{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T07:11:20Z","timestamp":1717571480482},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,7,15]],"date-time":"2014-07-15T00:00:00Z","timestamp":1405382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10922-014-9323-7","type":"journal-article","created":{"date-parts":[[2014,7,14]],"date-time":"2014-07-14T15:39:21Z","timestamp":1405352361000},"page":"803-829","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Improving Network Coding Based File Sharing for Unstructured Peer-to-Peer Networks"],"prefix":"10.1007","volume":"23","author":[{"given":"Jenq-Shiou","family":"Leu","sequence":"first","affiliation":[]},{"given":"Min-Chieh","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hsiao-Chuan","family":"Yueh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,15]]},"reference":[{"issue":"4","key":"9323_CR1","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1109\/TNET.2002.801413","volume":"10","author":"P Rodriguez","year":"2002","unstructured":"Rodriguez, P., Biersack, E.W.: Dynamic parallel access to replicated content in the Internet. IEEE\/ACM Trans. Netw. 10(4), 455\u2013465 (2002)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9323_CR2","unstructured":"(2000) The BitTorrent Protocol Specification. (Online). http:\/\/wiki.theory.org\/index.php\/BitTorrentSpecification"},{"key":"9323_CR3","doi-asserted-by":"crossref","unstructured":"Legout, A., UrvoyKeller, G., Michiardi, P.: Rarest First and Choke Algorithms are Enough. In: Internet Measurement Conference 2006, (2006)","DOI":"10.1145\/1177080.1177106"},{"key":"9323_CR4","doi-asserted-by":"crossref","unstructured":"Tian, Y., Wu, D. Ng, K.-W.: Modeling, Analysis and Improvement for BitTorrent-Like File Sharing Networks. In: INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pp. 1\u201311, Apr. (2006)","DOI":"10.1109\/INFOCOM.2006.331"},{"key":"9323_CR5","unstructured":"Availability. http:\/\/wiki.theory.org\/Availability"},{"key":"9323_CR6","unstructured":"Jia, C. Hongxiao, Z., Jinsheng, Y.: Randomness Betters Nearest-Rarest in the P2P Clustering Networks. In: Wireless Communications, Networking and Mobile Computing, WiCom \u201809. 5th International Conference on, pp. 1\u20134, (2009)"},{"issue":"4","key":"9323_CR7","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Alshwede","year":"2000","unstructured":"Alshwede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theory 46(4), 1204\u20131216 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"9323_CR8","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1002\/nem.1797","volume":"22","author":"L Wu","year":"2012","unstructured":"Wu, L., Curran, K.: A practical network coding and routing scheme based on maximum flow combination. Int. J. Netw. Manage 22(5), 373\u2013396 (2012)","journal-title":"Int. J. Netw. Manage"},{"key":"9323_CR9","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/JSYST.2010.2063377","volume":"5","author":"W Nan","year":"2011","unstructured":"Nan, W., Ansari, N.: Downloader-Initiated random linear network coding for peer-to-peer file sharing. IEEE Syst. J. 5, 61\u201369 (2011)","journal-title":"IEEE Syst. J."},{"key":"9323_CR10","unstructured":"Gkantsidis, C., Miller, J., Rodriguez, P.: Comprehensive View of a Live Network Coding P2P System. In: Presented at the Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, Rio de Janeriro, Brazil, (2006)"},{"key":"9323_CR11","unstructured":"Chou, P. A., Wu Y., Jain, K.: Practical Network Coding. In: Allerton Conference on Communication, Control, and Computing, Monticello, (2003)"},{"key":"9323_CR12","unstructured":"Ma, G., Xu, Y., Lin, M., Xuan, Y.: A Content Distribution System Based on Sparse Linear Network Coding. In: Third Workshop on Network Coding (Netcod 2007), (2007)"},{"key":"9323_CR13","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., Rodriguez, P.R.: Network Coding For Large Scale Content Distribution. In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 4, pp. 2235\u20132245, Mar. (2005)","DOI":"10.1109\/INFCOM.2005.1498511"},{"key":"9323_CR14","unstructured":"Gkantsidis, C., Miller, J., Rodriguez, P.: Anatomy of a P2P Content Distribution system with Network Coding. In: Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS 2006), (2006)"},{"key":"9323_CR15","doi-asserted-by":"crossref","unstructured":"Dah Ming, C., Yeung, R. W., Jiaqing, H., Bin, F.: Can Network Coding Help in P2P Networks?. In: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2006 4th International Symposium on, pp. 1\u20135, (2006)","DOI":"10.1109\/WIOPT.2006.1666439"},{"key":"9323_CR16","unstructured":"Wang, M. , Li, B.: How Practical is Network Coding?. In Quality of Service, 2006. IWQoS 2006. 14th IEEE International Workshop on, pp. 274-278, Jun. (2006)"},{"key":"9323_CR17","doi-asserted-by":"crossref","unstructured":"Jin, X., Gary Chan, S.-H.: Unstructured Peer-to-Peer Network Architectures. In: Handbook of Peer-to-Peer Networking, Springer, pp. 117\u2013142, (2010)","DOI":"10.1007\/978-0-387-09751-0_5"},{"key":"9323_CR18","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MSP.2007.904818","volume":"24","author":"PA Chou","year":"2007","unstructured":"Chou, P.A., Yunnan, W.: Network Coding for the Internet and Wireless Networks. Sig. Process. Mag. IEEE 24, 77\u201385 (2007)","journal-title":"Sig. Process. Mag. IEEE"},{"key":"9323_CR19","unstructured":"OverSim. http:\/\/www.oversim.org\/"},{"issue":"6","key":"9323_CR20","doi-asserted-by":"crossref","first-page":"2386","DOI":"10.1109\/TIT.2006.874434","volume":"52","author":"M Langberg","year":"2006","unstructured":"Langberg, M., Sprintson, A., Bruck, J.: The encoding complexity of network coding. IEEE Trans. Inf. Theory 52(6), 2386\u20132397 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9323_CR21","unstructured":"Lanberg, M., Sprintson, A.: Recent Results on the Algorithmic Complexity of Network Coding. In: Proceedings of the 5th Workshop on Network Coding, Theory, and Applications, (2009)"},{"issue":"1","key":"9323_CR22","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10922-005-9019-0","volume":"14","author":"G Kramer","year":"2006","unstructured":"Kramer, G., Savari, S.A.: Edge\u2014cut bounds on network coding rates. J. Netw. Syst. Manage. 14(1), 49\u201367 (2006)","journal-title":"J. Netw. Syst. Manage."},{"key":"9323_CR23","unstructured":"Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making Gnutella-Like p2p Systems Scalable. In: Proceedings of ACM SIGCOMM on Applications, technologies, architectures, and protocols for computer communications, New York, USA, (2003)"},{"key":"9323_CR24","doi-asserted-by":"crossref","unstructured":"Yao, Z., Leonard, D., Wang, X., Loguinov, D.: Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks. In: Network Protocols, 2006. ICNP \u201806. Proceedings of the 2006 14th IEEE International Conference on, pp. 32\u201341, Nov. (2006)","DOI":"10.1109\/ICNP.2006.320196"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-014-9323-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-014-9323-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-014-9323-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T19:45:15Z","timestamp":1565639115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-014-9323-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,15]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["9323"],"URL":"https:\/\/doi.org\/10.1007\/s10922-014-9323-7","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,15]]}}}