{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:09Z","timestamp":1754157189311,"version":"3.41.2"},"reference-count":14,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Internet Research"],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1108\/10662240310469024","type":"journal-article","created":{"date-parts":[[2003,4,18]],"date-time":"2003-04-18T19:08:54Z","timestamp":1050692934000},"page":"80-85","source":"Crossref","is-referenced-by-count":0,"title":["The design of a reliable multipeer protocol for DVEs"],"prefix":"10.1108","volume":"13","author":[{"given":"Gunther","family":"Stuer","sequence":"first","affiliation":[]},{"given":"Jan","family":"Broeckhove","sequence":"additional","affiliation":[]},{"given":"Frans","family":"Arickx","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"doi-asserted-by":"publisher","key":"B1","DOI":"10.1002\/(SICI)1097-024X(19990725)29:9<741::AID-SPE259>3.0.CO;2-I"},{"doi-asserted-by":"crossref","unstructured":"Brutzman, D.P., Macedonia, M.C. and Zyda, M.J. (1995), \u201cInternetwork infrastructure requirements for virtual environments\u201d,Proceedings of the 1995 Symposium on Virtual Reality Modeling Languages.","key":"B3","DOI":"10.1145\/217306.217319"},{"unstructured":"Chiu, D.M., Hurst, S., Kadansky, M. and Wesley, J. (1998),TRAM: A tree based Reliable Multicast Protocol, Sun Research Technical Report TR 98 66.","key":"B4"},{"doi-asserted-by":"publisher","key":"B6","DOI":"10.1016\/S0167-739X(98)00022-3"},{"unstructured":"Hanna, S., Kadansky, M. and Rosenzweig, P. (1998),The Java Reliable Multicast Service: A Reliable Multicast Library, Sun Research Technical Report TR 98 68.","key":"B9"},{"doi-asserted-by":"publisher","key":"B11","DOI":"10.1007\/s005300050097"},{"unstructured":"Looney, C. (1999), \u201cFuzzy clustering: a new algorithm\u201d,Proceedings of INCOSE 99.","key":"B13"},{"doi-asserted-by":"publisher","key":"B15","DOI":"10.1109\/35.649333"},{"unstructured":"Sabata, B., Brown, M.J. and Denny, B.A. (1998), \u201cTransport protocol for reliable multicast: TRM\u201d,Proceedings of IASTED International Conference on Networks, pp. 143\u20105.","key":"B16"},{"doi-asserted-by":"crossref","unstructured":"Sato, F., Minamihata, K., Fukuoka, H., Mizuno, T. (1999), \u201cA reliable multicast framework for distributed virtual reality environments\u201d,Proceedings of the 1999 International Workshop on Parallel Processing.","key":"B17","DOI":"10.1109\/ICPPW.1999.800120"},{"doi-asserted-by":"crossref","unstructured":"Stuer, G., Broeckhove, J. and Arickx, F. (1999), \u201cA message oriented reliable multicast protocol for a distributed virtual environment\u201d,Proceedings of Incose 99.","key":"B18","DOI":"10.1142\/9781848160170_0081"},{"unstructured":"Stuer, G., Broeckhove, J. and Arickx, F. (2001a), \u201cDesign and Implementation of a reliable multicast protocol for distributed virtual environments written in Java\u201d,Proceedings of EuroMedia2001.","key":"B19"},{"unstructured":"Stuer, G., Broeckhove, J. and Arickx, F. (2001b), \u201cPerformance analysis of a reliable multicast protocol for virtual environments in Java\u201d,Proceedings of the 2001 International Conference on Parallel and Distributed Processing Techniques and Applications.","key":"B20"},{"doi-asserted-by":"crossref","unstructured":"Zyda, M.J. (1996), \u201cNetworking large scale virtual environments\u201d,Proceedings of Computer Animation 96.","key":"B22","DOI":"10.1109\/CA.1996.540480"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240310469024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/10662240310469024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:39:53Z","timestamp":1753400393000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/13\/2\/80-85\/185492"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["10.1108\/10662240310469024"],"URL":"https:\/\/doi.org\/10.1108\/10662240310469024","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}