{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T21:55:51Z","timestamp":1683928551454},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,3,23]],"date-time":"2014-03-23T00:00:00Z","timestamp":1395532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s12083-014-0266-2","type":"journal-article","created":{"date-parts":[[2014,3,22]],"date-time":"2014-03-22T06:03:54Z","timestamp":1395468234000},"page":"432-446","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of user\u2019s behavior and resource characteristics for private trackers"],"prefix":"10.1007","volume":"8","author":[{"given":"Qiang","family":"Li","sequence":"first","affiliation":[]},{"given":"Tao","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Qinghua","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,23]]},"reference":[{"key":"266_CR1","doi-asserted-by":"crossref","unstructured":"Levin D, LaCurts K, Spring N, Bhattacharjee B (2008) Bittorrent is an auction: analyzing and improving bittorrent\u2019s incentives. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, Seattle, WA, USA. ACM, pp 243\u2013254","DOI":"10.1145\/1402958.1402987"},{"key":"266_CR2","doi-asserted-by":"crossref","unstructured":"Kaune S, Rumin RC, Tyson G, Mauthe A, Guerrero C, Steinmetz R (2010) Unraveling BitTorrent\u2019s file unavailability: measurements and analysis. In: Proceedings of IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), Delft, Netherlands, pp 1\u20139","DOI":"10.1109\/P2P.2010.5569991"},{"key":"266_CR3","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/11558989_19","volume":"3640","author":"J Pouwelse","year":"2005","unstructured":"Pouwelse J, Garbacki P, Epema D, Sips H (2005) The BitTorrent P2P file-sharing system: measurements and analysis. Peer-to-Peer Syst IV 3640:205\u2013216","journal-title":"Peer-to-Peer Syst IV"},{"key":"266_CR4","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1109\/JSAC.2007.070116","volume":"25","author":"L Guo","year":"2007","unstructured":"Guo L, Chen S, Xiao Z, Tan E, Ding X, Zhang X (2007) A performance study of BitTorrent-like peer-to-peer systems. IEEE J Sel Areas Commun 25:155\u2013169","journal-title":"IEEE J Sel Areas Commun"},{"key":"266_CR5","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.jnca.2010.06.010","volume":"34","author":"E Costa-Montenegro","year":"2011","unstructured":"Costa-Montenegro E, Burguillo-Rial JC, Gil-Casti\u00f1eira F, Gonz\u00e1lez-Casta\u00f1o FJ (2011) Implementation and analysis of the BitTorrent protocol with a multi-agent model. J Netw Comput Appl 34:368\u2013383","journal-title":"J Netw Comput Appl"},{"key":"266_CR6","doi-asserted-by":"crossref","unstructured":"Qiu D, Srikant R (2004) Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, Portland, Oregon, USA, pp 367\u2013378","DOI":"10.1145\/1015467.1015508"},{"key":"266_CR7","doi-asserted-by":"crossref","unstructured":"Jia AL, D\u2019Acunto L, Meulpolder M, Pouwelse JA, Epema DHJ (2011) BitTorrent\u2019s dilemma: Enhancing reciprocity or reducing inequity. In: Proceedings of IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, Nevada, USA, pp 705\u2013709","DOI":"10.1109\/CCNC.2011.5766581"},{"key":"266_CR8","doi-asserted-by":"crossref","unstructured":"Bernaille L, Teixeira R, Salamatian K (2006) Early application identification. In: Proceedings of the 2006 ACM CoNEXT conference, Lisboa, Portugal, pp 1\u201312","DOI":"10.1145\/1368436.1368445"},{"key":"266_CR9","unstructured":"Meulpolder M, D\u2019Acunto L, Capota M, Wojciechowski M, Pouwelse JA, Epema DHJ, Sips HJ (2010) Public and private bittorrent communities: A measurement study. In: Proceedings of the 9th International Workshop on Peer-to-Peer Systems (IPTPS), San Jose, CA, pp 10\u201310"},{"key":"266_CR10","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/1120717.1120723","volume":"5","author":"M Feldman","year":"2005","unstructured":"Feldman M, Chuang J (2005) Overcoming free-riding behavior in peer-to-peer systems. SIGecom Exch 5:41\u201350","journal-title":"SIGecom Exch"},{"key":"266_CR11","doi-asserted-by":"crossref","first-page":"4012","DOI":"10.1109\/TVT.2010.2062549","volume":"59","author":"ME Mahmoud","year":"2010","unstructured":"Mahmoud ME, Xuemin S (2010) PIS: a practical incentive system for multihop wireless networks. IEEE Trans Veh Technol 59:4012\u20134025","journal-title":"IEEE Trans Veh Technol"},{"key":"266_CR12","doi-asserted-by":"crossref","first-page":"997","DOI":"10.1109\/TMC.2010.211","volume":"10","author":"ME Mahmoud","year":"2011","unstructured":"Mahmoud ME, Xuemin S (2011) ESIP: secure incentive protocol with limited use of public-key cryptography for multihop wireless networks. IEEE Trans Mob Comput 10:997\u20131010","journal-title":"IEEE Trans Mob Comput"},{"key":"266_CR13","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1109\/TMC.2011.92","volume":"11","author":"MMEA Mahmoud","year":"2012","unstructured":"Mahmoud MMEA, Xuemin S (2012) FESCIM: fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks. IEEE Trans Mob Comput 11:753\u2013766","journal-title":"IEEE Trans Mob Comput"},{"key":"266_CR14","doi-asserted-by":"crossref","first-page":"1640","DOI":"10.1049\/iet-com.2011.0196","volume":"6","author":"X Chen","year":"2012","unstructured":"Chen X, Chu X, Liu J (2012) Unveiling popularity of BitTorrent darknets. IET Commun 6:1640\u20131650","journal-title":"IET Commun"},{"key":"266_CR15","doi-asserted-by":"crossref","unstructured":"Andrade N, Mowbray M, Lima A, Wagner G, Ripeanu M (2005) Influences on cooperation in BitTorrent communities. In: Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, Philadelphia, Pennsylvania, USA, pp 111\u2013115","DOI":"10.1145\/1080192.1080198"},{"key":"266_CR16","unstructured":"Sirivianos M, Park JH, Chen R, Yang X (2007) Free-riding in BitTorrent networks with the large view exploit. In: Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS), Bellevue, WA, USA"},{"key":"266_CR17","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.comnet.2008.09.029","volume":"53","author":"N Andrade","year":"2009","unstructured":"Andrade N, Santos-Neto E, Brasileiro F, Ripeanu M (2009) Resource demand and supply in BitTorrent content-sharing communities. Comput Netw 53:515\u2013527","journal-title":"Comput Netw"},{"key":"266_CR18","doi-asserted-by":"crossref","unstructured":"Zhang C, Dhungel P, Wu D, Liu Z, Ross KW (2010) BitTorrent darknets. In: Proceedings of IEEE INFOCOM, San Diego, CA, USA, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5461962"},{"key":"266_CR19","doi-asserted-by":"crossref","unstructured":"Chen X, Chu X, Liu J (2010) Unveiling popularity of BitTorrent darknets. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), Miami, Florida, USA, pp 1\u20135","DOI":"10.1109\/GLOCOM.2010.5683894"},{"key":"266_CR20","doi-asserted-by":"crossref","unstructured":"Chen X, Jiang Y, Chu X (2010) Measurements, Analysis and Modeling of Private Trackers. In: Proceedings of IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), Delft, Netherlands, pp 1\u201310","DOI":"10.1109\/P2P.2010.5569968"},{"key":"266_CR21","doi-asserted-by":"crossref","unstructured":"Chen X, Chu X, Li Z (2011) Improving sustainability of private p2p communities. In: Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), Maui, Hawaii, pp 1\u20136","DOI":"10.1109\/ICCCN.2011.6005944"},{"key":"266_CR22","doi-asserted-by":"crossref","unstructured":"Jia A, Chen X, Chu X, Pouwelse J, Epema DJ (2013) How to survive and thrive in a private BitTorrent community. In: Proceedings of 14th International Conference on Distributed Computing and Networking (ICDCN), Mumbai, India, pp 270\u2013284","DOI":"10.1007\/978-3-642-35668-1_19"},{"key":"266_CR23","doi-asserted-by":"crossref","unstructured":"Liu Z, Dhungel P, Wu D, Zhang C, Ross KW (2010) Understanding and improving ratio incentives in private communities. In: Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS), Genoa, Italy, pp 610\u2013621","DOI":"10.1109\/ICDCS.2010.90"},{"key":"266_CR24","doi-asserted-by":"crossref","unstructured":"Jia AL, Rahman R, Vinko T, Pouwelse JA, Epema DHJ (2011) Fast download but eternal seeding: The reward and punishment of Sharing Ratio Enforcement. In: Proceedings of 2011 I.E. International Conference on Peer-to-Peer Computing (P2P), pp 280\u2013289","DOI":"10.1109\/P2P.2011.6038746"},{"key":"266_CR25","doi-asserted-by":"crossref","first-page":"2503","DOI":"10.1109\/TPDS.2012.332","volume":"24","author":"AL Jia","year":"2013","unstructured":"Jia AL, Rahman R, Vinko T, Pouwelse JA, Epema DHJ (2013) Systemic risk and user-level performance in private P2P communities. IEEE Trans Parallel Distrib Syst 24:2503\u20132512","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"266_CR26","doi-asserted-by":"crossref","unstructured":"Zhao Y, Zhang Z, Guo L, Fang B (2011) Revisiting the swarm evolution: A long term perspective. In: Proceedings of IEEE Symposium on Computers and Communications (ISCC), Kerkyra (Corfu), Greece, pp 1062\u20131067","DOI":"10.1109\/ISCC.2011.5983983"},{"key":"266_CR27","doi-asserted-by":"crossref","unstructured":"Csernai K, Jelasity M, Pouwelse J, Vink\u00f3 T (2011) Modeling unconnectable peers in private BitTorrent communities. In: Proceedings of 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Ayia Napa, Cyprus, pp 582\u2013589","DOI":"10.1109\/PDP.2011.21"},{"key":"266_CR28","doi-asserted-by":"crossref","first-page":"726","DOI":"10.4028\/www.scientific.net\/AMR.267.726","volume":"267","author":"NX Ao","year":"2011","unstructured":"Ao NX, Chen CJ (2011) Measurement study of IPv6 users on private BT. Adv Mater Res 267:726\u2013731","journal-title":"Adv Mater Res"},{"key":"266_CR29","doi-asserted-by":"crossref","unstructured":"Rahman R, Hales D, Vinko T, Pouwelse J, Sips H (2010) No more crash or crunch: Sustainable credit dynamics in a P2P community. In: Proceedings of 2010 International Conference on High Performance Computing and Simulation (HPCS), pp 332\u2013340","DOI":"10.1109\/HPCS.2010.5547112"},{"key":"266_CR30","doi-asserted-by":"crossref","unstructured":"Li Q, Qin T, Guan X, Zheng Q, Huang Q (2013) An In-depth Measurement and Analysis of Popular Private Tracker Systems in China. In: Proceedings of IEEE International Conference on Communications (ICC\u201913), Budapest, Hungary, pp 865\u2013869","DOI":"10.1109\/ICC.2013.6654867"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0266-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0266-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0266-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T20:24:40Z","timestamp":1565295880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0266-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,23]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["266"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0266-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,23]]}}}