{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T22:40:15Z","timestamp":1741214415904,"version":"3.38.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,5,31]],"date-time":"2011-05-31T00:00:00Z","timestamp":1306800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s11036-011-0317-3","type":"journal-article","created":{"date-parts":[[2011,5,30]],"date-time":"2011-05-30T06:56:14Z","timestamp":1306738574000},"page":"378-394","source":"Crossref","is-referenced-by-count":7,"title":["Still Alive: Extending Keep-Alive Intervals in P2P Overlay Networks"],"prefix":"10.1007","volume":"17","author":[{"given":"Richard","family":"Price","sequence":"first","affiliation":[]},{"given":"Peter","family":"Ti\u0148o","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Theodoropoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,31]]},"reference":[{"key":"317_CR1","unstructured":"Gnutella (2010) Gnutella protocol development wiki [Online]. http:\/\/wiki.limewire.org\/index.php?title=GDF"},{"key":"317_CR2","unstructured":"Cohen B (2003) Incentives build robustness in BitTorrent. In: Workshop on economics of Peer-to-Peer systems, vol 6"},{"key":"317_CR3","doi-asserted-by":"crossref","unstructured":"Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H (2001) Chord: a scalable Peer-To-Peer lookup service for internet applications. In: Proceedings of the 2001 ACM SIGCOMM conference, pp 149\u2013160. [Online]. Available: citeseer.ist.psu.edu\/stoica01chord.html","DOI":"10.1145\/964723.383071"},{"key":"317_CR4","first-page":"329","volume-title":"Proc. of the IFIP\/ACM int. conf. on distributed systems platforms","author":"AIT Rowstron","year":"2001","unstructured":"Rowstron AIT, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale Peer-to-Peer systems. In: Proc. of the IFIP\/ACM int. conf. on distributed systems platforms. Springer, Heidelberg, pp 329\u2013350"},{"key":"317_CR5","first-page":"10","volume-title":"ATEC \u201904: Proceedings of the annual conference on USENIX annual technical conference","author":"S Rhea","year":"2004","unstructured":"Rhea S, Geels D, Roscoe T, Kubiatowicz J (2004) Handling churn in a dht. In: ATEC \u201904: Proceedings of the annual conference on USENIX annual technical conference. USENIX Association, Berkeley, p 10"},{"key":"317_CR6","first-page":"344","volume-title":"Proceedings of the 3st international symposium on cluster computing and the grid","author":"L Alima","year":"2003","unstructured":"Alima L, El-Ansary S, Brand P, Haridi S (2003) DKS (N, k, f): a family of low communication, scalable and fault-tolerant infrastructures for P2P applications. In: Proceedings of the 3st international symposium on cluster computing and the grid. IEEE Computer Society, Washington, DC, p 344"},{"key":"317_CR7","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1109\/PDP.2008.18","volume-title":"Proceedings of the 16th Euromicro conference on parallel, distributed and network-based processing (PDP 2008)","author":"S Krishnamurthy","year":"2008","unstructured":"Krishnamurthy S, El-Ansary S, Aurell E, Haridi S (2008) Comparing maintenance strategies for overlays. In: Proceedings of the 16th Euromicro conference on parallel, distributed and network-based processing (PDP 2008). IEEE Computer Society, Washington, DC, pp 473\u2013482"},{"key":"317_CR8","doi-asserted-by":"crossref","unstructured":"Ghinita G, Teo YM (2006) An adaptive stabilization framework for distributed hash tables, p 10","DOI":"10.1109\/IPDPS.2006.1639269"},{"key":"317_CR9","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/DSN.2004.1311872","volume-title":"DSN \u201904: Proceedings of the 2004 international conference on dependable systems and networks","author":"M Castro","year":"2004","unstructured":"Castro M, Costa M, Rowstron A (2004) Performance and dependability of structured Peer-to-Peer overlays. In: DSN \u201904: Proceedings of the 2004 international conference on dependable systems and networks. IEEE Computer Society, Washington, DC, p 9"},{"key":"317_CR10","doi-asserted-by":"crossref","unstructured":"Zhuang S, Geels D, Stoica I, Katz R (2005) On failure detection algorithms in overlay networks. In: Proceedings IEEE INFOCOM 2005. 24th annual joint conference of the IEEE Computer and Communications Societies, vol 3","DOI":"10.1109\/INFCOM.2005.1498487"},{"key":"317_CR11","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/P2P.2007.26","volume-title":"P2P \u201907: Proceedings of the seventh IEEE international conference on Peer-to-Peer computing","author":"I Dedinski","year":"2007","unstructured":"Dedinski I, Hofmann A, Sick B (2007) Cooperative keep-alives: an efficient outage detection algorithm for P2P overlay networks. In: P2P \u201907: Proceedings of the seventh IEEE international conference on Peer-to-Peer computing. IEEE Computer Society, Washington, DC, pp 140\u2013150"},{"key":"317_CR12","first-page":"99","volume-title":"NSDI\u201905: Proceedings of the 2nd conference on symposium on networked systems design & implementation","author":"J Li","year":"2005","unstructured":"Li J, Stribling J, Morris R, Kaashoek MF (2005) Bandwidth-efficient management of dht routing tables. In: NSDI\u201905: Proceedings of the 2nd conference on symposium on networked systems design & implementation. USENIX Association, Berkeley, pp 99\u2013114"},{"issue":"3","key":"317_CR13","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1272998.1273008","volume":"41","author":"KCW So","year":"2007","unstructured":"So KCW, Sirer EG (2007) Latency and bandwidth-minimizing failure detectors. SIGOPS Oper Syst Rev 41(3):89\u201399","journal-title":"SIGOPS Oper Syst Rev"},{"key":"317_CR14","doi-asserted-by":"crossref","unstructured":"Stutzbach D, Rejaie R (2006) Understanding churn in Peer-to-Peer networks. In: IMC \u201906: Proceedings of the 6th ACM SIGCOMM on Internet measurement. ACM, New York, pp 189\u2013202. [Online]. Available: http:\/\/portal.acm.org\/citation.cfm?id=1177105","DOI":"10.1145\/1177080.1177105"},{"issue":"5","key":"317_CR15","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1109\/TNET.2008.2009053","volume":"17","author":"M Steiner","year":"2009","unstructured":"Steiner M, En-Najjary T, Biersack EW (2009) Long term study of peer behavior in the kad dht. IEEE\/ACM Trans Netw 17(5):1371\u20131384","journal-title":"IEEE\/ACM Trans Netw"},{"key":"317_CR16","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/1-4020-2258-1_16","volume-title":"Web content caching and distribution: proceedings of the 8th international workshop","author":"FE Bustamante","year":"2004","unstructured":"Bustamante FE, Qiao Y (2004) Friendships that last: peer lifespan and its role in P2P protocols. In: Web content caching and distribution: proceedings of the 8th international workshop. Kluwer, Norwell, pp 233\u2013246"},{"key":"317_CR17","doi-asserted-by":"crossref","unstructured":"Stutzbach D, Rejaie R, Sen S (2005) Characterizing unstructured overlay topologies in modern P2P file-sharing systems. In: Proc. of Internet measurement conference (IMC). [Online]. Available: https:\/\/db.usenix.org\/events\/imc05\/tech\/stutzbach.html","DOI":"10.1145\/1330107.1330114"},{"issue":"1","key":"317_CR18","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/BF02480287","volume":"31","author":"R Shimizu","year":"1979","unstructured":"Shimizu R (1979) On a lack of memory property of the exponential distribution. Ann Inst Stat Math 31(1):309\u2013313","journal-title":"Ann Inst Stat Math"},{"issue":"2","key":"317_CR19","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/s00530-003-0088-1","volume":"9","author":"S Saroiu","year":"2003","unstructured":"Saroiu S, Gummadi KP, Gribble SD (2003) Measuring and analyzing the characteristics of napster and gnutella hosts. Multimedia Syst 9(2):170\u2013184","journal-title":"Multimedia Syst"},{"key":"317_CR20","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1064212.1064217","volume-title":"SIGMETRICS \u201905: Proceedings of the 2005 ACM SIGMETRICS international conference on measurement and modeling of computer systems","author":"D Leonard","year":"2005","unstructured":"Leonard D, Rai V, Loguinov D (2005) On lifetime-based node failure and stochastic resilience of decentralized Peer-to-Peer networks. In: SIGMETRICS \u201905: Proceedings of the 2005 ACM SIGMETRICS international conference on measurement and modeling of computer systems. ACM, New York, pp 26\u201337"},{"key":"317_CR21","unstructured":"Izal M (2010) Bittorrent traces and tools. World Wide Web, http:\/\/mikel.tlm.unavarra.es\/~mikel\/bt_pam2004\/"},{"key":"317_CR22","doi-asserted-by":"crossref","unstructured":"Izal M, Urvoy-Keller G, Biersack EW, Felber P, Al Hamra A, Garc\u00e9s-Erice L (2004) Dissecting bittorrent: five months in a torrent\u2019s lifetime. In: Barakat C, Pratt I (eds) Passive and active network measurement, ser. Lecture notes in computer science, vol 3015. Springer, Berlin, pp 1\u201311. [Online]. Available: http:\/\/citeseer.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.5.7345","DOI":"10.1007\/978-3-540-24668-8_1"},{"key":"317_CR23","doi-asserted-by":"crossref","unstructured":"Saroiu S, Gummadi P, Gribble S (2002) A measurement study of Peer-to-Peer file sharing systems. [Online]. Available: http:\/\/citeseer.ist.psu.edu\/saroiu02measurement.html","DOI":"10.1117\/12.449977"},{"key":"317_CR24","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1145\/945445.945475","volume-title":"SOSP \u201903: Proceedings of the nineteenth ACM symposium on operating systems principles","author":"KP Gummadi","year":"2003","unstructured":"Gummadi KP, Dunn RJ, Saroiu S, Gribble SD, Levy HM, Zahorjan J (2003) Measurement, modeling, and analysis of a Peer-to-Peer file-sharing workload. In: SOSP \u201903: Proceedings of the nineteenth ACM symposium on operating systems principles. ACM, New York, pp 314\u2013329"},{"key":"317_CR25","doi-asserted-by":"crossref","unstructured":"Mahajan R, Castro M, Rowstron A (2003) Controlling the cost of reliability in Peer-to-Peer overlays. In: IPTPS","DOI":"10.1007\/978-3-540-45172-3_2"},{"key":"317_CR26","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TC.2002.1004595","volume":"51","author":"W Chen","year":"2000","unstructured":"Chen W, Toueg S, Aguilera MK (2000) On the quality of service of failure detectors. IEEE Trans Comput 51:561\u2013580","journal-title":"IEEE Trans Comput"},{"key":"317_CR27","unstructured":"Li J, Stribling J, Morris R, Kaashoek MF, Gil TM (2005) A performance vs. cost framework for evaluating DHT design tradeoffs under churn. In: Proc. of the 24th Infocom"},{"issue":"3","key":"317_CR28","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1109\/TNET.2007.903986","volume":"16","author":"FE Bustamante","year":"2008","unstructured":"Bustamante FE, QiaoY (2008) Designing less-structured P2P systems for the expected high churn. IEEE\/ACM Trans Netw 16(3):617\u2013627","journal-title":"IEEE\/ACM Trans Netw"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-011-0317-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-011-0317-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-011-0317-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T22:07:48Z","timestamp":1741212468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-011-0317-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,31]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["317"],"URL":"https:\/\/doi.org\/10.1007\/s11036-011-0317-3","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2011,5,31]]}}}