{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:57:11Z","timestamp":1743116231249,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540886228"},{"type":"electronic","value":"9783540886235"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88623-5_74","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T11:19:02Z","timestamp":1224069542000},"page":"552-555","source":"Crossref","is-referenced-by-count":4,"title":["Availability in Peer to Peer Management Networks"],"prefix":"10.1007","author":[{"given":"Ouldooz Baghban","family":"Karimi","sequence":"first","affiliation":[]},{"given":"Saleh","family":"Yousefi","sequence":"additional","affiliation":[]},{"given":"Mahmood","family":"Fathy","sequence":"additional","affiliation":[]},{"given":"Mojtaba","family":"Mazoochi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"74_CR1","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/P2P.2005.27","volume-title":"Fifth IEEE International Conference on Peer-to-Peer Computing","author":"R.J. Dunn","year":"2005","unstructured":"Dunn, R.J., Zahorjan, J., Gribble, S.D., Levy, H.M.: Presence-Based Availability and P2P Systems. In: Fifth IEEE International Conference on Peer-to-Peer Computing, pp. 209\u2013216. IEEE Press, Los Alamitos (2005)"},{"key":"74_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-45748-8_31","volume-title":"Peer-to-Peer Systems","author":"H. Weatherspoon","year":"2002","unstructured":"Weatherspoon, H., Kubiatowicz, J.D.: Erasure Coding vs. Replication: A Quantitative Comparison. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 328\u2013338. Springer, Heidelberg (2002)"},{"key":"74_CR3","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/ARES.2007.95","volume-title":"Second International Conference on Availability, Reliability and Security","author":"S. Prabhu","year":"2007","unstructured":"Prabhu, S., Venkat, R.: High Availability for Network Management Applications. In: Second International Conference on Availability, Reliability and Security, pp. 493\u2013498. IEEE press, Los Alamitos (2007)"},{"key":"74_CR4","volume-title":"Proceedings of the 20th International Conference on Advanced Information Networking and Applications","author":"G. Costa Da","year":"2006","unstructured":"Da Costa, G., Marchand, C., Richard, O., Vincent, J.-M.: Resource Availability for P2P Systems. In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications. IEEE, Los Alamitos (2006)"},{"key":"74_CR5","first-page":"201","volume-title":"Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004)","author":"M.K. Ramanathan","year":"2004","unstructured":"Ramanathan, M.K.: Increasing Object Availability in P2P Systems. In: Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), pp. 201\u2013208. IEEE, Los Alamitos (2004)"},{"key":"74_CR6","first-page":"69","volume-title":"Proceedings of the 11th IEEE Symposium on Computers and Communications","author":"A. Panisson","year":"2006","unstructured":"Panisson, A., da Rosa, D.M., Melchiors, C., Granville, L.Z., Almeida, M.J.B., Tarouco, L.M.R.: Designing the Architecture of P2P-Based Network Management Systems. In: Proceedings of the 11th IEEE Symposium on Computers and Communications, pp. 69\u201375. IEEE, Los Alamitos (2006)"},{"issue":"10","key":"74_CR7","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2005.1522126","volume":"43","author":"L.Z. Granville","year":"2005","unstructured":"Granville, L.Z., da Rosa, D.M., Panisson, A., Melchiors, C., Almeida, M.J.B., Tarouco, L.M.R.: Managing Computer Networks Using Peer-to-Peer Technologies. IEEE Communications Magazine\u00a043(10), 62\u201368 (2005)","journal-title":"IEEE Communications Magazine"}],"container-title":["Lecture Notes in Computer Science","Challenges for Next Generation Network Operations and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88623-5_74","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T13:45:10Z","timestamp":1551620710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88623-5_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540886228","9783540886235"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88623-5_74","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}