{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:39:53Z","timestamp":1742981993946,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642163968"},{"type":"electronic","value":"9783642163975"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16397-5_5","type":"book-chapter","created":{"date-parts":[[2010,9,27]],"date-time":"2010-09-27T04:39:03Z","timestamp":1285562343000},"page":"61-74","source":"Crossref","is-referenced-by-count":0,"title":["K-BRiR: An Efficient and Self-organized Routing Mechanism for Structured Peer-to-Peer Service Networks"],"prefix":"10.1007","author":[{"given":"Zhenhua","family":"Tan","sequence":"first","affiliation":[]},{"given":"Guangming","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhiliang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Guiran","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"5_CR1","first-page":"339","volume":"25","author":"Y.J. Joung","year":"2007","unstructured":"Joung, Y.J., Yang, L.W., Fang, C.T.: Keyword Search in DHT based Peer-to-Peer Networks. IEEE Journal on Selected Areas in Communications\u00a025(1), 339\u2013348 (2007)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"5_CR2","first-page":"13","volume":"244","author":"A. Farag","year":"2009","unstructured":"Farag, A., Ahmad, R.: Recommendation Retrieval in Reputation Assessment for Peer-to-Peer Systems. J. Electronic Notes in Theoretical Computer Science\u00a0244(1), 13\u201325 (2009)","journal-title":"J. Electronic Notes in Theoretical Computer Science"},{"issue":"3","key":"5_CR3","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/s12083-008-0027-1","volume":"2","author":"T.T. Do","year":"2009","unstructured":"Do, T.T., Hua, K.A., Jiang, N., Liu, F.Y.: Patch Peer: A Scalable Video-on-demand Streaming System in Hybrid Wireless Mobile Peer-to-peer Networks. J. Peer-to-Peer Networking and Applications\u00a02(3), 182\u2013201 (2009)","journal-title":"J. Peer-to-Peer Networking and Applications"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-03547-0_40","volume":"40","author":"S. Ranka","year":"2009","unstructured":"Ranka, S., Aluru, S., Buyya, R.: Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions. Communications in Computer and Information Science\u00a040, 422\u2013433 (2009)","journal-title":"Communications in Computer and Information Science"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Nakashima, T., Ono, A., Sueyoshi, T.: Performance Framework for P2P Overlay Network. In: 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 101\u2013104 (2008)","DOI":"10.1109\/IIH-MSP.2008.326"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Do, T.T., Hua, K.A., Lin, C.S.: Ext Range: Continuous Moving Range Queries in Mobile Peer-to-Peer Networks. In: Proceedings of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 317\u2013322 (2009)","DOI":"10.1109\/MDM.2009.47"},{"key":"5_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/11530657","volume-title":"Peer-to-Peer Systems and Applications","author":"R. Steinmetz","year":"2005","unstructured":"Steinmetz, R., Wehrle, K.: Peer-to-Peer Systems and Applications. Springer, Berlin (2005)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D.: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In: Proceedings of the 2001 ACM Sigcomm Conference, pp. 149\u2013160 (2001)","DOI":"10.1145\/383059.383071"},{"key":"5_CR9","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072","volume-title":"A Scalable Content-Addressable Network","author":"S. Ratnasamy","year":"2001","unstructured":"Ratnasamy, S., Francis, P., Handley, M.: A Scalable Content-Addressable Network. ACM Press, USA (2001)"},{"key":"5_CR10","volume-title":"Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing","author":"B. Zhao","year":"2001","unstructured":"Zhao, B., Kubiatowicz, J., Joseph, A.: Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. University of California, Berkeley (2001)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-peer Systems. In: IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware), pp. 329\u2013350 (2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"5_CR12","unstructured":"Jain, S., Mahajan, R., Wetherall, D.: A Study of the Performance Potential of DHT-based Overlays. In: Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems, pp. 11\u201312 (2003)"},{"issue":"5","key":"5_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1145\/359104.359108","volume":"22","author":"E.G. Chang","year":"1979","unstructured":"Chang, E.G., Roberts, R.: An Improved Algorithm for Decentralized Extrema-finding in Circular Configurations of Processors. Communications of the ACM\u00a022(5), 281\u2013282 (1979)","journal-title":"Communications of the ACM"},{"issue":"4","key":"5_CR14","first-page":"504","volume":"29","author":"Z.H. Tan","year":"2008","unstructured":"Tan, Z.H., Cheng, W., Chang, G.R.: A Personalized Information Retrieval Algorithm Based on Word-Correlativity Model. Journal of Northeastern University (Natural Science)\u00a029(4), 504\u2013507 (2008)","journal-title":"Journal of Northeastern University (Natural Science)"}],"container-title":["Communications in Computer and Information Science","E-business Technology and Strategy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16397-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T02:03:14Z","timestamp":1553133794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16397-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163968","9783642163975"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16397-5_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}