{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:11:04Z","timestamp":1775121064631,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,5,7]],"date-time":"2014-05-07T00:00:00Z","timestamp":1399420800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s12083-014-0279-x","type":"journal-article","created":{"date-parts":[[2014,5,6]],"date-time":"2014-05-06T01:38:24Z","timestamp":1399340304000},"page":"532-542","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A trust-based P2P resource search method integrating with Q-learning for future Internet"],"prefix":"10.1007","volume":"8","author":[{"given":"Huan-lin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Gao-xiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qian-bin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,7]]},"reference":[{"issue":"6","key":"279_CR1","first-page":"693","volume":"22","author":"L Yunjie","year":"2010","unstructured":"Yunjie L (2010) Development of network convergence and future internet. J Chongqing Univ Posts Telecommun Nat Sci Ed 22(6):693\u2013697","journal-title":"J Chongqing Univ Posts Telecommun Nat Sci Ed"},{"issue":"1","key":"279_CR2","first-page":"44","volume":"25","author":"H Tang","year":"2013","unstructured":"Tang H, Zhang Y, Zhao G (2013) Survey on services-oriented networking in future internet. J Chongqing Univ Posts Telecommun Nat Sci Ed 25(1):44\u201351","journal-title":"J Chongqing Univ Posts Telecommun Nat Sci Ed"},{"issue":"5","key":"279_CR3","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1007\/s11036-011-0342-2","volume":"17","author":"MM Fouda","year":"2012","unstructured":"Fouda MM, Fadlullah ZM, Guizani M et al (2012) A novel P2P VoD streaming technique integrating localization and congestion awareness strategies. Mob Netw Appl 17(5):594\u2013603","journal-title":"Mob Netw Appl"},{"key":"279_CR4","doi-asserted-by":"crossref","unstructured":"Yue Z, Wang J (2012) Calculation method of P2P reputation based on recommendation. International Conference on Intelligent Control and Information Processing, pp. 245\u2013247","DOI":"10.1109\/ICICIP.2012.6391536"},{"issue":"3","key":"279_CR5","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1364\/JOCN.6.000303","volume":"6","author":"U Mandal","year":"2014","unstructured":"Mandal U, Habib MF, Zhang S et al (2014) Adopting hybrid CDN\u2013P2P in IP-over-WDM networks: an energy-efficiency perspective. J Opt Commun Netw 6(3):303\u2013314","journal-title":"J Opt Commun Netw"},{"key":"279_CR6","doi-asserted-by":"crossref","unstructured":"Aurelius A, Lagerstedt C, Kihl M (2011) Streaming media over the Internet: flow based analysis in live access networks. Broadband Multimedia Systems and Broadcasting (BMSB), 2011 I.E. International Symposium on. IEEE, June 2011, pp. 1\u20136","DOI":"10.1109\/BMSB.2011.5954942"},{"key":"279_CR7","doi-asserted-by":"crossref","unstructured":"Li J-Q, Xie S-X et al. (2010) An effective trust-based search approach in peer-to-peer network. International Conference on Machine Vision and Human-machine Interface, April 2010, pp. 206\u2013209","DOI":"10.1109\/MVHI.2010.133"},{"key":"279_CR8","unstructured":"Liu Y, Li Y et al. (2010) The resource locating strategy based on sub-domain hybrid P2P network model. International. Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, April, 2010, pp. 1\u20138"},{"key":"279_CR9","doi-asserted-by":"crossref","unstructured":"Wang Y, Huang X, Lu Q (2011) Small-world-like semi-structured P2P network. International Conference on Computer Research and Development, March 2011, pp. 246\u2013251","DOI":"10.1109\/ICCRD.2011.5764013"},{"issue":"4","key":"279_CR10","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/s12083-012-0139-5","volume":"5","author":"G Lee","year":"2012","unstructured":"Lee G, Peng SL, Chen YC et al (2012) An efficient search mechanism for supporting partial filename queries in structured peer-to-peer overlay. Peer-to-Peer Network Appl 5(4):340\u2013349","journal-title":"Peer-to-Peer Network Appl"},{"key":"279_CR11","unstructured":"Lei Y, Hao Y et al. (2010) An adaptive search method based on the interest in gnutella-like network. International Conference on Computer Application and System Modeling, Oct. 2010, pp. 302\u2013306"},{"key":"279_CR12","doi-asserted-by":"crossref","unstructured":"Zhang Y, Guo S et al. (2011) An efficient unstructured P2P network search algorithm based on multi-information. International Conference on Instrumentation, Measurement, Computer, Communication and Control, Oct. 2011, pp. 241\u2013244","DOI":"10.1109\/IMCCC.2011.69"},{"key":"279_CR13","doi-asserted-by":"crossref","unstructured":"Rasanjalee Himali DM, Prasad SK (2011) A P2P probabilistic search algorithm based on successful paths in unstructured networks. International Symposium on Parallel and Distributed Processing Workshops and Phd Forum, May 2011, pp. 1610\u20131617","DOI":"10.1109\/IPDPS.2011.316"},{"key":"279_CR14","doi-asserted-by":"crossref","unstructured":"Margariti SV, Dimakopoulos VV (2011) A novel probabilistic flooding strategy for unstructured peer-to-peer networks. Panhellenic Conference on Informatics, Sept. 2011, pp. 149\u2013153","DOI":"10.1109\/PCI.2011.33"},{"key":"279_CR15","unstructured":"Han H, He J, Zuo C (2010) A hybrid P2P overlay network for high efficient search, International Conference on Information and Financial Engineering, Sept, 2010, pp. 241\u2013245"},{"key":"279_CR16","doi-asserted-by":"crossref","unstructured":"Zeng J, Zheng G (2012) Interest based on small world of P2P. International Conference on Cognitive Informatics & Cognitive Computing, Aug. 2012, pp. 391\u2013398","DOI":"10.1109\/ICCI-CC.2012.6311178"},{"key":"279_CR17","unstructured":"Thampi SM, Chandra Sekaran K (2008) An effective distributed search technique for unstructured peer-to-peer networks. International Journal of Computer Science and Network Security, January 2008, pp. 128\u2013135"},{"issue":"6","key":"279_CR18","first-page":"801","volume":"25","author":"H Liu","year":"2013","unstructured":"Liu H, Chen G, Wu S (2013) Improved resource search strategy using Q-learning based on node reputation for P2P network. J Chongqing Univ Posts Telecommun Nat Sci Ed 25(6):801\u2013806","journal-title":"J Chongqing Univ Posts Telecommun Nat Sci Ed"},{"key":"279_CR19","doi-asserted-by":"crossref","unstructured":"Farahnakian F, Ebrahimi M et al. (2011) Q-learning based Congestion-aware Routing Algorithm for On-Chip Network. International Conference on Networked Embedded Systems, December 2011, pp. 1\u20137","DOI":"10.1109\/NESEA.2011.6144949"},{"key":"279_CR20","unstructured":"Li X, Wu J (2006) Improve searching by reinforcement learning in unstructured P2Ps. International Conference on Distributed Computing Systems Workshops, July 2006, pp. 1\u20136"},{"key":"279_CR21","doi-asserted-by":"crossref","unstructured":"Jiang X, Ye L (2010) Attack-resistant techniques in P2P reputation systems. 2nd International Conference on Networking and Digital Society, May 2010, pp. 390\u2013393","DOI":"10.1109\/ICNDS.2010.5479214"},{"key":"279_CR22","doi-asserted-by":"crossref","unstructured":"Mashayekhi H et al. (2008) TBSearch: trust based search for unstructured peer-to-peer networks. Fourth International Conference on Semantics, Knowledge and Grid, Dec. 2008, pp. 227\u2013234","DOI":"10.1109\/SKG.2008.99"},{"key":"279_CR23","unstructured":"Dai X, Zhu C, Guo Y (2012) P2P dynamic trust management system based on trust network. International Conference on Cyber Security, Cyber Warfare and Digital Forensic, June 2012, pp. 165\u2013170"},{"key":"279_CR24","unstructured":"Zhu Y, Hu R (2010) Adaptive routing for P2P networks using reinforcement learning. International Conference on Computer Science and Information Technology, July 2010, pp. 37\u201341"},{"key":"279_CR25","doi-asserted-by":"crossref","unstructured":"Jamali MAJ, Sani Y (2011) Adaptive peer to peer resource discovery in grid computing based on reinforcement learning. ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, July 2011, pp. 191\u2013196","DOI":"10.1109\/SNPD.2011.42"},{"key":"279_CR26","doi-asserted-by":"crossref","unstructured":"Thampi SM, Chandra Sekaran K (2007) Autonomous data replication using q-learning for unstructured P2P networks. Sixth IEEE International Symposium on Network Computing and Applications, July 2007, pp. 311\u2013317","DOI":"10.1109\/NCA.2007.11"},{"issue":"17","key":"279_CR27","first-page":"123","volume":"48","author":"M Du","year":"2012","unstructured":"Du M, Wang X (2012) P2P trust model of dynamic optimization for group competition based on entropy method. Comput Eng Appl 48(17):123\u2013128","journal-title":"Comput Eng Appl"},{"key":"279_CR28","doi-asserted-by":"crossref","unstructured":"Wang Z, Yu Y (2011) Information entropy method for project portfolio selection. Eighth International Conference on Fuzzy Systems and Knowledge Discovery, July 2011, pp. 2618\u20132622","DOI":"10.1109\/FSKD.2011.6020005"},{"key":"279_CR29","doi-asserted-by":"crossref","unstructured":"Zhao B et al. (2011) Research on application of customer satisfaction index model -view_based on PLS and information entropy-weight method. International Conference on E-Business and E\u2013Government, May 2011, pp. 1\u20134","DOI":"10.1109\/ICEBEG.2011.5887147"},{"key":"279_CR30","unstructured":"Wang Q, Zhan Z (2011) Reinforcement learning model, algorithms and its application. International Conference on Mechatronic Science, Electric Engineering and Computer, August, 2011, pp. 1143\u20131146"},{"key":"279_CR31","doi-asserted-by":"crossref","unstructured":"Liu JP (2012) The research of resource searching algorithm in mobile P2P network. International Conference on Computational and Information Sciences, Aug. 2012, pp. 811\u2013814","DOI":"10.1109\/ICCIS.2012.345"},{"key":"279_CR32","doi-asserted-by":"crossref","unstructured":"Donohoo BK, Ohlsen C, Pasricha S (2011) AURA: an application and user interaction aware middleware framework for energy optimization in mobile devices. 2011 I.E. 29th International Conference on Computer Design (ICCD). October 2011, pp. 168\u2013174","DOI":"10.1109\/ICCD.2011.6081393"},{"issue":"1","key":"279_CR33","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s12083-012-0142-x","volume":"6","author":"M Hawa","year":"2013","unstructured":"Hawa M et al (2013) On enhancing reputation management using Peer-to-Peer interaction history. Peer-to-Peer Netw Appl 6(1):101\u2013113","journal-title":"Peer-to-Peer Netw Appl"},{"key":"279_CR34","doi-asserted-by":"crossref","unstructured":"Portmann M, Sookavatana P (2001) The cost of peer discovery and searching in the gnutella peer-to-peer file sharing protocol. International conference on Networks Proceedings, October 2001, pp. 263\u2013268","DOI":"10.1109\/ICON.2001.962351"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0279-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0279-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0279-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T06:37:37Z","timestamp":1565419057000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0279-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,7]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["279"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0279-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,7]]}}}