{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:40:40Z","timestamp":1725680440750},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642300530"},{"type":"electronic","value":"9783642300547"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30054-7_5","type":"book-chapter","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T06:42:55Z","timestamp":1337064175000},"page":"59-70","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Traffic Locality in BitTorrent via Shared Trackers"],"prefix":"10.1007","author":[{"given":"Haiyang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiangchuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"CacheLogic, \n                    \n                      http:\/\/www.cachelogic.com\/"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Dischinger, M., Mislove, A., Haeberlen, A., Gummadi, K.P.: Detect Bittorrent Blocking. In: Proc. ACM\/USENIX IMC (2008)","DOI":"10.1145\/1452520.1452523"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Rodriguez, P., Papagiannaki, K.: Should Internet Service Providers Fear Peer-Assisted Content Distribution? In: Proc. ACM\/USENIX IMC (2005)","DOI":"10.1145\/1330107.1330115"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Otto, J.S., Sanchez, M.A., Choffnes, D.R., Bustamante, F.E., Siganos, G.: On Blind Mice and the Elephant: Understanding the Network Impact of a Large Distributed System. In: Proc. ACM SIGCOMM (2011)","DOI":"10.1145\/2018436.2018450"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., Zhang, X.: Measurements, Analysis, and Modeling of BitTorrent-like Systems. In: Proc. ACM\/USENIX IMC (2005)","DOI":"10.1145\/1330107.1330113"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Qiu, D., Srikant, R.: Modeling and Performance Analysis of Bit Torrent-Like Peer-to-Peer Networks. In: Proc. ACM SIGCOMM (2004)","DOI":"10.1145\/1015467.1015508"},{"key":"5_CR7","unstructured":"Blond, S.L., Legout, A., Dabbous, W.: Pushing BitTorrent Locality to the Limit. INRIA Tech, Rep. (2008)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Xie, H., Yang, R.Y., Krishnamurthy, A., Liu, Y.G., Silberschatz, A.: P4p: Provider Portal for Applications. In: Proc. ACM SIGCOMM (2008)","DOI":"10.1145\/1402958.1402999"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Choffnes, D.R., Bustamante, F.E.: Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. In: Proc. ACM SIGCOMM (2008)","DOI":"10.1145\/1402958.1403000"},{"key":"5_CR10","unstructured":"Bindal, R., Cao, P., Chan, W., Medved, J., Suwala, G., Bates, T., Zhang, A.: Improving Traffic Locality in BitTorrent via Biased Neighbor Selection. In: Proc. IEEE ICDCS (2006)"},{"key":"5_CR11","unstructured":"Dan, G., Carlsson, N.: Dynamic Swarm Management for Improved BitTorrent Performance. In: Proc. USENIX IPTPS (2009)"},{"key":"5_CR12","unstructured":"Piatek, M., Isdal, T., Krishnamurth, A., Anderson, T.: One hop reputations for peer to peer file sharing workloads. In: Proc. NSDI (2008)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Neglia, G., Reina, G., Zhang, H., Towsley, D., Venkataramani, A., Danaher, J.: Availability in BitTorrent Systems. In: Proc. IEEE INFOCOM (2007)","DOI":"10.1109\/INFCOM.2007.256"},{"key":"5_CR14","unstructured":"BitTorrent Multi-tracker Specification, \n                    \n                      http:\/\/www.bittornado.com\/docs\/multitracker-spec.txt"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Pouwelse, J.A., Garbacki, P., Epema, D.H.J., Sips, H.J.: The Bittorrent P2P File-sharing System: Measurements and Analysis. In: Proc. USENIX IPTPS (2005)","DOI":"10.1007\/11558989_19"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Menasche, D.S., Rocha, A.A.A., Li, B., Towsley, D., Venkataramani, A.: Content Availability and Bundling in Swarming Systems. In: Proc. CoNext (2009)","DOI":"10.1145\/1658939.1658954"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Lev-tov, N., Carlsson, N., Li, Z., Williamson, C., Zhang, S.: Dynamic File-selection Policies for Bundling in BitTorrent-like Systems. In: Proc. IEEE IWQOS (2010)","DOI":"10.1109\/IWQoS.2010.5542750"},{"key":"5_CR18","unstructured":"Ctorrent, \n                    \n                      http:\/\/ctorrent.sourceforge.net\/"},{"issue":"3","key":"5_CR19","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/TMM.2009.2012911","volume":"11","author":"B. Liu","year":"2009","unstructured":"Liu, B., Cui, Y., Lu, Y., Xue, Y.: Locality-Awareness in BitTorrent-Like P2P Applications. Proceedings of the IEEE Transactions on Multimedia\u00a011(3), 361\u2013371 (2009)","journal-title":"Proceedings of the IEEE Transactions on Multimedia"},{"key":"5_CR20","unstructured":"BT-SIM, \n                    \n                      http:\/\/theory.stanford.edu\/~cao\/btsim-code.tgz"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Yang, Y., Chow, A.L.H., Golubchik, L.: Multi-Torrent: a Performance Study. In: Proc. IEEE\/ACM MASCOTS (2008)","DOI":"10.1109\/MASCOT.2008.4770585"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2012"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30054-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:41:42Z","timestamp":1558298502000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30054-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642300530","9783642300547"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30054-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}