{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:05:02Z","timestamp":1742947502190,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":17,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400769953"},{"type":"electronic","value":"9789400769960"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-6996-0_47","type":"book-chapter","created":{"date-parts":[[2013,7,13]],"date-time":"2013-07-13T14:05:32Z","timestamp":1373724332000},"page":"451-460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fuzzy-Based System for Evaluation of Trustworthiness for P2P Communication in JXTA-Overlay"],"prefix":"10.1007","author":[{"given":"Kouhei","family":"Umezaki","sequence":"first","affiliation":[]},{"given":"Evjola","family":"Spaho","sequence":"additional","affiliation":[]},{"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]},{"given":"Fatos","family":"Xhafa","sequence":"additional","affiliation":[]},{"given":"Jiro","family":"Iwashige","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Xhafa F, Fernandez R, Daradoumis T, Barolli L, Caballe S (2007) Improvement of JXTA protocols for supporting reliable distributed applications in P2P systems. In: Proceedings of the NBiS-2007 (Regensburg, Germany), LNCS 4658, Sep 2007, pp 345\u2013354","DOI":"10.1007\/978-3-540-74573-0_36"},{"issue":"3\/4","key":"47_CR2","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1108\/17440080780000299","volume":"2","author":"L Barolli","year":"2006","unstructured":"Barolli L, Xhafa F, Durresi A, De Marco G (2006) M3PS: A JXTA-based Multi-platform P2P System and Its Web Application Tools. Int J Web Inform Syst 2(3\/4):187\u2013196","journal-title":"Int J Web Inform Syst"},{"issue":"3","key":"47_CR3","first-page":"1","volume":"2","author":"K Watanabe","year":"2007","unstructured":"Watanabe K, Nakajima Y, Enokido T, Takizawa M (2007) Ranking factors in peer-to-peer overlay networks. ACM Trans Autonomuous and Adapt Syst (TAAS) 2(3):1\u201326","journal-title":"ACM Trans Autonomuous and Adapt Syst (TAAS)"},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"Aikebaier A, Enokido T, Takizawa M (2010) Reliable message broadcast schemes in distributed agreement protocols. In: Proceedings of the BWCCA-2010, Fukuoka, Japan, Nov 2010, pp 242\u2013249","DOI":"10.1109\/BWCCA.2010.77"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Umezaki K, Spaho E, Ogata Y, Ando H, Barolli L, Xhafa F (2011) A fuzzy-based reliability system for JXTA-overlay P2P platform. In: Proceedings of the IMIS-2011, June\u2013July 2011, pp 805\u2013810","DOI":"10.1109\/IMIS.2011.51"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Umezaki K, Spaho E, Ogata Y, Barolli L, Xhafa F, Iwashige J (2011) A fuzzy-based trustworthiness system for JXTA-overlay P2P platform. In: Proceedings of the INCoS-2012, Nov\u2013Dec 2011, pp 484\u2013489","DOI":"10.1109\/INCoS.2011.22"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Umezaki K, Spaho E, Ogata Y, Barolli L, Xhafa F, Iwashige J (2012) A fuzzy-based trustworthiness system for JXTA-overlay P2P platform and its performance evaluation considering three parameters. In: Proceedings of the WAINA-2012, March 2012, pp 944\u2013949","DOI":"10.1109\/WAINA.2012.70"},{"key":"47_CR8","unstructured":"Kandel A (1992) Fuzzy expert systems. CRC Press, Boca Raton"},{"key":"47_CR9","doi-asserted-by":"crossref","unstructured":"Zimmermann HJ (1991) Fuzzy set theory and its applications, Second Revised Edition. Kluwer Academic Publishers, Boston","DOI":"10.1007\/978-94-015-7949-0"},{"key":"47_CR10","unstructured":"McNeill FM, Thro E (1994) Fuzzy logic: A practical approach. Academic Press, Inc., Boston"},{"key":"47_CR11","unstructured":"Zadeh LA, Kacprzyk J (1992) Fuzzy logic for the management of uncertainty. John Wiley and Sons, Inc., New York"},{"issue":"1","key":"47_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/0005-1098(79)90084-0","volume":"15","author":"TJ Procyk","year":"1979","unstructured":"Procyk TJ, Mamdani EH (1979) A linguistic self-organizing process controller. Automatica 15(1):15\u201330","journal-title":"Automatica"},{"key":"47_CR13","volume-title":"Fuzzy sets, uncertainty, and information","author":"GJ Klir","year":"1988","unstructured":"Klir GJ, Folger TA (1988) Fuzzy sets, uncertainty, and information. Prentice Hall, Englewood Cliffs"},{"issue":"3","key":"47_CR14","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/175247.175254","volume":"37","author":"T Munakata","year":"1994","unstructured":"Munakata T, Jani Y (1994) Fuzzy systems: an overview. Commun ACM 37(3):69\u201376","journal-title":"Commun ACM"},{"key":"47_CR15","unstructured":"Brookshier D, Govoni D, Krishnan N, Soto JC (2002) JXTA: Java P2P programming. Sams Publishing, Indianapolis, 2002"},{"key":"47_CR16","unstructured":"IBM Corporation (2007) Making P2P interoperable: creating JXTA systems design P2P systems that extend beyond traditional network boundaries"},{"key":"47_CR17","unstructured":"Sun Microsystems (2007) JXTA java standard edition V2.5: programmers guide. June 2007"}],"container-title":["Lecture Notes in Electrical Engineering","Information Technology Convergence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-6996-0_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T07:07:33Z","timestamp":1715411253000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-6996-0_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9789400769953","9789400769960"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-6996-0_47","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"14 July 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}