{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T12:13:38Z","timestamp":1648901618635},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T00:00:00Z","timestamp":1237248000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1007\/s12083-009-0034-x","type":"journal-article","created":{"date-parts":[[2009,3,16]],"date-time":"2009-03-16T14:31:05Z","timestamp":1237213865000},"page":"252-266","source":"Crossref","is-referenced-by-count":3,"title":["Mastering selfishness and heterogeneity in mobile P2P content distribution networks with multiple source download in cellular networks"],"prefix":"10.1007","volume":"2","author":[{"given":"Daniel","family":"Schlosser","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Ho\u00dffeld","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,17]]},"reference":[{"issue":"7","key":"34_CR1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.4304\/jcm.1.7.36-46","volume":"1","author":"M Per\u00e9nyi","year":"2006","unstructured":"Per\u00e9nyi M, Dang TD, Gefferth A, Moln\u00e1r S (2006) Identification and analysis of peer-to-peer traffic. J Commun 1(7):36\u201346","journal-title":"J Commun"},{"issue":"4","key":"34_CR2","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies. ACM Comput Surveys 36(4):335\u2013371","journal-title":"ACM Comput Surveys"},{"issue":"5","key":"34_CR3","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1096536.1096540","volume":"35","author":"A Al Hamra","year":"2005","unstructured":"Al Hamra A, Felber PA (2005) Design choices for content distribution in p2p networks. Comput Commun Rev 35(5):29\u201340","journal-title":"Comput Commun Rev"},{"issue":"1","key":"34_CR4","first-page":"3","volume":"1","author":"L Penserini","year":"2003","unstructured":"Penserini L, Liu L, Mylopoulos J, Panti M, Spalazzi L (2003) Cooperation strategies for agent-based p2p systems. Web Intelli Agent Syst 1(1):3\u201321","journal-title":"Web Intelli Agent Syst"},{"key":"34_CR5","unstructured":"Lai K, Feldman M, Stoica I, Chuang J (2003) Incentives for cooperation in peer-to-peer networks. In: Workshop on economics of peer-to-peer systems, Berkeley"},{"key":"34_CR6","volume-title":"5th ACM conference on electronic commerce","author":"M Feldman","year":"2004","unstructured":"Feldman M, Lai K, Stoica I, Chuang J (2004) Robust incentive techniques for peer-to-peer networks. In: 5th ACM conference on electronic commerce. ACM, New York"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Feldman M, Chuang J (2005) Overcoming free-riding behavior in peer-to-peer systems. ACM SIGecom Exchanges 5(4)","DOI":"10.1145\/1120717.1120723"},{"issue":"7","key":"34_CR8","first-page":"24","volume":"1","author":"W-C Liao","year":"2006","unstructured":"Liao W-C, Papadopoulos F, Psounis K (2006) A peer-to-peer cooperation enhancement scheme and its performance analysis. J Commun (JCM) 1(7):24\u201335","journal-title":"J Commun (JCM)"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Anagnostakis KG, Greenwald MB (2004) Exchange-based incentive mechanisms for peer-to-peer file sharing. In: 24th international conference on distributed computing systems, Tokyo","DOI":"10.1109\/ICDCS.2004.1281619"},{"key":"34_CR10","unstructured":"de\u00a0Veciana G, Yang X (2003) Fairness, incentives and performance in peer-to-peer networks. In: Forty-first annual Allerton conference on communication, control and computing, Monticello"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Hales D (2006) Emergent group level selection in a peer-to-peer network. ComPlexUs, 3","DOI":"10.1159\/000094193"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Le\u00a0Fessant F, Handurukande S, Kermarrec AM, Massoulie L (2004) Clustering in peer-to-peer file sharing workloads. In: 3rd international workshop on peer-to-peer systems (IPTPS), San Diego","DOI":"10.1007\/978-3-540-30183-7_21"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Garces-Erice L, Biersack EW, Felber PA, Ross KW, Urvoy-Keller G (2003) Hierarchical peer-to-peer systems. Parallel Process Lett 13(4)","DOI":"10.1142\/S0129626403001574"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Ng T, Chu Y, Rao S, Sripanidkulchai K, Zhang H (2003) Measurement-based optimization techniques for bandwidth-demanding peer-to-peer systems. In: 22nd annual joint conference of the IEEE computer and communications societies INFOCOM, San Francisco","DOI":"10.1109\/INFCOM.2003.1209240"},{"key":"34_CR15","volume-title":"Twenty-fifth annual ACM symposium on principles of distributed computing","author":"T Moscibroda","year":"2006","unstructured":"Moscibroda T, Schmid S, Wattenhofer R (2006) On the topologies formed by selfish peers. In: Twenty-fifth annual ACM symposium on principles of distributed computing. ACM, Denver"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Norros I, Prabhu B, Reittu H (2006) Flash crowd in a file sharing system based on random encounters. In: Workshop on interdisciplinary systems approach in performance evaluation and design of computer & communications sytems, Pisa","DOI":"10.1145\/1190326.1190330"},{"key":"34_CR17","volume-title":"International workshop on self-* properties in complex information systems","author":"P Felber","year":"2004","unstructured":"Felber P, Biersack EW (2004) Self-scaling networks for content distribution. In: International workshop on self-* properties in complex information systems. Springer, Berinoro"},{"key":"34_CR18","volume-title":"5th passive and active measurement workshop (PAM2004)","author":"K Tutschku","year":"2004","unstructured":"Tutschku K (2004) A measurement-based traffic profile of the edonkey filesharing service. In: 5th passive and active measurement workshop (PAM2004), Antibes Juan-les-Pins"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Legout A, Urvoy-Keller G, Michiardi P (2006) Rarest first and choke algorithms are enough. In: 6th ACM SIGCOMM on internet measurement, Rio de Janeiro","DOI":"10.1145\/1177080.1177106"},{"issue":"17","key":"34_CR20","doi-asserted-by":"crossref","first-page":"3485","DOI":"10.1016\/j.comnet.2006.02.001","volume":"50","author":"J Risson","year":"2006","unstructured":"Risson J, Moors T (2006) Survey of research towards robust peer-to-peer networks: search methods. Comput Netw 50(17):3485\u20133521","journal-title":"Comput Netw"},{"key":"34_CR21","unstructured":"Triantafillou P, Xiruhaki C, Koubarakis M, Ntarmos N (2003) Towards high performance peer-to-peer content and resource sharing systems. In: Conference on innovative data systems research (CIDR), Asilomar"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Michiardi P, Urovoy-Keller G (2007) Performance analysis of cooperative content distribution in wireless ad hoc networks. In: Fourth annual conference on wireless on demand network systems and services, Obergurgl","DOI":"10.1109\/WONS.2007.340468"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Oberender J, Andersen F-U, de\u00a0Meer H, Dedinski I, Ho\u00dffeld T, Kappler C, M\u00e4der A, Tutschku K (2005) Enabling mobile peer-to-peer networking. In: Mobile and wireless systems, LNCS 3427, Dagstuhl, January 2005","DOI":"10.1007\/978-3-540-31963-4_16"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Ho\u00dffeld T, Tutschku K, Andersen F-U, de\u00a0Meer H, Oberender J (2005) Simulative performance evaluation of a mobile peer-to-peer file-sharing system. In: NGI2005, Rome, April 2005","DOI":"10.1109\/NGI.2005.1431678"},{"key":"34_CR25","unstructured":"Ho\u00dffeld T, Tutschku K, Schlosser D (2005) Influence of the size of swapping entities in mobile p2p file-sharing networks. In: Peer-to-peer-systeme und -Anwendungen, GI\/ITG-Workshop in conjunction mit KiVS 2005, Kaiserslautern, March 2005"},{"key":"34_CR26","volume-title":"Qualit\u00e4t und Zuverl\u00e4ssigkeit technischer Systeme. Theorie, Praxis, Management","author":"A Birolini","year":"1991","unstructured":"Birolini A (1991) Qualit\u00e4t und Zuverl\u00e4ssigkeit technischer Systeme. Theorie, Praxis, Management. Springer, New York"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Schlosser D, Hossfeld T, Tutschku K (2006) Comparison of robust cooperation strategies for p2p content distribution networks with multiple source download. In: Sixth IEEE international conference on peer-to-peer computing, Cambridge, September 2006","DOI":"10.1109\/P2P.2006.9"},{"key":"34_CR28","unstructured":"Jain R, Chiu DM, Hawe W (1984) A quantitative measure of fairness and discrimination for resource allocation in shared systems. Technical Report DEC TR- 301, Digital Equipment Corporation"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-009-0034-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-009-0034-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-009-0034-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T03:44:46Z","timestamp":1559447086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-009-0034-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,17]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["34"],"URL":"https:\/\/doi.org\/10.1007\/s12083-009-0034-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3,17]]}}}