{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:11:07Z","timestamp":1775121067018,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T00:00:00Z","timestamp":1555113600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00779-019-01219-y","type":"journal-article","created":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T15:04:10Z","timestamp":1555167850000},"page":"435-442","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Super node selection algorithm combining reputation and capability model in P2P streaming media network"],"prefix":"10.1007","volume":"23","author":[{"given":"M. A.","family":"Rongfei","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,13]]},"reference":[{"issue":"2","key":"1219_CR1","first-page":"1","volume":"2","author":"V Vishnumurthy","year":"2006","unstructured":"Vishnumurthy V, Francis P (2006) On heterogeneous overlay construction and random node selection in unstructured P2P networks. Proc IEEE Infocom 2(2):1\u201312","journal-title":"Proc IEEE Infocom"},{"issue":"3","key":"1219_CR2","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s11042-011-0952-5","volume":"64","author":"G Wang","year":"2013","unstructured":"Wang G, Zhang C, Qiu X et al (2013) An efficient relay node selection scheme to improve the performance of P2P-based VoIP applications in Chinese internet. Multimed Tools Appl 64(3):599\u2013625","journal-title":"Multimed Tools Appl"},{"key":"1219_CR3","doi-asserted-by":"crossref","unstructured":"Lei S, Jing Z, Qi H (2014) A chord-based super-node selection algorithm for load balancing in hybrid P2P networks. International Conference on Mechatronic Sciences","DOI":"10.1109\/MEC.2013.6885395"},{"key":"1219_CR4","unstructured":"Peng J, Zhang D, Jiaxin W U et al (2015) Research on and implementation of communication protocol and system for a new P2P\/CS hybrid architecture. In: Cadogan G, Iacovou M, Kopaka K, Whitley J (eds) Parallel Lives Ancient Island Societies in Crete & Cyprus"},{"key":"1219_CR5","unstructured":"Tao G, Xu Z, Hui T et al (2010) A peer selection algorithm with consideration of both network topology information and node capability in P2P network. International Conference on Intelligent Computation Technology & Automation"},{"key":"1219_CR6","doi-asserted-by":"crossref","unstructured":"Han S C, Yu I K, Ye X et al (2007) A node selection algorithm for many-to-many mappings in peer-to-peer networks. International Conference on Internet & Web Applications & Services","DOI":"10.1109\/ICIW.2007.6"},{"key":"1219_CR7","doi-asserted-by":"crossref","unstructured":"Qu H, Song M, Wang R et al (2009) A network coding dynamic node selection method in mobile peer-to-peer network Int Symp Comput Netw Multimed Technol","DOI":"10.1109\/CNMT.2009.5374542"},{"key":"1219_CR8","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.4028\/www.scientific.net\/AMM.738-739.1160","volume":"738-739","author":"Y Liu","year":"2015","unstructured":"Liu Y, Zhang GY, He JZ (2015) MP2P resource node selection strategy based on altruism and Bayesian game. Appl Mech Mater 738-739:1160\u20131168","journal-title":"Appl Mech Mater"},{"key":"1219_CR9","doi-asserted-by":"crossref","unstructured":"Guo H, Shen F (2012) Study of the server selection and topology-aware in P2P network. Fourth International Conference on Computational Intelligence & Communication Networks","DOI":"10.1109\/CICN.2012.190"},{"key":"1219_CR10","unstructured":"Mo H, Guo S (2010) A distributed node clustering mechanism in P2P networks. International Conference on Advanced Data Mining & Applications"},{"key":"1219_CR11","doi-asserted-by":"crossref","unstructured":"Hongfang-Luo, Lai-Deng, Di-Wen (2013) Research on a P2P supper node selection mechanism based on trust model. In: Han Q, Yu L, Rui Z et al (eds) International Conference on Computer Science & Education. A P2P recommended trust nodes selection algorithm based on topological potential. Communications & Network Security","DOI":"10.1109\/ICCSE.2013.6554028"},{"key":"1219_CR12","doi-asserted-by":"crossref","unstructured":"Jia M, Wang H, Lin J et al (2016) Assessment of node reputation in MP2P based on fuzzy comprehensive evaluation. Eighth international conference on internet computing for Science & Engineering","DOI":"10.1109\/ICICSE.2015.42"},{"key":"1219_CR13","unstructured":"Guo Y, Gong Y, Sheng G et al (2016) The node selection of satellite attitude control system based on sensitivity function in Bayesian network. Control & Decision Conference"},{"key":"1219_CR14","doi-asserted-by":"crossref","unstructured":"Ries S (2009) Extending Bayesian trust models regarding context-dependence and user friendly representation. Acm Symposium on Applied Computing","DOI":"10.1145\/1529282.1529573"},{"key":"1219_CR15","doi-asserted-by":"crossref","unstructured":"Supriya M, Sangeeta K, Patra GK (2013) Comparison of cloud service providers based on direct and recommended trust rating. IEEE International Conference on Electronics","DOI":"10.1109\/CONECCT.2013.6469312"},{"issue":"3","key":"1219_CR16","doi-asserted-by":"publisher","first-page":"60","DOI":"10.4018\/jkss.2012070106","volume":"3","author":"T Bo","year":"2012","unstructured":"Bo T, Jia W (2012) Recommended trust evaluation in B2C E-commerce based on fuzzy analytic hierarchy process. Int J Knowl Syst Sci 3(3):60\u201369","journal-title":"Int J Knowl Syst Sci"},{"key":"1219_CR17","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.adhoc.2015.05.004","volume":"33","author":"IR Chen","year":"2015","unstructured":"Chen IR, Guo J (2015) Hierarchical trust management of community of interest groups in mobile ad hoc networks. Ad Hoc Netw 33:154\u2013167","journal-title":"Ad Hoc Netw"},{"key":"1219_CR18","doi-asserted-by":"crossref","unstructured":"Haruta S, Toyoda K, Sasase I (2016) Trust-based sybil nodes detection with robust seed selection and graph pruning on SNS. IEEE International Workshop on Information Forensics & Security","DOI":"10.1109\/WIFS.2015.7368595"},{"key":"1219_CR19","doi-asserted-by":"crossref","unstructured":"Quevedo GPL, Ocampo RM, Festin CAM (2012) Evaluating the effects of peer localization on a BitTorrent-based P2P video-on-demand network. Tencon IEEE Region 10 Conference. IEEE","DOI":"10.1109\/TENCON.2012.6412288"},{"key":"1219_CR20","doi-asserted-by":"crossref","unstructured":"Takayama K, Fujimoto T, Endo R et al (2012) Neighbor selection based on transmission bandwidth on P2P live streaming service. International Conference on Advanced Information Networking & Applications Workshops. IEEE Computer Society","DOI":"10.1109\/WAINA.2012.170"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01219-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-019-01219-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01219-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T23:19:15Z","timestamp":1586647155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-019-01219-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,13]]},"references-count":20,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1219"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01219-y","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,13]]},"assertion":[{"value":"15 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}