{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T08:10:02Z","timestamp":1741335002133,"version":"3.38.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,7,23]],"date-time":"2011-07-23T00:00:00Z","timestamp":1311379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1007\/s10922-011-9203-3","type":"journal-article","created":{"date-parts":[[2011,7,22]],"date-time":"2011-07-22T10:42:57Z","timestamp":1311331377000},"page":"309-352","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Routing Robustness of Unstructured Peer-to-Peer Networks Using Mobile Agents"],"prefix":"10.1007","volume":"20","author":[{"given":"Ming","family":"Xu","sequence":"first","affiliation":[]},{"given":"Shuigeng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jihong","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,23]]},"reference":[{"key":"9203_CR1","unstructured":"Gnutella. Available: http:\/\/www.ieee.org\/ (2000)"},{"key":"9203_CR2","unstructured":"KaZaA. Available: http:\/\/www.kazaa.com\/ (2001)"},{"key":"9203_CR3","unstructured":"Skype. Available: http:\/\/www.skype.com\/ (2003)"},{"issue":"5","key":"9203_CR4","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1109\/TPDS.2007.70772","volume":"19","author":"S. Jiang","year":"2008","unstructured":"Jiang, S., Guo, L., Zhang, X., Wang, H.D.: LightFlood: minimizing redundant messages and maximizing the scope of peer-to-peer search. IEEE Trans. Parallel Distrib. Syst. 19(5), 601\u2013614 (2008)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9203_CR5","unstructured":"Gkantsidis, C., Mihail, M., Saberi, A.: Random walks in peer-to-peer networks. In: Proceedings of IEEE Conference on Computer Communications, pp. 7\u201311. Paris, France (2004)"},{"issue":"6","key":"9203_CR6","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1016\/j.comnet.2006.08.004","volume":"51","author":"N. Bisnik","year":"2007","unstructured":"Bisnik, N., Abouzeid, A.: Optimizing random walk search algorithms in P2P networks. Comput. Netw. 51(6), 1499\u20131514 (2007)","journal-title":"Comput. Netw."},{"issue":"2","key":"9203_CR7","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/TNET.2007.892851","volume":"15","author":"S. Nelakuditi","year":"2007","unstructured":"Nelakuditi, S., Lee, S., Yu, Y., Zhang, Z.-L., Chuah, C.-N.: Fast local rerouting for handling transient link failures. IEEE\/ACM Trans. Netw. 15(2), 359\u2013372 (2007)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9203_CR8","doi-asserted-by":"crossref","unstructured":"Li, X., Ji, H., Yu, F.R., Zheng, R.M.: A FCM-Based peer grouping scheme for node failure recovery in wireless P2P file sharing. In: Proceedings of IEEE Conference on Communications, pp. 1\u20135. Dresden, Germany (2009)","DOI":"10.1109\/ICC.2009.5198602"},{"issue":"1","key":"9203_CR9","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/SURV.2009.090102","volume":"11","author":"D. Chopra","year":"2009","unstructured":"Chopra, D., Schulzrinne, H., Marocco, E., Ivov, E.: Peer-to-peer overlays for real-time communication: security issues and solutions. IEEE Commun. Surv. Tutor. 11(1), 4\u201312 (2009)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9203_CR10","doi-asserted-by":"crossref","unstructured":"Markopulu, A., Iannaccone, G., Bhattacharya, S., Chuah, C.-N., Diot, C.: Characterization of failures in an IP backbone. In: Proceedings of IEEE INFOCOM, pp. 2307\u20132317. Hong Kong, China (2004)","DOI":"10.1109\/INFCOM.2004.1354653"},{"issue":"5","key":"9203_CR11","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/TC.2005.76","volume":"54","author":"D. Avresky","year":"2005","unstructured":"Avresky, D., Natchev, N.: Dynamic reconfiguration in computer clusters with irregular topologies in the presence of multiple node and link failures. IEEE Trans. Comput. 54(5), 603\u2013615 (2005)","journal-title":"IEEE Trans. Comput."},{"key":"9203_CR12","doi-asserted-by":"crossref","unstructured":"Schollmeier, G., Charzinski, J., Kirstadter, A., Reichert, C., Schrodi, K.J., Glickman, Y., Winkler, C.: Improving the resilience in IP networks. In: IEEE Workshop on High Performance Switching and Routing, pp. 91\u201396. Torino, Italy (2003)","DOI":"10.1109\/HPSR.2003.1226686"},{"key":"9203_CR13","unstructured":"Coleri, S., Varaiya, P.: Fault tolerant and energy efficient routing for sensor networks. In: IEEE Global Telecommunications Conference, pp. 10\u201315. Dallas, Texas, USA (2004)"},{"key":"9203_CR14","doi-asserted-by":"crossref","unstructured":"Ruan, L., Liu, Z.: Upstream node initiated fast restoration in MPLS networks. In: IEEE International Conference on Communications, pp. 959\u2013964. Seoul, Korea (2005)","DOI":"10.1109\/ICC.2005.1494492"},{"key":"9203_CR15","doi-asserted-by":"crossref","unstructured":"Jin, D.P., Chen, W.T., Xiao, Z.Y., Zeng, L.G.: Single link switching mechanism for fast recovery in tree-based recovery schemes. In: IEEE International Conference on Communications, pp. 1\u20135. Beijing, China (2008)","DOI":"10.1109\/ICTEL.2008.4652644"},{"key":"9203_CR16","unstructured":"Choi, H., Subramaniam, S., Choi, H.A.: On double link failure recovery in WDM optical networks. In: IEEE International Conference on Communications, pp. 808\u2013816. New York, USA (2002)"},{"key":"9203_CR17","doi-asserted-by":"crossref","unstructured":"Clouqueur, M., Grover, W.D.: Mesh-restorable networks with complete dual failure restorability and with selectively enhanced dual-failure restorability properties. In: SPIE Optical Networking and Communications Conference, pp. 1\u201312. Boston, USA (2002)","DOI":"10.1117\/12.475288"},{"issue":"3","key":"9203_CR18","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TNET.2007.893199","volume":"15","author":"D. Leonard","year":"2007","unstructured":"Leonard, D., Yao, Z.M., Rai, V., Loguinov, D.: On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks. IEEE\/ACM Trans. Netw. 15(3), 644\u2013656 (2007)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9203_CR19","unstructured":"Zhu, Y.W.: Resilient P2P anonymous routing by using redundancy. In: Proceedings of the International Workshop on Networking, Architecture, and Storages, pp. 103\u2013110. Shenyang, China (2006)"},{"key":"9203_CR20","doi-asserted-by":"crossref","unstructured":"Ferreira, R.A., Ramanathan M.K., Awan, A., Grama, A., Jagannathan, S.: Search with probabilistic guarantees in unstructured peer-to-peer networks. In: Proceedings of IEEE Conference on Peer-to-Peer Computing, pp. 165\u2013172. Konstanz, Germany (2005)","DOI":"10.1109\/P2P.2005.33"},{"key":"9203_CR21","doi-asserted-by":"crossref","unstructured":"Tsoumakos, D., Roussopoulos, N.: Analysis and comparison of P2P search methods. In: Proceedings of 1st International Conference on Scalable Information Systems, p. 25. Hongkong, China (2006)","DOI":"10.1145\/1146847.1146872"},{"key":"9203_CR22","unstructured":"Li X., Wu J.: Searching techniques in Peer-to-Peer networks. In: Wu, J. (ed.) Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks. Auerbach Publications,Talyor and Francis Group, Boston (2005)"},{"key":"9203_CR23","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-09751-0","volume-title":"Handbook of Peer-to-Peer Networking","author":"X. Shen","year":"2010","unstructured":"Shen, X., Yu, H., Buford, J., Akon, M.: Handbook of Peer-to-Peer Networking. Springer, Heidelberg (2010)"},{"key":"9203_CR24","doi-asserted-by":"crossref","unstructured":"Kalogeraki, V., Gunopulos, D., Zeinalipour-Yazti, D.: A local search mechanism for peer-topeer networks. In: Proceedings of the 11th International Conference on Information and Knowledge Management, pp. 300\u2013307. McLean, Virginia, USA (2002)","DOI":"10.1145\/584838.584842"},{"key":"9203_CR25","doi-asserted-by":"crossref","unstructured":"Yang, B., Garcia-Molina, H.: Improving search in Peer-to-Peer networks. In: Proceedings of the International Conference on Distributed Computing Systems, pp. 5\u201314. Vienna, Austria (2002)","DOI":"10.1109\/ICDCS.2002.1022237"},{"key":"9203_CR26","doi-asserted-by":"crossref","unstructured":"Lv, Q, Cao, P, Cohen, E, Li, K., Shenker, S.: Search and replication in unstructured peer-to-peer networks. In: Proceedings of the 16th International conference on Supercomputing, pp. 84\u201395. New York, USA (2002)","DOI":"10.1145\/514203.514206"},{"key":"9203_CR27","doi-asserted-by":"crossref","DOI":"10.1007\/11530657","volume-title":"P2P Systems and Applications","author":"R. Steinmetz","year":"2005","unstructured":"Steinmetz, R., Wehrle, K.: P2P Systems and Applications. Springer, Heidelberg (2005)"},{"key":"9203_CR28","doi-asserted-by":"crossref","unstructured":"Michlmayr, E.: Ant algorithms for search in unstructured peer-to-peer networks. In: Proceedings of the 22nd International Conference on Data Engineering Workshops, p. 142. Atlanta, GA, USA (2006)","DOI":"10.1109\/ICDEW.2006.29"},{"key":"9203_CR29","doi-asserted-by":"crossref","unstructured":"Morselli, R., Bhattacharjee, B., Srinivasan, A., Marsh, M. A.: Efficient lookup on unstructured topologies. In: Proc. of the 24th Annual ACM Aymposium on Principles of Distributed Computing, pp. 77\u201386. Las Vegas, Nevada, USA (2005)","DOI":"10.1145\/1073814.1073828"},{"key":"9203_CR30","doi-asserted-by":"crossref","unstructured":"Connelly, B.D., Bowron, C. W., Xiao, L., Tan, P.N., Wang, C.: Adaptively routing P2P queries using association analysis. In: Proceedings of the 35th International Conference on Parallel Processing, pp. 281\u2013288. Columbus, Ohio, USA (2006)","DOI":"10.1109\/ICPP.2006.18"},{"key":"9203_CR31","doi-asserted-by":"crossref","unstructured":"Tsoumakos, D., Roussopoulos, N.: Adaptive probabilistic search for peer-to-peer networks. In: Proceedings of 3rd International Conference on Peer-to-Peer Computing, pp. 102\u2013109. Link\u00f6ping, Sweden (2003)","DOI":"10.1109\/PTP.2003.1231509"},{"key":"9203_CR32","doi-asserted-by":"crossref","unstructured":"Ravindran, K.: Reconfigurable peer-to-peer connectivity overlays for information assurance applications. In: Proceedings of 32th International Conference on Parallel Processing, pp. 1\u20137. Dresden, Germany (2009)","DOI":"10.1109\/ICC.2009.5199397"},{"key":"9203_CR33","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/3-540-45023-8_49","volume":"2691","author":"A. Maj","year":"2003","unstructured":"Maj, A., Jurowicz, J., Kozlak, J., Cetnarowicz, K.: A multi-agent system for dynamic network reconfiguration. Multi-Agent Syst Appl III, LNAI 2691, 511\u2013521 (2003)","journal-title":"Multi-Agent Syst Appl III, LNAI"},{"key":"9203_CR34","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.jpdc.2004.09.009","volume":"65","author":"S.Q. Wang","year":"2005","unstructured":"Wang, S.Q., Xuan, D., Zhao, W.: Analyzing and enhancing the resilience of structured peer-to-peer systems. J. Parallel Distrib. Comput. 65, 207\u2013219 (2005)","journal-title":"J. Parallel Distrib. Comput."},{"key":"9203_CR35","doi-asserted-by":"crossref","first-page":"2109","DOI":"10.1016\/j.comcom.2008.01.051","volume":"31","author":"J.S. Kong","year":"2008","unstructured":"Kong, J.S., Bridgewater, S.A., Roychowdhury, V.P.: Resilience of structured P2P systems under churn: the reachable component method. Comput. Commun. 31, 2109\u20132123 (2008)","journal-title":"Comput. Commun."},{"key":"9203_CR36","doi-asserted-by":"crossref","unstructured":"Qazi, S., Moors, T.: Scalable resilient overlay networks using destination-guided detouring. In: Proceedings of IEEE International Conference on Communications, pp. 428\u2013434. Glasgw, Scotland. (2007)","DOI":"10.1109\/ICC.2007.77"},{"issue":"2","key":"9203_CR37","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1109\/TNET.2008.926507","volume":"17","author":"A. Kvalbein","year":"2009","unstructured":"Kvalbein, A., Hansen, A.F., Cicic, T., Gjessing, S., Lysne, O.: Multiple routing configurations for fast IP network recovery. IEEE Trans. Netw. 17(2), 473\u2013486 (2009)","journal-title":"IEEE Trans. Netw."},{"key":"9203_CR38","unstructured":"Acosta, J.R., Avresky, D.R.: Dynamic network reconfiguration in presence of multiple node and link failures using autonomous agents. In: Proceedings of IEEE Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 10\u201320. San Jose, CA, USA (2005)"},{"issue":"2","key":"9203_CR39","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/71.910868","volume":"12","author":"J. Duato","year":"2001","unstructured":"Duato, J., Casado, R., Bermudez, A., Quiles, F.J.: A protocol for deadlock-free dynamic reconfiguration in high-speed local area networks. IEEE Trans. Parallel Distrib. Syst. 12(2), 115\u2013132 (2001)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"11","key":"9203_CR40","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1400214.1400236","volume":"51","author":"R. Kotla","year":"2008","unstructured":"Kotla, R., Alvisi, L., Dahlin, M., Clement, A., Wong, E.: Zyzzyva: speculative Byzantine fault tolerance. Commun. ACM 51(11), 86\u201395 (2008)","journal-title":"Commun. ACM"},{"key":"9203_CR41","unstructured":"Jesi, G.P.: PeerSim HOWTO: Build a new protocol for the PeerSim 1.0 Simulator. Available: http:\/\/peersim.sourceforge.net\/ (2001)"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-011-9203-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-011-9203-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-011-9203-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T07:47:39Z","timestamp":1741333659000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-011-9203-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,23]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["9203"],"URL":"https:\/\/doi.org\/10.1007\/s10922-011-9203-3","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2011,7,23]]}}}