1007","author":[{"given":"Shiping","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kaihua","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shigang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","unstructured":"Gnutella: Gnutella, http:\/\/gnutella.wego.com"},{"key":"46_CR2","unstructured":"KaZaA: KaZaA, http:\/\/www.kazaa.com"},{"key":"46_CR3","unstructured":"Ritter, J.: Why Gnutella can\u2019t Scale. No, Really, http:\/\/www.tch.org\/gnutella.html"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Ripeanu, M., Iamnitchi, A., Foster, I.: Mapping the Gnutella Network. IEEE Internet Computing Journal, Special Issue on Peer-to-Peer Networking\u00a06(1) (2002)","DOI":"10.1109\/4236.978369"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Sen, S., Wang, J.: Analyzing Peer-to-Peer Traffic across Large Networks. In: ACM SIGCOMM Internet Measurement Workshop (August 2002)","DOI":"10.1145\/637201.637222"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Gummadi, K.P., Dunn, R.J., Gribble, S.D., Levy, H.M.: An Analysis of Internet Content Delivery Systems. In: Proc. of the 5th Symposium on Operating Systems Design and Implementation (OSDI) (December 2002)","DOI":"10.1145\/1060289.1060319"},{"key":"46_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_4","volume-title":"Peer-to-Peer Systems","author":"S. Ratnasamy","year":"2002","unstructured":"Ratnasamy, S., Shenker, S., Stoica, I.: Routing Algorithms for DHTs: Some Open Questions. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, Springer, Heidelberg (2002)"},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Xu, J.: On the Fundamental Tradeoffs between Routing Table Size and Network Diameter in Peer-to-Peer Networks. In: Xu, J. (ed.) Proc. of IEEE INFOCOM 2003 (April 2003)","DOI":"10.1109\/INFCOM.2003.1209238"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Plaxton, C., Rajaraman, R., Richa, A.: Accessing Nearby Copies of Replicated Objects in a Distributed Environment. In: Proc. of ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) (June 1997)","DOI":"10.1145\/258492.258523"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Druschel, P., Rowstron, A.: Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems. In: Proc. of 18th IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware 2001) (November 2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"46_CR11","unstructured":"Zhao, B., Kubiatowicz, J., Joseph, A.: Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing, Tech. Rep. UCB\/CSD-01-1141, University of California at Berkeley, Computer Science Department (2001)"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In: Proc. of ACM SIGCOMM 2001 (August 2001)","DOI":"10.1145\/383059.383071"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proc. of ACM SIGCOMM 2001 (August 2001)","DOI":"10.1145\/383059.383072"},{"key":"46_CR14","doi-asserted-by":"crossref","unstructured":"Malkhi, D., Naor, M., Ratajczak, D.: Viceroy: A Scalable and Dynamic Emulation of the Butterfly. In: Proc. of ACM PODC 2002 (July 2002)","DOI":"10.1145\/571825.571857"},{"key":"46_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b11823","volume-title":"Peer-to-Peer Systems II","author":"F. Kaashoek","year":"2003","unstructured":"Kaashoek, F., Karger, D.R.: Koorde: A Simple Degree-Optimal Hash Table. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735, Springer, Heidelberg (2003)"},{"key":"46_CR16","doi-asserted-by":"crossref","unstructured":"Manku, G.S.: Routing Networks for Distributed Hash Tables. In: Proc. of 22nd ACM Symposium on Principles of Distributed Computing (PODC) (June 2003)","DOI":"10.1145\/872035.872054"},{"key":"46_CR17","doi-asserted-by":"crossref","unstructured":"Risson, J., Moorsa, T.: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods. Journal of Computer Networks\u00a055 (2006)","DOI":"10.17487\/rfc4981"},{"key":"46_CR18","doi-asserted-by":"crossref","unstructured":"Joung, Y.-J., Yang, L.-W., Fang, C.-T.: Keyword search in DHT-based peer-to-peer networks. IEEE Journal on Selected Areas in Communications\u00a025 (2007)","DOI":"10.1109\/JSAC.2007.070106"},{"key":"46_CR19","unstructured":"Li, Z., Xie, G.: A Distributed Load Balancing Algorithm for Structured P2P Systems. In: Proc. of the 11th IEEE Symposium on Computers and Communications (June 2006)"},{"key":"46_CR20","doi-asserted-by":"crossref","unstructured":"Ferreira, R.A., Jagannathan, S., Grama, A.: Locality in structured peer-to-peer networks. Journal of Parallel and Distributed Computing\u00a066 (2006)","DOI":"10.1016\/j.jpdc.2005.09.002"},{"key":"46_CR21","doi-asserted-by":"crossref","unstructured":"Navabpour, S., Nejad, N.F., Abbaspour, M., Behzadi, A.: Secure Routing in Structured Peer to Peer File-Sharing Networks. In: Proc. of International Conference on Communications and Networking in China (ChinaCom 2006) (October 2006)","DOI":"10.1109\/CHINACOM.2006.344855"}],"container-title":["Lecture Notes in Computer Science","Progress in WWW Research and Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78849-2_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:02:27Z","timestamp":1619521347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78849-2_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540788485","9783540788492"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78849-2_46","relation":{},"subject":[]}}