{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:24:21Z","timestamp":1742927061397,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642203046"},{"type":"electronic","value":"9783642203053"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20305-3_8","type":"book-chapter","created":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T06:55:14Z","timestamp":1301986514000},"page":"86-99","source":"Crossref","is-referenced-by-count":0,"title":["On the Stability of Skype Super Nodes"],"prefix":"10.1007","author":[{"given":"Anat","family":"Bremler-Barr","sequence":"first","affiliation":[]},{"given":"Ran","family":"Goldschmidt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1007\/978-3-540-45209-6_166","volume-title":"Euro-Par 2003 Parallel Processing","author":"L. Garc\u00e9s-Erice","year":"2003","unstructured":"Garc\u00e9s-Erice, L., Biersack, E.W., Felber, P., Ross, K.W., Urvoy-Keller, G.: Hierarchical peer-to-peer systems. In: Kosch, H., B\u00f6sz\u00f6rm\u00e9nyi, L., Hellwagner, H. (eds.) Euro-Par 2003. LNCS, vol.\u00a02790, pp. 1230\u20131239. Springer, Heidelberg (2003)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Wang, F., Liu, J., Xiong, Y.: Stable peers: Existence, importance, and application in peer-to-peer live video streaming. In: IEEE Infocom (2008)","DOI":"10.1109\/INFOCOM.2007.194"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Gummadi, S., Gribble, P.: A measurement study of peer-to-peer file sharing systems. In: Multimedia Computing and Networking (2002)","DOI":"10.1117\/12.449977"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Sen, S., Wang, J.: Analyzing peer-to-peer traffic across large networks. In: ACM SIGCOMM Internet Measurement Workshop (2002)","DOI":"10.1145\/637219.637222"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_24","volume-title":"Peer-to-Peer Systems II","author":"R. Bhagwan","year":"2003","unstructured":"Bhagwan, R., Savage, S., Voelker, G.: Understanding availability. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735, Springer, Heidelberg (2003)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: ACM SOSP (2003)","DOI":"10.1145\/945445.945475"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Godfrey, P., Shenker, S., Stoica, I.: Minimizing churn in distributed systems. In: ACM SIGCOMM (2006)","DOI":"10.1145\/1159913.1159931"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Stutzbach, D., Rejaie, R.: Characterizing churn in peer-to-peer networks. Tech. Rep. (May 2005)","DOI":"10.1145\/1177080.1177105"},{"key":"8_CR9","unstructured":"Guha, S., Daswani, N., Jain, R.: An experimental study of the skype peer-to-peer voip system. In: IPTPS (2006)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Baset, S.A., Schulzrinne, H.G.: An analysis of the skype peer-to-peer internet telephony protocol. In: IEEE INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"8_CR11","unstructured":"kazaa (2007), http:\/\/kazaa.com"},{"key":"8_CR12","unstructured":"Joost, http:\/\/joost.com"},{"key":"8_CR13","unstructured":"iMesh, http:\/\/www.imesh.com\/"},{"key":"8_CR14","unstructured":"Morpheus discussion group, http:\/\/www.gnutellaforums.com\/morpheus-windows\/"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Suh, K.F., Kurose, D.R., Towsley, D.J.: Characterizing and detecting skype-relayed traffic. In: IEEE INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.313"},{"key":"8_CR16","unstructured":"Ehlert, S., Magedanz, T., Petgang, S., Sisalem, D.: Analysis and signature skype voip session traffic. Tech. Rep. NGNI-SKYPE-06B (2006)"},{"key":"8_CR17","unstructured":"Fabrice, D.: Skype uncovered (2005), http:\/\/www.ossir.org\/windows\/supports\/-2005\/2005-11-07\/EADS-CCR_Fabrice_Skype.pdf"},{"key":"8_CR18","unstructured":"Recon 2006 - Fabrice Desclaux and Kostya Kortchinsky - Vanilla Skype (2006), http:\/\/recon.cx\/en\/f\/vskype-part1.pdf , http:\/\/recon.cx\/en\/f\/vskype-part2.pdf"},{"key":"8_CR19","unstructured":"Biondi, P., Desclaux, F.: Silver needle in the skype. In: Blackhat (2006)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-72697-5_13","volume-title":"Wired\/Wireless Internet Communications","author":"L.D. Cicco","year":"2007","unstructured":"Cicco, L.D., Mascolo, S., Palmisano, V.: An experimental investigation of the congestion control used by skype voIP. In: Boavida, F., Monteiro, E., Mascolo, S., Koucheryavy, Y. (eds.) WWIC 2007. LNCS, vol.\u00a04517, pp. 153\u2013164. Springer, Heidelberg (2007)"},{"key":"8_CR21","unstructured":"Apoc Matrix, The SkypeLogger (December 2006), http:\/\/www.epokh.org\/drupy\/files\/Skype%20Logger.pdf"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Chen, K.-T., Huang, C.-Y., Huang, P., Lei, C.-L.: Quantifying skype user satisfaction. In: ACM SIGCOMM (2006)","DOI":"10.1145\/1159913.1159959"},{"key":"8_CR23","unstructured":"Hofeld, T., Binzenh\u00f6fer, A., Fiedler, M., Tutschku, K.: Measurement and analysis of skype voip traffic in 3g umts systems. In: The 4th International Workshop on Internet Performance, Simulation, Monitoring and Measurement (2006)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, X., Jajodia, S.: Tracking anonymous peer-to-peer voip calls on the internet. In: ACM Conference on Computer and Communications Security (2005)","DOI":"10.1145\/1102120.1102133"},{"key":"8_CR25","unstructured":"Bremler-Barr, A., Dekel, O., Levy, H.: Harvesting skypesuper-nodes. Tech. Rep. (May 2008)"},{"key":"8_CR26","unstructured":"Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer to-peer-based botnets: A case study on storm worm. In: LEET 2008: The First USENIX Workshop on Large-Scale Exploits and Emergent Threats (2008)"},{"key":"8_CR27","volume-title":"Queueing Systems: Volume I \u2013 Theory","author":"L. Kleinrock","year":"1975","unstructured":"Kleinrock, L.: Queueing Systems: Volume I \u2013 Theory. Wiley Interscience, New York (1975)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Xie, Y., Yu, F., Achan, K., Gillum, E., Goldszmidt, M., Wobber, T.: How dynamic are ip addresses. In: ACM SIGCOMM (2007)","DOI":"10.1145\/1282380.1282415"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Khadilkar, M., Feamster, N., Sanders, M., Clark, R.: Usage-based dhcp lease time optimization. In: Internet Measurement Conference (2007)","DOI":"10.1145\/1298306.1298315"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B.: On network-aware clustering of web clients. In: Proceedings of ACM SIGCOMM, pp. 97\u2013110 (2000)","DOI":"10.1145\/347057.347412"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20305-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T21:08:08Z","timestamp":1741122488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20305-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642203046","9783642203053"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20305-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}