{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:39:34Z","timestamp":1762875574064},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2013,12,25]],"date-time":"2013-12-25T00:00:00Z","timestamp":1387929600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s00500-013-1206-4","type":"journal-article","created":{"date-parts":[[2013,12,24]],"date-time":"2013-12-24T04:20:58Z","timestamp":1387858858000},"page":"1783-1793","source":"Crossref","is-referenced-by-count":82,"title":["Trustworthiness in P2P: performance behaviour of two fuzzy-based systems for JXTA-overlay platform"],"prefix":"10.1007","volume":"18","author":[{"given":"Evjola","family":"Spaho","sequence":"first","affiliation":[]},{"given":"Shinji","family":"Sakamoto","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]},{"given":"Fatos","family":"Xhafa","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,25]]},"reference":[{"key":"1206_CR1","doi-asserted-by":"crossref","unstructured":"Aikebaier A, Enokido T, Takizawa M (2010) Reliable message broadcast schemes in distributed agreement protocols. In: Proceeding of BWCCA-2010 (Fukuoka, Japan), pp 242\u2013249","DOI":"10.1109\/BWCCA.2010.77"},{"key":"1206_CR2","doi-asserted-by":"crossref","unstructured":"Barolli L, Xhafa F, Durresi A, De Marco G (2006) M3PS: a JXTA-based multi-platform p2p system and its web application tools. Int J Web Inf Syst 2(3\/4):187\u2013196","DOI":"10.1108\/17440080780000299"},{"key":"1206_CR3","volume-title":"JXTA: Java P2P Programming","author":"D Brookshier","year":"2002","unstructured":"Brookshier D, Govoni D, Krishnan N, Soto JC (2002) JXTA: Java P2P Programming. Sams Publishing, Indianapolis"},{"key":"1206_CR4","volume-title":"Fuzzy expert systems","author":"A Kandel","year":"1992","unstructured":"Kandel A (1992) Fuzzy expert systems. CRC Press, Boca Raton"},{"key":"1206_CR5","volume-title":"Fuzzy sets, uncertainty, and information","author":"GJ Klir","year":"1988","unstructured":"Klir GJ, Folger TA (1988) Fuzzy sets, uncertainty, and information. Prentice Hall, Englewood Cliffs"},{"key":"1206_CR6","doi-asserted-by":"crossref","unstructured":"Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man-machine Stud 7:1\u201313","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"1206_CR7","doi-asserted-by":"crossref","unstructured":"Matsuo K, Barolli L, Kolici V, Xhafa F, Koyama A, Durresi A (2009) Stimulation effects of smartbox for E-learning using JXTA-overlay P2P system. In: Proc. of CISIS-2009, pp 231\u2013238","DOI":"10.1109\/CISIS.2009.104"},{"key":"1206_CR8","unstructured":"McNeill FM, Thro E (1994) Fuzzy logic. A practical approach. Academic Press, New York"},{"key":"1206_CR9","doi-asserted-by":"crossref","unstructured":"Munakata T, Jani Y (1994) Fuzzy systems: an overview. Commun ACM 37(3):69\u201376","DOI":"10.1145\/175247.175254"},{"key":"1206_CR10","doi-asserted-by":"crossref","unstructured":"Ogata Y, Matsuo K, Spaho E, Barolli L, Xhafa F (2010) Implementation of smartbox end-device for a P2P system and its evaluation for e-learning and medical applications. In: Proceeding of BWCCA-2010, pp 794\u2013799","DOI":"10.1109\/BWCCA.2010.174"},{"issue":"1","key":"1206_CR11","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0005-1098(79)90084-0","volume":"15","author":"TJ Procyk","year":"1979","unstructured":"Procyk TJ, Mamdani EH (1979) A linguistic self-organizing process controller. Automatica 15(1):15\u201330","journal-title":"Automatica"},{"issue":"3","key":"1206_CR12","first-page":"227","volume":"6","author":"E Spaho","year":"2010","unstructured":"Spaho E, Matsuo K, Barolli L, Xhafa F, Arnedo-Moreno J, Kolici V (2010) Application of JXTA-overlay platform for secure robot control. J Mobile Multimed 6(3):227\u2013242","journal-title":"J Mobile Multimed"},{"key":"1206_CR13","volume-title":"Fuzzy systems theory and its applications","author":"T Terano","year":"1992","unstructured":"Terano T, Asai K, Sugeno M (1992) Fuzzy systems theory and its applications. Academic Press, Harcourt Brace Jovanovich"},{"issue":"3","key":"1206_CR14","first-page":"1","volume":"2","author":"K Watanabe","year":"2007","unstructured":"Watanabe K, Nakajima Y, Enokido T, Takizawa M (2007) Ranking factors in peer-to-peer overlay networks. ACM Trans Auton Adapt Syst (TAAS) 2(3):1\u201326","journal-title":"ACM Trans Auton Adapt Syst (TAAS)"},{"key":"1206_CR15","doi-asserted-by":"crossref","unstructured":"Xhafa F, Fernandez R, Daradoumis T, Barolli L, Caballe S (2007) Improvement of JXTA protocols for supporting reliable distributed applications in P2P systems. In: Proceeding of NBiS-2007 (Regensburg, Germany). LNCS, vol 4658. Springer, Berlin, pp 345\u2013354","DOI":"10.1007\/978-3-540-74573-0_36"},{"key":"1206_CR16","volume-title":"Fuzzy logic for the management of uncertainty","author":"LA Zadeh","year":"1992","unstructured":"Zadeh LA, Kacprzyk J (1992) Fuzzy logic for the management of uncertainty. Wiley, New York"},{"key":"1206_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-7949-0","volume-title":"Fuzzy set theory and its applications","author":"HJ Zimmermann","year":"1991","unstructured":"Zimmermann HJ (1991) Fuzzy set theory and its applications. Kluwer, Dordrecht (second revised edition)"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-013-1206-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-013-1206-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-013-1206-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,20]],"date-time":"2022-03-20T15:10:30Z","timestamp":1647789030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-013-1206-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,25]]},"references-count":17,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["1206"],"URL":"https:\/\/doi.org\/10.1007\/s00500-013-1206-4","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,25]]}}}