{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:59:34Z","timestamp":1760061574447},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T00:00:00Z","timestamp":1294358400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s12083-010-0098-7","type":"journal-article","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T06:57:43Z","timestamp":1294297063000},"page":"410-419","source":"Crossref","is-referenced-by-count":7,"title":["A study on key strategies in P2P file sharing systems and ISPs\u2019 P2P traffic management"],"prefix":"10.1007","volume":"4","author":[{"given":"Jessie Hui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chungang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiahai","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Changqing","family":"An","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,7]]},"reference":[{"key":"98_CR1","unstructured":"Kulbak Y, Bickson D (2005) The emule protocol specification. Tech. Rep., http:\/\/www.cs.huji.ac.il\/labs\/danss\/presentations\/emule.pdf"},{"issue":"15","key":"98_CR2","doi-asserted-by":"crossref","first-page":"2961","DOI":"10.1016\/j.comnet.2008.06.014","volume":"52","author":"JH Wang","year":"2008","unstructured":"Wang JH, Chiu DM, Lui JC (2008) A game-theoretic analysis of the implications of overlay network traffic on isp peering. Comput Networks 52(15):2961\u20132974","journal-title":"Comput Networks"},{"key":"98_CR3","volume-title":"GLOBECOM 2004","author":"T Karagiannis","year":"2004","unstructured":"Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M (2004) Is p2p dying or just hiding? In: GLOBECOM 2004. Dallas, Texas, USA, IEEE Computer Society Press"},{"issue":"4","key":"98_CR4","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies. ACM Comput Surv 36(4):335\u2013371","journal-title":"ACM Comput Surv"},{"key":"98_CR5","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","volume":"7","author":"EK Lua","year":"2005","unstructured":"Lua EK, Crowcroft J, Pias M, Sharma R, Lim S (2005) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7:72\u201393","journal-title":"IEEE Commun Surv Tutor"},{"key":"98_CR6","unstructured":"Marciniak P, Liogkas N, Legout A, Kohler E (2008) Small is not always beautiful. In: IPTPS\u201908, the 7th international workshop on peer-to-peer systems, Tampa Bay, Florida, USA"},{"key":"98_CR7","doi-asserted-by":"crossref","unstructured":"Legout A, Urvoy-Keller G, Michiardi P (2006) Rarest first and choke algorithms are enough. In: IMC\u20192006, ACM SIGCOMM\/USENIX conference, Rio de Janeiro, Brazil","DOI":"10.1145\/1177080.1177106"},{"key":"98_CR8","doi-asserted-by":"crossref","unstructured":"Huang Y, Fu TZJ, Chiu D-M, Lui JCS, Huang C (2008) Challenges, design and analysis of a large-scale p2p-vod system. In: SIGCOMM \u201908: proceedings of the ACM SIGCOMM 2008 conference on data communication, Seattle, WA, USA, pp 375\u2013388","DOI":"10.1145\/1402958.1403001"},{"key":"98_CR9","doi-asserted-by":"crossref","unstructured":"Zhou Y, Ming Chiu D, Lui JCS (2007) A Simple Model for Analyzing P2P Streaming Protocols. IEEE International Conference on Network Protocols, 2007. ICNP 2007. pp 226\u2013235. doi: 10.1109\/ICNP.2007.4375853","DOI":"10.1109\/ICNP.2007.4375853"},{"key":"98_CR10","doi-asserted-by":"crossref","unstructured":"Vlavianos A, Iliofotou M, Faloutsos M (2006) Bitos: enhancing bittorrent for supporting streaming applications. In: IEEE global internet, pp 1\u20136","DOI":"10.1109\/INFOCOM.2006.43"},{"key":"98_CR11","doi-asserted-by":"crossref","unstructured":"Zhao B, Lui J, Chiu D-M (2009) Exploring the optimal chunk selection policy for data-driven p2p streaming systems. In: IEEE ninth international conference on peer-to-peer computing, 2009. P2P \u201909, pp 271\u2013280","DOI":"10.1109\/P2P.2009.5284548"},{"key":"98_CR12","doi-asserted-by":"crossref","unstructured":"Bharambe AR, Herley C, Padmanabhan VN (2006) Analyzing and improving a bittorrent network\u2019s performance mechanisms. In: IEEE Infocom 2006, Barcelona, Spain","DOI":"10.1109\/INFOCOM.2006.328"},{"key":"98_CR13","unstructured":"Kostic D, Braud R, Killian CE, Vandekieft E, Anderson JW, Snoeren AC, Vahdat A (2005) Maintaining high bandwidth under dynamic network conditions. In: ATEC \u201905: proceedings of the annual conference on USENIX annual technical conference"},{"key":"98_CR14","unstructured":"Gkantsidis C, Rodriguez P (2005) Network coding for large scale content distribution. In: IEEE infocom 2005, Miami, USA"},{"key":"98_CR15","doi-asserted-by":"crossref","unstructured":"Jun S, Ahamad M (2005) Incentives in bittorrent induce free riding. In: P2PECON \u201905: proceedings of the 2005 ACM sigcomm workshop on economics of peer-to-peer systems, pp 116\u2013121","DOI":"10.1145\/1080192.1080199"},{"key":"98_CR16","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1145\/1658939.1658955","volume-title":"CoNEXT \u201909: proceedings of the 5th international conference on emerging networking experiments and technologies","author":"A Sherman","year":"2009","unstructured":"Sherman A, Nieh J, Stein C (2009) Fairtorrent: bringing fairness to peer-to-peer systems. In: CoNEXT \u201909: proceedings of the 5th international conference on emerging networking experiments and technologies. New York, NY, USA: ACM, pp 133\u2013144"},{"issue":"1","key":"98_CR17","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/JSAC.2007.070115","volume":"25","author":"JS Chan","year":"2007","unstructured":"Chan JS, Li VO, Lui K-S (2007) Performance comparison of scheduling algorithms for peer-to-peer collaborative file distribution. IEEE J Sel Areas Commun 25(1):146\u2013154","journal-title":"IEEE J Sel Areas Commun"},{"key":"98_CR18","unstructured":"Halme A (2005) Peer-to-peer traffic: impact on isps and evaluation of traffic management tools. In: HUT T-110.551 seminar on internetworking"},{"key":"98_CR19","doi-asserted-by":"crossref","unstructured":"Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for qos: a statistical signature-based approach to ip traffic classification. In: IMC 04: proceedings of the 4th ACM SIGCOMM conference on internet measurement. New York, USA, pp 135\u2013148","DOI":"10.1145\/1028788.1028805"},{"key":"98_CR20","doi-asserted-by":"crossref","unstructured":"Constantinou F, Mavrommatis P (2006) Identifying known and unknown peer-to-peer traffic. In: IEEE international symposium on network computing and applications, pp 93\u2013102","DOI":"10.1109\/NCA.2006.34"},{"issue":"1","key":"98_CR21","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M Crotti","year":"2007","unstructured":"Crotti M, Dusi M, Gringoli F, Salgarelli L (2007) Traffic classification through simple statistical fingerprinting. Comput Commun Rev 37(1):5\u201316","journal-title":"Comput Commun Rev"},{"key":"98_CR22","doi-asserted-by":"crossref","unstructured":"Suh K, Figueiredo DR, Kurose J, Towsley D (2006) Characterizing and detecting skype-relayed traffic. In: INFOCOM 2006. 25th IEEE international conference on computer communications, Barcelona, Spain, pp 1\u201312","DOI":"10.1109\/INFOCOM.2006.313"},{"key":"98_CR23","doi-asserted-by":"crossref","unstructured":"Moore AW, Zuev D (2005) Internet traffic classification using bayesian analysis techniques. In: ACM SIGMETRICS 2005, Banff, Alberta, Canada","DOI":"10.1145\/1064212.1064220"},{"key":"98_CR24","doi-asserted-by":"crossref","unstructured":"Couto A, Nogueira A, Salvador P, Valadas R (2008) Identification of peer-to-peer applications\u2019 flow patterns. In: Next generation internet networks, NGI 2008, pp 292\u2013299","DOI":"10.1109\/NGI.2008.46"},{"key":"98_CR25","unstructured":"Subhabrata S, Oliver S, Wang D (2004) Accurate, scalable in-network identification of p2p traffic using application signatures. In: WWW \u201904: proceedings of the 13th international conference on world wide web, pp 512\u2013521"},{"key":"98_CR26","doi-asserted-by":"crossref","unstructured":"Dischinger M, Mislove A, Haeberlen A, Gummadi KP (2008) Detecting bittorrent blocking. In: Proceedings of the 8th ACM SIGCOMM conference on internet measurement (IMC\u201908), Vouliagmeni, Greece","DOI":"10.1145\/1452520.1452523"},{"key":"98_CR27","doi-asserted-by":"crossref","unstructured":"Wierzbicki A, Leibowitz N, Ripeanu M, Wozniak R (2004) Cache replacement policies revisited: the case of p2p traffic. Los Alamitos, CA, USA, pp 182\u2013189","DOI":"10.1109\/CCGrid.2004.1336565"},{"key":"98_CR28","unstructured":"Leibowitz N, Bergman A, Ben-Shaul R, Shavit A (2002) Are file swapping networks cacheable? Characterizing p2p traffic. In: The 7th international workshop on web content caching and distribution (WCW\u201902), Boulder, CO, USA"},{"key":"98_CR29","unstructured":"Huang N-F, Chu Y-M, Tsai C-H, Huang W-Z, Tzeng W-J (2009) A resource-efficient traffic localization scheme for multiple bittorrents. In: IEEE international conference on communications, 2009. ICC \u201909, pp 1\u20135"},{"key":"98_CR30","doi-asserted-by":"crossref","unstructured":"Saleh O, Hefeeda M (2006) Modeling and caching of peer-to-peer traffic. In: IEEE international conference on network protocols, pp 249\u2013258","DOI":"10.1109\/ICNP.2006.320218"},{"key":"98_CR31","doi-asserted-by":"crossref","unstructured":"Ye M, Wu J, Xu K (2008) Caching the p2p traffic in isp network. In: IEEE international conference on communications, 2008, ICC \u201908, pp 5876\u20135880","DOI":"10.1109\/ICC.2008.1098"},{"key":"98_CR32","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1109\/PTP.2004.1334941","volume-title":"P2P \u201904: proceedings of the fourth international conference on peer-to-peer computing","author":"A Tagami","year":"2004","unstructured":"Tagami A, Hasegawa T, Hasegawa T (2004) Analysis and application of passive peer influence on peer-to-peer inter-domain traffic. In: P2P \u201904: proceedings of the fourth international conference on peer-to-peer computing. Washington, DC, USA: IEEE Computer Society, pp 142\u2013150"},{"key":"98_CR33","first-page":"97","volume-title":"ICQT \u201909: proceedings of the 6th international workshop on internet charging and Qos technologies","author":"I Papafili","year":"2009","unstructured":"Papafili I, Soursos S, Stamoulis GD (2009) Improvement of bittorrent performance and inter-domain traffic by inserting isp-owned peers. In: ICQT \u201909: proceedings of the 6th international workshop on internet charging and Qos technologies. Berlin, Heidelberg: Springer-Verlag, pp 97\u2013108"},{"issue":"5","key":"98_CR34","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1145\/1165389.945475","volume":"37","author":"KP Gummadi","year":"2003","unstructured":"Gummadi KP, Dunn RJ, Saroiu S, Gribble SD, Levy HM, Zahorjan J (2003) Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. SIGOPS Oper Syst Rev 37(5):314\u2013329","journal-title":"SIGOPS Oper Syst Rev"},{"key":"98_CR35","unstructured":"Hamada T, Chujo K, Chujo T, Yang X (2004) Peer-to-peer traffic in metro networks: analysis, modeling, and policies. In: Network operations and management symposium, NOMS 2004. IEEE\/IFIP, vol 1, pp 425\u2013438"},{"key":"98_CR36","doi-asserted-by":"crossref","unstructured":"Karagiannis T, Rodriguez P, Papagiannaki K (2005) Should internet service providers fear peer-assisted content distribution? In: IMC\u201905: proceedings of the 5th ACM SIGCOMM conference on internet measurement, pp 63\u201376","DOI":"10.1145\/1330107.1330115"},{"key":"98_CR37","doi-asserted-by":"crossref","unstructured":"Bindal R, Cao P, Chan W, Medved J, Suwala G, Bates T, Zhang A (2006) Improving traffic locality in bittorrent via biased neighbor selection. In: 26th IEEE international conference on distributed computing systems, ICDCS 2006, p 66","DOI":"10.1109\/ICDCS.2006.48"},{"key":"98_CR38","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1452520.1452524","volume-title":"IMC \u201908: proceedings of the 8th ACM SIGCOMM conference on internet measurement","author":"V Vishnumurthy","year":"2008","unstructured":"Vishnumurthy V, Francis P (2008) On the difficulty of finding the nearest peer in p2p systems. In: IMC \u201908: proceedings of the 8th ACM SIGCOMM conference on internet measurement. New York, NY, USA: ACM, pp 9\u201314"},{"key":"98_CR39","doi-asserted-by":"crossref","unstructured":"Li W, Chen S, Yu T (2008) Utaps: an underlying topology-aware peer selection algorithm in bittorrent. In: International conference on advanced information networking and applications, pp 539\u2013545","DOI":"10.1109\/AINA.2008.92"},{"issue":"4","key":"98_CR40","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1145\/1402946.1403000","volume":"38","author":"DR Choffnes","year":"2008","unstructured":"Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. SIGCOMM Comput Commun Rev 38(4):363\u2013374","journal-title":"SIGCOMM Comput Commun Rev"},{"issue":"3","key":"98_CR41","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1273445.1273449","volume":"37","author":"V Aggarwal","year":"2007","unstructured":"Aggarwal V, Feldmann A, Scheideler C (2007) Can isps and p2p users cooperate for improved performance? SIGCOMM Comput Commun Rev 37(3):29\u201340","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"98_CR42","doi-asserted-by":"crossref","unstructured":"Xie H, Yang YR, Krishnamurthy A, Liu Y, Silberschatz A (2008) P4P: provider portal for applications. In: Proceedings of ACM SIGCOMM, Seattle, WA","DOI":"10.1145\/1402958.1402999"},{"key":"98_CR43","doi-asserted-by":"crossref","unstructured":"Oechsner S, Lehrieder F, Hossfeld T, Metzger F, Staehle D, Pussep K (2009) Pushing the performance of biased neighbor selection through biased unchoking. In: IEEE ninth international conference on peer-to-peer computing, 2009. P2P \u201909, pp 301\u2013310","DOI":"10.1109\/P2P.2009.5284527"},{"key":"98_CR44","doi-asserted-by":"crossref","unstructured":"Seedorf J, Kiesel S, Stiemerling M (2009) Traffic localization for p2p-applications: the alto approach. In: IEEE ninth international conference on peer-to-peer computing, 2009, P2P \u201909, pp 171\u2013177","DOI":"10.1109\/P2P.2009.5284511"},{"issue":"8","key":"98_CR45","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1109\/MCOM.2009.5181900","volume":"47","author":"V Gurbani","year":"2009","unstructured":"Gurbani V, Hilt V, Rimac I, Tomsu M, Marocco E (2009) A survey of research on the application-layer traffic optimization problem and the need for layer cooperation. IEEE Commun Mag 47(8):107\u2013112","journal-title":"IEEE Commun Mag"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0098-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-010-0098-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0098-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T16:32:59Z","timestamp":1559925179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-010-0098-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,7]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["98"],"URL":"https:\/\/doi.org\/10.1007\/s12083-010-0098-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,7]]}}}