{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:56:59Z","timestamp":1725530219605},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642009747"},{"type":"electronic","value":"9783642009754"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00975-4_17","type":"book-chapter","created":{"date-parts":[[2009,3,30]],"date-time":"2009-03-30T08:19:52Z","timestamp":1238401192000},"page":"165-174","source":"Crossref","is-referenced-by-count":12,"title":["Measuring Mobile Peer-to-Peer Usage: Case Finland 2007"],"prefix":"10.1007","author":[{"given":"Mikko V. J.","family":"Heikkinen","sequence":"first","affiliation":[]},{"given":"Antero","family":"Kivi","sequence":"additional","affiliation":[]},{"given":"Hannu","family":"Verkasalo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/11530657_22","volume-title":"Peer-to-Peer Systems and Applications","author":"G. Ha\u00dflinger","year":"2005","unstructured":"Ha\u00dflinger, G.: ISP platforms under a heavy peer-to-peer workload. In: Steinmetz, R., Wehrle, K. (eds.) Peer-to-Peer Systems and Applications. LNCS, vol.\u00a03485, pp. 369\u2013381. Springer, Heidelberg (2005)"},{"key":"17_CR2","unstructured":"Kivi, A.: Mobile Data Service Usage Measurements: Results 2005-2007. Technical report, TKK Helsinki University of Technology (2008)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/11530657_2","volume-title":"Peer-to-Peer Systems and Applications","year":"2005","unstructured":"Steinmetz, R., Wehrle, K. (eds.): Peer-to-Peer Systems and Applications. LNCS, vol.\u00a03485, pp. 9\u201316. Springer, Heidelberg (2005)"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S. Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis, S., Spinellis, D.: A Survey of Peer-to-Peer Content Distribution Technologies. ACM Computing Surveys\u00a036, 335\u2013371 (2004)","journal-title":"ACM Computing Surveys"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Hofeld, T., Tutschku, K., Andersen, F.U.: Mapping of File-Sharing onto Mobile Environments: Enhancement by UMTS. In: Proc. IEEE Pervasive Computing and Communications Workshops, pp. 43\u201349 (2005)","DOI":"10.1109\/PERCOMW.2005.45"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Hossfeld, T., Tutschku, K., Andersen, F.U.: Mapping File Sharing onto Mobile Environments: Feasibility and Performance of eDonkey over GPRS. In: Proc. IEEE Wireless Communications and Networking Conference, pp. 2453\u20132458 (2005)","DOI":"10.1109\/WCNC.2005.1424899"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1016\/j.comnet.2007.10.008","volume":"52","author":"T. Ho\u00dffeld","year":"2008","unstructured":"Ho\u00dffeld, T., Binzenh\u00f6fer, A.: Analysis of Skype VoIP Traffic in UMTS: End-To-End QoS and QoE Measurements. Computer Networks\u00a052, 650\u2013666 (2008)","journal-title":"Computer Networks"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1504\/IJMNDI.2006.012089","volume":"1","author":"M. Matuszewski","year":"2006","unstructured":"Matuszewski, M., Beijar, N., Lehtinen, J., Hyyryl\u00e4inen, T.: Content Sharing in Mobile P2P Networks: Myth or Reality. Int. J. Mobile Network Design and Innovation\u00a01, 197\u2013207 (2006)","journal-title":"Int. J. Mobile Network Design and Innovation"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Matuszewski, M., Kokkonen, E.: Mobile P2PSIP: Peer-to-Peer SIP Communication in Mobile Communities. In: Proc. Fifth IEEE Consumer Communications & Networking Conference, pp. 1159\u20131165 (2008)","DOI":"10.1109\/ccnc08.2007.260"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-31966-5_6","volume-title":"Passive and Active Network Measurement","author":"L. Plissonneau","year":"2005","unstructured":"Plissonneau, L., Costeux, J.-L., Brown, P.: Analysis of peer-to-peer traffic on ADSL. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol.\u00a03431, pp. 69\u201382. Springer, Heidelberg (2005)"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TNET.2004.826277","volume":"12","author":"S. Sen","year":"2004","unstructured":"Sen, S., Wang, J.: Analyzing Peer-to-Peer Traffic Across Large Networks. IEEE\/ACM Transactions on Networking\u00a012, 219\u2013232 (2004)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"17_CR12","unstructured":"Guha, S., Daswani, N., Jain, R.: An Experimental Study of the Skype Peer-to-Peer VoIP System. In: 5th International Workshop on Peer-to-Peer Systems (2006)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.C.: Transport Layer Identification of P2P Traffic. In: Proc. Internet Measurement Conference, pp. 121\u2013134 (2004)","DOI":"10.1145\/1028788.1028804"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-540-31966-5_5","volume-title":"Passive and Active Network Measurement","author":"S. Ohzahata","year":"2005","unstructured":"Ohzahata, S., Hagiwara, Y., Terada, M., Kawashima, K.: A traffic identification method and evaluations for a pure P2P application. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol.\u00a03431, pp. 55\u201368. Springer, Heidelberg (2005)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Schmidt, S.E.G., Soysal, M.: An Intrusion Detection Based Approach for the Scalable Detection of P2P Traffic in the National Academic Network Backbone. In: Proc. Seventh IEEE International Symposium on Computer Networks, pp. 128\u2013133 (2006)","DOI":"10.1109\/ISCN.2006.1662521"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1109\/JSAC.2007.070122","volume":"25","author":"C. Wu","year":"2007","unstructured":"Wu, C., Li, B., Zhao, S.: Characterizing Peer-to-Peer Streaming Flows. IEEE J. on Selected Areas in Communications\u00a025, 1612\u20131626 (2007)","journal-title":"IEEE J. on Selected Areas in Communications"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1007\/978-3-540-31957-3_69","volume-title":"Networking - ICN 2005","author":"H. Bleul","year":"2005","unstructured":"Bleul, H., Rathgeb, E.P.: A simple, efficient and flexible approach to measure multi-protocol peer-to-peer traffic. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol.\u00a03421, pp. 606\u2013616. Springer, Heidelberg (2005)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. In: Proc. ACM Symposium on Operating Systems Principles, pp. 314\u2013329 (2003)","DOI":"10.1145\/945445.945475"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"2690","DOI":"10.1016\/j.comnet.2008.05.003","volume":"52","author":"T. Henderson","year":"2008","unstructured":"Henderson, T., Kotz, D., Abyzov, I.: The Changing Usage of a Mature Campus-Wide Wireless Network. Computer Networks\u00a052, 2690\u20132712 (2008)","journal-title":"Computer Networks"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1109\/JSAC.2007.070116","volume":"25","author":"L. Guo","year":"2007","unstructured":"Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., Zhang, X.: A Performance Study of Bittorrent-Like Peer-to-Peer Systems. IEEE J. on Selected Areas in Communications\u00a025, 155\u2013169 (2007)","journal-title":"IEEE J. on Selected Areas in Communications"},{"key":"17_CR21","unstructured":"Smith, C., Grundl, P.: Know Your Enemy: Passive Fingerprinting. Technical report, The Honeynet Project Know Your Enemy Whitepapers Series (2002)"},{"key":"17_CR22","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Claffy, K.C., Faloutsos, M.: File-Sharing in the Internet: A Characterization of P2P Traffic in the Backbone. Technical report, University of California, Riverside (2003)"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1108\/14636690710725085","volume":"9","author":"H. Verkasalo","year":"2007","unstructured":"Verkasalo, H., H\u00e4mm\u00e4inen, H.: A Handset-Based Platform for Measuring Mobile Service Usage. INFO\u00a09, 80\u201396 (2007)","journal-title":"INFO"},{"key":"17_CR24","unstructured":"Official Statistics of Finland: Telecommunications 2006. Statistics Finland, Helsinki (2007)"},{"key":"17_CR25","unstructured":"Official Statistics of Finland: Telecommunications 2007. Statistics Finland, Helsinki (2008)"},{"key":"17_CR26","unstructured":"Baset, S.A., Schulzrinne, H.: An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. Technical report, Columbia University, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Network Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00975-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T00:25:04Z","timestamp":1558225504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00975-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642009747","9783642009754"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00975-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}