{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T18:38:26Z","timestamp":1649097506458},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,9,13]],"date-time":"2012-09-13T00:00:00Z","timestamp":1347494400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s12083-012-0168-0","type":"journal-article","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T03:20:29Z","timestamp":1347420029000},"page":"459-468","source":"Crossref","is-referenced-by-count":0,"title":["On the collaboration of different peer-to-peer traffic management schemas"],"prefix":"10.1007","volume":"7","author":[{"given":"Xin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Haiyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,13]]},"reference":[{"key":"168_CR1","unstructured":"CacheLogic. Available: http:\/\/www.cachelogic.com\/"},{"key":"168_CR2","doi-asserted-by":"crossref","unstructured":"Karagiannis T, Rodriguez P, Papagiannaki K (2005) Should internet service providers fear peerassisted content distribution? In: SIGCOMM 2005","DOI":"10.1145\/1330107.1330115"},{"key":"168_CR3","doi-asserted-by":"crossref","unstructured":"Saleh O, Hefeeda M (2006) Modeling and caching of peer-to-peer traffic. In: ICNP 2006","DOI":"10.1109\/ICNP.2006.320218"},{"key":"168_CR4","doi-asserted-by":"crossref","unstructured":"Wang L, Pai V, Peterson L (2002) The effectiveness of request redirection on cdn robustness. In: OSDI 2002","DOI":"10.1145\/1060289.1060321"},{"key":"168_CR5","doi-asserted-by":"crossref","unstructured":"Clarke EH (1971) Multipart pricing in public goods. In: PublicChoice 1971","DOI":"10.1007\/BF01726210"},{"key":"168_CR6","doi-asserted-by":"crossref","unstructured":"Qiu D, Srikant R (2004) Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In: Proc. ACM SIGCOMM 2004","DOI":"10.1145\/1015467.1015508"},{"key":"168_CR7","doi-asserted-by":"crossref","unstructured":"Karagiannis T, Rodriguez P, Papagiannaki K (2005) Should internet service providers fear peer-assisted content Distribution? In: Proc. ACM\/USENIX IMC 2005","DOI":"10.1145\/1330107.1330115"},{"key":"168_CR8","unstructured":"Blond SL, Legout A, Dabbous W (2008) Pushing BitTorrent locality to the limit. INRIA Technical Report 2008"},{"issue":"7","key":"168_CR9","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1016\/j.comnet.2009.11.013","volume":"54","author":"K Xu","year":"2010","unstructured":"Xu K, Zhang M, Liu J, Qin Z, Ye M (2010) Proxy caching for peer-to-peer live streaming. Comput Networks 54(7):1229\u20131241","journal-title":"Comput Networks"},{"key":"168_CR10","doi-asserted-by":"crossref","unstructured":"Xie H, Yang RY, Krishnamurthy A, Liu YG, Silberschatz A (2008) P4p: provider portal for applications. In: Proc. ACM SIGCOMM 2008","DOI":"10.1145\/1402958.1402999"},{"key":"168_CR11","doi-asserted-by":"crossref","unstructured":"Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. In: Proc. ACM SIGCOMM 2008","DOI":"10.1145\/1402958.1403000"},{"key":"168_CR12","doi-asserted-by":"crossref","unstructured":"Bindal R, Cao P, Chan W, Medved J, Suwala G, Bates T, Zhang A (2006) Improving traffic locality in BitTorrent via biased neighbor selection. In: Proc. IEEE ICDCS 2006","DOI":"10.1109\/ICDCS.2006.48"},{"key":"168_CR13","unstructured":"Dhungel P, Wu D, Liu Z, Ross K (2010) BitTorrent darknets. In: Proc. IEEE INFOCOM 2010"},{"key":"168_CR14","doi-asserted-by":"crossref","unstructured":"Otto JS, Sanchez MA, Choffnes DR, Bustamante FE, Siganos G (2011) On blind mice and the elephant: understanding the network impact of a large distributed system. In: Proc. ACM SIGCOMM 2011","DOI":"10.1145\/2018436.2018450"},{"key":"168_CR15","unstructured":"Piatek M, Madhyastha HV, John JP, Krishnamurth A, Anderson T (2009) Pitfalls for ISP-friendly P2P design. In: Proc. ACM HOTNETS 2009"},{"key":"168_CR16","doi-asserted-by":"crossref","unstructured":"Cuevas R, Laoutaris N, Yang X, Siganos G, Rodriguez P (2011) Deep diving into BitTorrent locality. In: Proc. IEEE INFOCOM 2011","DOI":"10.1109\/INFCOM.2011.5935324"},{"key":"168_CR17","doi-asserted-by":"crossref","unstructured":"Leibowitz N, Ripeanu M, Wierzbicki A (2003) Deconstructing the kazaa network. In: 3rd IEEE workshop on Internet applications 2003","DOI":"10.1109\/WIAPP.2003.1210295"},{"key":"168_CR18","doi-asserted-by":"crossref","unstructured":"Wierzbicki A, Leibowitz N, Ripeanu M, Wozniak R (2004) Cache replacement policies revisited: the case of P2P traffic. In: International workshop on global and peer-to-peer computing 2004","DOI":"10.1109\/CCGrid.2004.1336565"},{"key":"168_CR19","unstructured":"Gummadi K, Dunn R, Saroiu S, Gribble S, Levy H, Zahorjan J (2003) Measurement, modelingand analysis of a peer-to-peer file-sharing workload. In: ACM symposium on operating systems principles 2003"},{"issue":"3","key":"168_CR20","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/TPDS.2010.95","volume":"22","author":"K Xu","year":"2010","unstructured":"Xu K, Liu H, Liu J, Zhang J (2010) LBMP: a logarithm-barrier-based multipath protocol for internet traffic management. IEEE Trans Parallel Distrib Syst 22(3):476\u2013488","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"168_CR21","doi-asserted-by":"crossref","unstructured":"Hamada T, Chujo K, Chujo T, Yang X (2004) Peer-to-peer traffic in metro networks: analysis, modeling and policies. In: NOMS 2004","DOI":"10.1109\/NOMS.2004.1317683"},{"key":"168_CR22","doi-asserted-by":"crossref","unstructured":"Karagiannis T, Rodriguez P, Papagiannaki D (2005) Should internet service providers fear peer-assisted content distribution? In: IMC 2005","DOI":"10.1145\/1330107.1330115"},{"key":"168_CR23","unstructured":"Keralapura R, Taft N, Chuah CN, Iannaconne G (2004) Cans take the heat from overlay networks? In: ACM HotNets 2004"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-012-0168-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-012-0168-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-012-0168-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T19:06:19Z","timestamp":1562180779000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-012-0168-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,13]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["168"],"URL":"https:\/\/doi.org\/10.1007\/s12083-012-0168-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,13]]}}}