{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:10:02Z","timestamp":1764936602948},"reference-count":26,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2011,11,19]],"date-time":"2011-11-19T00:00:00Z","timestamp":1321660800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Internet Serv Appl"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1007\/s13174-011-0043-x","type":"journal-article","created":{"date-parts":[[2011,11,18]],"date-time":"2011-11-18T14:13:40Z","timestamp":1321625620000},"page":"59-66","source":"Crossref","is-referenced-by-count":14,"title":["Challenges in very large distributed systems"],"prefix":"10.5753","volume":"3","author":[{"given":"Maarten","family":"van Steen","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Pierre","sequence":"additional","affiliation":[]},{"given":"Spyros","family":"Voulgaris","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2011,11,19]]},"reference":[{"key":"43_CR1","unstructured":"Amazon Web Services (2011) Summary of the Amazon EC2 and Amazon RDS service disruption in the US east region. http:\/\/aws.amazon.com\/message\/65648\/"},{"issue":"15","key":"43_CR2","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"key":"43_CR3","volume-title":"Handbook of network and system administration","year":"2007","unstructured":"Bergstra J, Burgess M (eds) (2007) Handbook of network and system administration. Elsevier, Amsterdam"},{"key":"43_CR4","volume-title":"Proc. 29th IEEE international symposium on reliable distributed systems","author":"H Chen","year":"2010","unstructured":"Chen H, Jiang G, Zhang H, Yoshihira K (2010) A cooperative sampling approach to discovering optimal configurations in large scale computing systems. In: Proc. 29th IEEE international symposium on reliable distributed systems"},{"key":"43_CR5","first-page":"321","volume-title":"Ubiquitous computing fundamentals","author":"A Dey","year":"2010","unstructured":"Dey A (2010) Context-aware computing. In: Krumm J (ed) Ubiquitous computing fundamentals. CRC Press, Boca Raton, pp 321\u2013352"},{"issue":"2","key":"43_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/564585.564601","volume":"33","author":"S Gilbert","year":"2002","unstructured":"Gilbert S, Lynch N (2002) Brewer\u2019s conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News 33(2):51\u201359","journal-title":"SIGACT News"},{"key":"43_CR7","unstructured":"Huijsman R-J (Aug. 2011) An investigation into evolving distributed systems. Master\u2019s thesis. VU University Amsterdam"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Jelasity M, Voulgaris S, Guerraoui R, Kermarrec A-M, van Steen\u00a0M (2007) Gossip-based peer sampling. ACM Trans Comput Syst 25(3)","DOI":"10.1145\/1275517.1275520"},{"key":"43_CR9","first-page":"266","volume-title":"Proc. 10th international conference on peer-to-peer computing","author":"G Kreitz","year":"2010","unstructured":"Kreitz G, Niemel\u00e4 F (2010) Spotify\u2014large scale, low latency, P2P music-on-demand streaming. In: Proc. 10th international conference on peer-to-peer computing, Aug. 2010. IEEE Comput Soc, Los Alamitos, pp 266\u2013275"},{"key":"43_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/9780470400791","volume-title":"Network science: theory and practice","author":"TG Lewis","year":"2009","unstructured":"Lewis TG (2009) Network science: theory and practice. Wiley, New York"},{"key":"43_CR11","unstructured":"Madan A, Cebrian M, Moturu S, Farrahi K, Pentland A (2011) Sensing the \u2018Health state\u2019 of our society. Technical Report TR-663, MIT, Cambridge, MA"},{"issue":"1","key":"43_CR12","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1145\/1061318.1061322","volume":"30","author":"SR Madden","year":"2005","unstructured":"Madden SR, Franklin MJ, Hellerstein JM, Hong W (2005) TinyDB: an acquisitional query processing system for sensor networks. ACM Trans Database Syst 30(1):122\u2013173","journal-title":"ACM Trans Database Syst"},{"key":"43_CR13","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1145\/1557019.1557090","volume-title":"Proc. 15th international conference knowledge discovery and data mining (KDD)","author":"F McSherry","year":"2009","unstructured":"McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the Netflix prize contenders. In: Proc. 15th international conference knowledge discovery and data mining (KDD), June 2009. ACM, New York, pp 627\u2013637"},{"issue":"1","key":"43_CR14","doi-asserted-by":"crossref","first-page":"67","DOI":"10.3233\/AIS-2010-0049","volume":"2","author":"S Moran","year":"2010","unstructured":"Moran S, Nakata K (2010) Ubiquitous monitoring and user behaviour: a preliminary model. J Ambient Intell Smart Environ 2(1):67\u201380","journal-title":"J Ambient Intell Smart Environ"},{"issue":"3","key":"43_CR15","doi-asserted-by":"publisher","DOI":"10.1145\/1922649.1922656","volume":"43","author":"L Mottola","year":"2011","unstructured":"Mottola L, Picco GP (2011) Programming wireless sensor networks: fundamental concepts and state of the art. ACM Comput Surv 43(3):19","journal-title":"ACM Comput Surv"},{"key":"43_CR16","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks, an introduction","author":"M Newman","year":"2010","unstructured":"Newman M (2010) Networks, an introduction. Oxford University Press, Oxford"},{"key":"43_CR17","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11773887_7","volume-title":"Proc. 6th international conference on distributed applications and interoperable systems","author":"E Ogston","year":"2006","unstructured":"Ogston E, Bakker A, van Steen M (2006) On the value of random opinions in decentralized recommendation. In: Proc. 6th international conference on distributed applications and interoperable systems. Lecture notes in computer science, vol\u00a04025, pp 84\u201398. Springer, Berlin"},{"issue":"1\/2","key":"43_CR18","first-page":"69","volume":"1","author":"DO Olgu\u00edn","year":"2010","unstructured":"Olgu\u00edn DO, Pentland AS (2010) Sensor-based organisational design and engineering. Int J Organ Des Eng 1(1\/2):69\u201397","journal-title":"Int J Organ Des Eng"},{"key":"43_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/9780470779446","volume-title":"Ubiquitous computing: smart devices, environments and interactions","author":"S Poslad","year":"2009","unstructured":"Poslad S (2009) Ubiquitous computing: smart devices, environments and interactions. Wiley, New York"},{"key":"43_CR20","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1145\/1095810.1095833","volume-title":"Proc. 20th symposium on operating system principles","author":"F Qin","year":"2005","unstructured":"Qin F, Tucek J, Sundaresan J, Zhou Y (2005) Rx: treating bugs as allergies\u2014a safe method to survive software failures. In: Proc. 20th symposium on operating system principles, Oct. 2005. ACM, New York, pp 235\u2013248"},{"key":"43_CR21","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/4236.968832","volume":"5","author":"N Ramakrishnan","year":"2001","unstructured":"Ramakrishnan N, Keller BJ, Mirza BJ, Grama AY, Karypis G (2001) Privacy risks in recommender systems. IEEE Internet Comput 5:54\u201362","journal-title":"IEEE Internet Comput"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Urdaneta G, Pierre G, van Steen M (2011) A survey of DHT security techniques. ACM Comput Surv 43(2)","DOI":"10.1145\/1883612.1883615"},{"key":"43_CR23","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-642-11294-2_5","volume-title":"Replication, theory and practice","author":"M Steen van","year":"2010","unstructured":"van Steen M, Pierre G (2010) Replicating for performance: case studies. In: Charron-Bost B, Pedone F, Schiper A (eds) Replication, theory and practice. Lecture notes in computer science, vol\u00a05959. Springer, Berlin, pp 73\u201389. Chapter\u00a05"},{"issue":"17","key":"43_CR24","doi-asserted-by":"publisher","first-page":"2299","DOI":"10.1002\/cpe.1225","volume":"19","author":"S Voulgaris","year":"2007","unstructured":"Voulgaris S, van Steen M, Iwanicki K (2007) Proactive gossip-based management of semantic overlay networks. Concurr Comput 19(17):2299\u20132311","journal-title":"Concurr Comput"},{"issue":"2","key":"43_CR25","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2004.1273489","volume":"8","author":"J Wams","year":"2004","unstructured":"Wams J, van Steen M (2004) Unifying user-to-user messaging systems. IEEE Internet Comput 8(2):76\u201382","journal-title":"IEEE Internet Comput"},{"key":"43_CR26","first-page":"67","volume":"September","author":"M Weiser","year":"1991","unstructured":"Weiser M (1991) The computer for the 21st century. Sci Am September:67\u201383","journal-title":"Sci Am"}],"container-title":["Journal of Internet Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13174-011-0043-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13174-011-0043-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/s13174-011-0043-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13174-011-0043-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T22:14:45Z","timestamp":1644444885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13174-011-0043-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,19]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["43"],"URL":"https:\/\/doi.org\/10.1007\/s13174-011-0043-x","relation":{},"ISSN":["1867-4828","1869-0238"],"issn-type":[{"value":"1867-4828","type":"print"},{"value":"1869-0238","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,19]]}}}