{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:02:17Z","timestamp":1746244937259,"version":"3.40.4"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,3,21]],"date-time":"2014-03-21T00:00:00Z","timestamp":1395360000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s12083-014-0259-1","type":"journal-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T06:07:32Z","timestamp":1395295652000},"page":"384-398","source":"Crossref","is-referenced-by-count":2,"title":["Efficient model sharing for scalable collaborative classification"],"prefix":"10.1007","volume":"8","author":[{"given":"Odysseas","family":"Papapetrou","sequence":"first","affiliation":[]},{"given":"Wolf","family":"Siberski","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Siersdorfer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"259_CR1","first-page":"143","volume":"3","author":"LA Adamic","year":"2002","unstructured":"Adamic LA, Huberman BA (2002) Zipf\u2019s law and the internet. Glottometrics 3:143\u2013150","journal-title":"Glottometrics"},{"key":"259_CR2","first-page":"113","volume":"1","author":"EL Allwein","year":"2001","unstructured":"Allwein EL, Schapire RE, Singer Y (2001) Reducing multiclass to binary: a unifying approach for margin classifiers. J Mach Learn Res 1:113\u2013141","journal-title":"J Mach Learn Res"},{"key":"259_CR3","doi-asserted-by":"crossref","unstructured":"Ang HH, Gopalkrishnan V, Hoi SCH, Ng WK (2008) Cascade RSVM in peer-to-peer networks. In: ECML\/PKDD, pp 55\u201370","DOI":"10.1007\/978-3-540-87479-9_22"},{"key":"259_CR4","doi-asserted-by":"crossref","unstructured":"Ang HH, Gopalkrishnan V, Hoi SCH, Ng WK (2010) Adaptive ensemble classification in p2p networks. In: DASFAA, pp 34\u201348","DOI":"10.1007\/978-3-642-12026-8_5"},{"key":"259_CR5","doi-asserted-by":"crossref","unstructured":"Ang HH, Gopalkrishnan V, Ng WK, Hoi SCH (2009) Communication-efficient classification in P2P networks. In: ECML\/PKDD, pp 83\u201398","DOI":"10.1007\/978-3-642-04180-8_23"},{"key":"259_CR6","unstructured":"Attenberg J, Weinberger K, Dasgupta A, Langford J, Smola A, Zinkevich M (2009) Collaborative email-spam filtering with consistently bad labels using feature hashing. In: CEAS"},{"issue":"2","key":"259_CR7","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.jcss.2012.05.011","volume":"79","author":"R Baraglia","year":"2013","unstructured":"Baraglia R, Dazzi P, Mordacchini M, Ricci L (2013) A peer-to-peer recommender system for self-emerging user communities based on gossip overlays. J Comput Syst Sci 79(2):291\u2013308","journal-title":"J Comput Syst Sci"},{"key":"259_CR8","doi-asserted-by":"crossref","unstructured":"Baraglia R, Dazzi P, Mordacchini M, Ricci L, Alessi L (2011) Group: a gossip based building community protocol. In: NEW2AN, pp 496\u2013507","DOI":"10.1007\/978-3-642-22875-9_45"},{"key":"259_CR9","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1145\/564376.564413","volume-title":"In: SIGIR","author":"PN Bennett","year":"2002","unstructured":"Bennett PN, Dumais ST, Horvitz E (2002) Probabilistic combination of text classifiers using reliability indicators: models and results. In: SIGIR. ACM, New York, pp 207\u2013214"},{"issue":"2","key":"259_CR10","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24(2):123\u2013140","journal-title":"Mach Learn"},{"issue":"2","key":"259_CR11","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C Burges","year":"1998","unstructured":"Burges C (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Discov 2(2):121\u2013167","journal-title":"Data Min Knowl Discov"},{"key":"259_CR12","doi-asserted-by":"crossref","unstructured":"Caragea D, Silvescu A, Honavar V (2001) Analysis and synthesis of agents that learn from distributed dynamic data sources.In: Emergent neural computational architectures based on neuroscience, pp 547\u2013559","DOI":"10.1007\/3-540-44597-8_39"},{"key":"259_CR13","unstructured":"Castro M, Costa M, Rowstron A (2005) Debunking some myths about structured and unstructured overlays. In: NSDI"},{"key":"259_CR14","doi-asserted-by":"crossref","unstructured":"Chen L, Wright P, Nejdl W (2009) Improving music genre classification using collaborative tagging data. In: WSDM","DOI":"10.1145\/1498759.1498812"},{"key":"259_CR15","doi-asserted-by":"crossref","unstructured":"Cormack GV (2007) Trec 2007 spam track overview. In: Text REtrieval Conference (TREC)","DOI":"10.6028\/NIST.SP.500-274.spam-overview"},{"key":"259_CR16","doi-asserted-by":"crossref","unstructured":"Cormack GV (2007) TREC 2007 spam track overview. In: TREC","DOI":"10.6028\/NIST.SP.500-274.spam-overview"},{"issue":"3","key":"259_CR17","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1247715.1247717","volume":"25","author":"GV Cormack","year":"2007","unstructured":"Cormack GV, Lynam TR (2007) Online supervised spam filter evaluation. ACM Trans Inf Syst 25(3):11","journal-title":"ACM Trans Inf Syst"},{"issue":"4","key":"259_CR18","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MIC.2006.74","volume":"10","author":"S Datta","year":"2006","unstructured":"Datta S, Bhaduri K, Giannella C, Wolff R, Kargupta H (2006) Distributed data mining in P2P networks. IEEE Internet Comput 10(4):18\u201326","journal-title":"IEEE Internet Comput"},{"issue":"10","key":"259_CR19","first-page":"1372","volume":"21","author":"S Datta","year":"2009","unstructured":"Datta S, Giannella CR, Kargupta H (2009) Approximate distributed K-means clustering over a P2P network. IEEE TKDE 21(10):1372\u20131388","journal-title":"IEEE TKDE"},{"key":"259_CR20","doi-asserted-by":"crossref","unstructured":"Di Fatta G, Blasa F, Cafiero S, Fortino G (2011) Epidemic k-means clustering. In: 2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW), pp 151\u2013158","DOI":"10.1109\/ICDMW.2011.76"},{"key":"259_CR21","doi-asserted-by":"crossref","unstructured":"Dumais ST, Platt JC, Hecherman D, Sahami M (1998) Inductive learning algorithms and representations for text categorization. In: CIKM","DOI":"10.1145\/288627.288651"},{"key":"259_CR22","doi-asserted-by":"crossref","unstructured":"Ertekin S, Huang J, Bottou L, Giles L (2007) Learning on the border: active learning in imbalanced data classification. In: CIKM, pp 127\u2013136","DOI":"10.1145\/1321440.1321461"},{"issue":"5","key":"259_CR23","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MC.2004.1297243","volume":"37","author":"P Eugster","year":"2004","unstructured":"Eugster P, Guerraoui R, Kermarrec A-M, Massoulie L (2004) Epidemic information dissemination in distributed systems. Computer 37(5):60\u201367","journal-title":"Computer"},{"issue":"8","key":"259_CR24","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861\u2013874","journal-title":"Pattern Recogn Lett"},{"key":"259_CR25","doi-asserted-by":"crossref","unstructured":"Fisher RA (1936) The use of multiple measurements in taxonomic problems. Ann Eugenics 7:179\u2013188","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"259_CR26","first-page":"1289","volume":"3","author":"G Forman","year":"2003","unstructured":"Forman G (2003) An extensive empirical study of feature selection metrics for text classification. J Mach Learn Res 3:1289\u20131305","journal-title":"J Mach Learn Res"},{"issue":"2","key":"259_CR27","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s10994-008-5064-8","volume":"73","author":"J F\u00fcrnkranz","year":"2008","unstructured":"F\u00fcrnkranz J, H\u00fcllermeier E, Loza Menc\u00eda E, Brinker K (2008) Multilabel classification via calibrated label ranking. Mach Learn 73(2):133\u2013153","journal-title":"Mach Learn"},{"key":"259_CR28","doi-asserted-by":"crossref","unstructured":"Gkantsidis C, Mihail M, Saberi A (2004) Random walks in peer-to-peer networks. In: INFOCOM","DOI":"10.1109\/INFCOM.2004.1354487"},{"key":"259_CR29","doi-asserted-by":"crossref","unstructured":"Heymann P, Koutrika G, Garcia-Molina H (2008) Can social bookmarking improve web search? In: WSDM","DOI":"10.1145\/1341531.1341558"},{"key":"259_CR30","doi-asserted-by":"crossref","unstructured":"Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in P2P networks. In: WWW, pp 640\u2013651","DOI":"10.1145\/775240.775242"},{"issue":"8","key":"259_CR31","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MC.2006.257","volume":"39","author":"J Kong","year":"2006","unstructured":"Kong J, Rezaei B, Sarshar N, Roychowdhury V, Boykin P (2006) Collaborative spam filtering using e-mail networks. IEEE Computer 39(8):67\u201373","journal-title":"IEEE Computer"},{"key":"259_CR32","doi-asserted-by":"crossref","unstructured":"Kuncheva LI (2004) Combining pattern classifiers: methods and algorithms. Wiley","DOI":"10.1002\/0471660264"},{"key":"259_CR33","doi-asserted-by":"crossref","unstructured":"Lee Y-J, Mangasarian OL (2001) RSVM: reduced support vector machines, pp 55\u201370","DOI":"10.1137\/1.9781611972719.13"},{"key":"259_CR34","unstructured":"LIBSVM library and data collection (2010) Available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"},{"key":"259_CR35","doi-asserted-by":"crossref","unstructured":"Luo P, Xiong H, L\u00fc K, Shi Z (2007) Distributed classification in peer-to-peer networks. In: SIGKDD, pp 968\u2013976","DOI":"10.1145\/1281192.1281296"},{"issue":"3","key":"259_CR36","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1109\/TNET.2007.893226","volume":"15","author":"M Mehyar","year":"2007","unstructured":"Mehyar M, Spanos D, Pongsajapan J, Low SH, Murray RM (2007) Asynchronous distributed averaging on communication networks. IEEE\/ACM Trans Netw 15(3):512\u2013520","journal-title":"IEEE\/ACM Trans Netw"},{"key":"259_CR37","doi-asserted-by":"crossref","unstructured":"Merugu S, Ghosh J (2003) Privacy-preserving distributed clustering using generative models. In: ICDM","DOI":"10.1109\/ICDM.2003.1250922"},{"issue":"1","key":"259_CR38","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.websem.2009.12.001","volume":"8","author":"E Minack","year":"2010","unstructured":"Minack E, Paiu R, Costache S, Demartini G, Gaugaz J, Ioannou E, Chirita P-A, Nejdl W (2010) Leveraging personal metadata for desktop search: the Beagle ++ system. J Web Sem 8(1):37\u201354","journal-title":"J Web Sem"},{"key":"259_CR39","doi-asserted-by":"crossref","unstructured":"Mladeni\u0107 D, Brank J, Grobelnik M, Milic-Frayling N (2004) Feature selection using linear classifier weights: interaction with classification models. In: SIGIR","DOI":"10.1145\/1008992.1009034"},{"key":"259_CR40","doi-asserted-by":"crossref","unstructured":"Overell S, Sigurbj\u00f6rnsson B, van Zwol R (2009) Classifying tags using open content resources. In: WSDM","DOI":"10.1145\/1498759.1498810"},{"key":"259_CR41","doi-asserted-by":"crossref","unstructured":"Papapetrou O, Siberski W, Siersdorfer S (2011) Collaborative classification over p2p networks. In: WWW (Companion Volume), pp 97\u201398","DOI":"10.1145\/1963192.1963242"},{"issue":"4","key":"259_CR42","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/s10115-004-0176-3","volume":"7","author":"A Schuster","year":"2005","unstructured":"Schuster A, Wolff R, Trock D (2005) A high-per- formance distributed algorithm for mining association rules. Knowl Inf Syst 7(4):458\u2013475","journal-title":"Knowl Inf Syst"},{"issue":"4","key":"259_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1402256.1402261","volume":"26","author":"S Siersdorfer","year":"2008","unstructured":"Siersdorfer S, Sizov S (2008) Meta methods for model sharing in personal information systems. ACM Trans Inf Syst 26(4):1\u201335","journal-title":"ACM Trans Inf Syst"},{"key":"259_CR44","unstructured":"Silerston T, Fourmaux O (2007) Measuring p2p iptv systems. In: NOSSDAV"},{"key":"259_CR45","doi-asserted-by":"crossref","unstructured":"Terpstra WW, Kangasharju J, Leng C, Buchmann AP (2007) Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search. In: SIGCOMM","DOI":"10.1145\/1282380.1282387"},{"key":"259_CR46","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton C (2004) Privacy preserving naive bayes classifier for vertically partitioned data. In: SDM","DOI":"10.1137\/1.9781611972740.59"},{"issue":"2","key":"259_CR47","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s10922-005-4441-x","volume":"13","author":"S Voulgaris","year":"2005","unstructured":"Voulgaris S, Gavidia D, van Steen M (2005) Cyclon: inexpensive membership management for unstructured p2p overlays. J. Network Syst. Manage. 13(2):197\u2013217","journal-title":"J. Network Syst. Manage."},{"key":"259_CR48","doi-asserted-by":"crossref","unstructured":"Voulgaris S, van Steen M (2005) Epidemic-style management of semantic overlays for content-based searching. In: Euro-Par, pp 1143\u20131152","DOI":"10.1007\/11549468_125"},{"issue":"2","key":"259_CR49","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"D Wolpert","year":"1992","unstructured":"Wolpert D (1992) Stacked generalization. Neural Netw 5(2):241\u2013259","journal-title":"Neural Netw"},{"key":"259_CR50","doi-asserted-by":"crossref","unstructured":"Wu H, Zubair M, Maly K (2007) Collaborative classification of growing collections with evolving facets. In: HT","DOI":"10.1145\/1286240.1286289"},{"key":"259_CR51","unstructured":"Yang Y, Pedersen JO (1997) A comparative study on feature selection in text categorization. In: ICML"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0259-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0259-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0259-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T03:25:29Z","timestamp":1746156329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0259-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,21]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["259"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0259-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2014,3,21]]}}}