{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:41:24Z","timestamp":1762875684746},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2015,4,18]],"date-time":"2015-04-18T00:00:00Z","timestamp":1429315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s00500-015-1667-8","type":"journal-article","created":{"date-parts":[[2015,4,17]],"date-time":"2015-04-17T04:31:52Z","timestamp":1429245112000},"page":"2677-2687","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform"],"prefix":"10.1007","volume":"20","author":[{"given":"Yi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Shinji","family":"Sakamoto","sequence":"additional","affiliation":[]},{"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]},{"given":"Fatos","family":"Xhafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,18]]},"reference":[{"key":"1667_CR1","doi-asserted-by":"crossref","unstructured":"Aikebaier A, Enokido T, Takizawa M (2010) Reliable message broadcast schemes in distributed agreement protocols. In: International conference on broadband, wireless computing communication and applications (BWCCA-2010), pp 242\u2013249","DOI":"10.1109\/BWCCA.2010.77"},{"key":"1667_CR2","unstructured":"Asai K, Sugeno M, Terano T, Aschmann CG (1992) Fuzzy systems theory and its applications. Academic Press"},{"issue":"03","key":"1667_CR3","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1142\/S0219265903000866","volume":"4","author":"L Barolli","year":"2003","unstructured":"Barolli L, Koyama A, Suganuma T, Shiratori N (2003) Gaman: a ga based qos routing method for mobile ad-hoc networks. J Interconnect Netw 4(03):251\u2013270","journal-title":"J Interconnect Netw"},{"issue":"3\/4","key":"1667_CR4","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1108\/17440080780000299","volume":"2","author":"L Barolli","year":"2007","unstructured":"Barolli L, Xhafa F, Durresi A, De Marco G (2007) M3ps: a jxta-based multi-platform p2p system and its web application tools. Int J Web Inf Syst 2(3\/4):187\u2013196","journal-title":"Int J Web Inf Syst"},{"key":"1667_CR5","unstructured":"Brookshier D, Govoni D, Krishnan N, Soto JC (2002) JXTA: Java p2p programming. Sams"},{"key":"1667_CR6","unstructured":"Kandel A (1991) Fuzzy expert systems. CRC Press"},{"key":"1667_CR7","unstructured":"Klir GJ, Folger TA (1988) Fuzzy sets, uncertainty, and information"},{"key":"1667_CR8","doi-asserted-by":"crossref","unstructured":"Konig H, Litz L (1994) A systematic approach to perform inference and defuzzification in fuzzy logic controllers. In: Second international conference on intelligent systems engineering, pp 201\u2013206","DOI":"10.1049\/cp:19940625"},{"issue":"10\u201311","key":"1667_CR9","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1007\/s00607-012-0225-9","volume":"95","author":"E Kulla","year":"2013","unstructured":"Kulla E, Ikeda M, Oda T, Barolli L, Xhafa F, Biberaj A (2013) Experimental results from a manet testbed in outdoor bridge environment considering batman routing protocol. Computing 95(10\u201311):1073\u20131086","journal-title":"Computing"},{"key":"1667_CR10","doi-asserted-by":"crossref","unstructured":"Liu Y, Sakamoto S, Barolli L, Ikeda M, Xhafa F (2014) A fuzzy-based reliability system for jxta-overlay p2p platform considering number of interaction, security, and packet loss parameters. In: Ninth international conference on broadband and wireless computing communication and applications (BWCCA-2014), pp 377\u2013382","DOI":"10.1109\/BWCCA.2014.121"},{"key":"1667_CR11","doi-asserted-by":"crossref","unstructured":"Matsuo K, Barolli L, Kolici V, Xhafa F, Koyama A, Durresi A (2009) Stimulation effects of smartbox for e-learning using jxta-overlay p2p system. In: International conference on complex, intelligent and software intensive systems (CISIS-2009), pp 231\u2013238","DOI":"10.1109\/CISIS.2009.104"},{"key":"1667_CR12","unstructured":"McNeill FM, Thro E (2014) Fuzzy logic: a practical approach. Academic Press"},{"issue":"3","key":"1667_CR13","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/175247.175254","volume":"37","author":"T Munakata","year":"1994","unstructured":"Munakata T, Jani Y (1994) Fuzzy systems: an overview. Commun ACM 37(3):68\u201376","journal-title":"Commun ACM"},{"issue":"4","key":"1667_CR14","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1504\/IJWGS.2014.064932","volume":"10","author":"T Oda","year":"2014","unstructured":"Oda T, Sakamoto S, Barolli A, Spaho E, Barolli L, Xhafa F (2014) Effect of different grid shapes in wireless mesh network-genetic algorithm system. Int J Web Grid Serv 10(4):371\u2013395","journal-title":"Int J Web Grid Serv"},{"key":"1667_CR15","doi-asserted-by":"crossref","unstructured":"Ogata Y, Matsuo K, Spaho E, Barolli L, Xhafa F (2010) Implementation of smartbox end-device for a p2p system and its evaluation for e-learning and medical applications. In: Fifth international conference on broadband and wireless computing communication and applications (BWCCA-2010), pp 794\u2013799","DOI":"10.1109\/BWCCA.2010.174"},{"issue":"1","key":"1667_CR16","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0005-1098(79)90084-0","volume":"15","author":"TJ Procyk","year":"1979","unstructured":"Procyk TJ, Mamdani EH (1979) A linguistic self-organizing process controller. Automatica 15(1):15\u201330","journal-title":"Automatica"},{"issue":"3","key":"1667_CR17","first-page":"227","volume":"6","author":"E Spaho","year":"2010","unstructured":"Spaho E, Matsuo K, Barolli L, Xhafa F, Arnedo-Moreno J, Kolici V (2010) Application of jxta-overlay platform for secure robot control. J Mob Multimed 6(3):227\u2013242","journal-title":"J Mob Multimed"},{"issue":"9","key":"1667_CR18","doi-asserted-by":"crossref","first-page":"1783","DOI":"10.1007\/s00500-013-1206-4","volume":"18","author":"E Spaho","year":"2014","unstructured":"Spaho E, Sakamoto S, Barolli L, Xhafa F, Ikeda M (2014) Trustworthiness in p2p: performance behaviour of two fuzzy-based systems for jxta-overlay platform. Soft Comput 18(9):1783\u20131793","journal-title":"Soft Comput"},{"issue":"3","key":"1667_CR19","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1278460.1278465","volume":"2","author":"K Watanabe","year":"2007","unstructured":"Watanabe K, Nakajima Y, Enokido T, Takizawa M (2007) Ranking factors in peer-to-peer overlay networks. ACM Trans Auton Adapt Syst (TAAS) 2(3):11","journal-title":"ACM Trans Auton Adapt Syst (TAAS)"},{"issue":"5","key":"1667_CR20","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1016\/j.csi.2008.03.015","volume":"31","author":"F Xhafa","year":"2009","unstructured":"Xhafa F, Barolli L, Daradoumis T, Fern\u00e1ndez R, Caball\u00e9 S (2009) Jxta-overlay: an interface for efficient peer selection in p2p jxta-based systems. J Comput Stand Interfaces 31(5):886\u2013893","journal-title":"J Comput Stand Interfaces"},{"issue":"1","key":"1667_CR21","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11227-009-0334-1","volume":"53","author":"F Xhafa","year":"2010","unstructured":"Xhafa F, Barolli L, Caball\u00e9 S, Fern\u00e1ndez R (2010) Efficient peergroup management in jxta-overlay p2p system for developing groupware tools. J Supercomput 53(1):45\u201365","journal-title":"J Supercomput"},{"key":"1667_CR22","doi-asserted-by":"crossref","unstructured":"Xhafa F, Fernandez R, Daradoumis T, Barolli L, Caball\u00e9 S (2007) Improvement of jxta protocols for supporting reliable distributed applications in p2p systems. In: Network-based information systems (NBiS-2007), pp 345\u2013354","DOI":"10.1007\/978-3-540-74573-0_36"},{"issue":"5","key":"1667_CR23","first-page":"317","volume":"27","author":"T Yang","year":"2012","unstructured":"Yang T, Oda T, Mino G, Barolli L, Durresi A, Xhafa F (2012) Energy-saving in wireless sensor networks considering mobile sensor nodes, single and multi events. Comput Syst Sci Eng 27(5):317\u2013326","journal-title":"Comput Syst Sci Eng"},{"key":"1667_CR24","doi-asserted-by":"crossref","unstructured":"Yousaf S, Ahmed S, Akbar M, Javaid N, Khan Z, Qasim U (2014) Incremental relay-based co-cestat protocol for wireless body area networks. In: Ninth international conference on broadband and wireless computing communication and applications (BWCCA-2014), pp 113\u2013119","DOI":"10.1109\/BWCCA.2014.55"},{"key":"1667_CR25","unstructured":"Zadeh LA, Kacprzyk J (1992) Fuzzy logic for the management of uncertainty. Wiley, New York"},{"key":"1667_CR26","doi-asserted-by":"crossref","unstructured":"Zimmermann H-J (2001) Fuzzy set theory-and its applications. Springer Science & Business Media","DOI":"10.1007\/978-94-010-0646-0"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1667-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1667-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1667-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T01:43:47Z","timestamp":1559094227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1667-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,18]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["1667"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1667-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,18]]}}}