{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T18:13:46Z","timestamp":1770488026886,"version":"3.49.0"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 108-2634-F-492-001"],"award-info":[{"award-number":["MOST 108-2634-F-492-001"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Center for High-Performance Computing in Taiwan"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3052525","type":"journal-article","created":{"date-parts":[[2021,2,7]],"date-time":"2021-02-07T10:34:00Z","timestamp":1612694040000},"page":"21043-21058","source":"Crossref","is-referenced-by-count":3,"title":["A BitTorrent Mechanism-Based Solution for Massive System Deployment"],"prefix":"10.1109","volume":"9","author":[{"given":"Steven J. H.","family":"Shiau","sequence":"first","affiliation":[]},{"given":"Yu-Chiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yu-Chin","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Chen-Kai","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Ching-Hsuan","family":"Yen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7673-6880","authenticated-orcid":false,"given":"Chi-Yo","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1449956.1450040"},{"key":"ref38","article-title":"Bitocast: A hybrid BitTorrent and IP multicast content distribution solution","author":"silva","year":"2009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-013-0139-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.7763\/IJIEE.2014.V4.434"},{"key":"ref31","author":"cougias","year":"2003","journal-title":"The Backup Book Disaster Recovery From Desktop to Data Center"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2014.6903792"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2010.5431979"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2008.32"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.15546\/aeei-2016-0002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-013-0236-0"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.09.014"},{"key":"ref62","year":"2013","journal-title":"Cecill and Free Software"},{"key":"ref61","author":"stallman","year":"2002","journal-title":"Free Software Free Society Selected Essays of Richard M Stallman"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2755-7_3"},{"key":"ref63","year":"2020","journal-title":"SmartDeploy Solution"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.46"},{"key":"ref64","author":"stokes","year":"2016","journal-title":"Mastering the Microsoft Deployment Toolkit"},{"key":"ref65","author":"inc","year":"2020","journal-title":"EZ-Backup System"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.13"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02911-9"},{"key":"ref67","first-page":"48","article-title":"Japan&#x2019;s flagship 2020 &#x2018;Post-K&#x2019; system","volume":"21","author":"sorensen","year":"2019","journal-title":"IEEE Ann Hist Comput"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3311790.3396637"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.722"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0177459"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1996109.1996119"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7753\/IJCATR0607.1004"},{"key":"ref24","first-page":"27","article-title":"An innovative approach to bridge a skill gap and grow a workforce pipeline: The Computer System, Cluster, and Networking Summer Institute","volume":"2","author":"connor","year":"2016","journal-title":"USENIX J Edu Syst Admin"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2020.2967309"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.7472\/jksii.2016.17.5.67"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1714","DOI":"10.1016\/j.procs.2015.05.310","article-title":"Developing high performance computing resources for teaching cluster and grid computing courses","volume":"51","author":"holmes","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref50","first-page":"47","author":"tracey","year":"2019","journal-title":"Proc IEEE 5th World Forum Internet Things (WF-IoT)"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01453-5"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.021110.00036"},{"key":"ref58","year":"2010","journal-title":"Network Booting Preboot Execution Environment Bootstrap Protocol Netboot Gpxe Remote Initial Program Load"},{"key":"ref57","year":"2020","journal-title":"Massive Deployment Using the BDMfRD Mechanism"},{"key":"ref56","year":"2020","journal-title":"Clonezilla Project"},{"key":"ref55","author":"drok","year":"2016","journal-title":"Cut Ironic Provisioning Time Using Torrents"},{"key":"ref54","author":"shestakov","year":"2016","journal-title":"Patch File to Allow User to Provision Image Using Bittorrent Protocol in OpenStack"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz125"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/s20061656"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/app9020296"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.88"},{"key":"ref40","first-page":"38","article-title":"Kadeploy3: Efficient and scalable operating system provisioning for clusters","volume":"38","author":"jeanvoine","year":"2013","journal-title":"USENIX login"},{"key":"ref12","first-page":"101","article-title":"A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications","author":"schollmeier","year":"2001","journal-title":"Proc 1st Int Conf Peer Peer Comput"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E97.D.2174"},{"key":"ref14","year":"2019","journal-title":"Partclone Project"},{"key":"ref15","year":"2018","journal-title":"EZIO Project"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16486-1_82"},{"key":"ref17","first-page":"1844","article-title":"Bare metal cloud builder","volume":"2","author":"aswani","year":"2016","journal-title":"Imperial J Interdiscipl Res"},{"key":"ref18","first-page":"228","article-title":"An introduction to Docker and analysis of its performance","volume":"17","author":"rad","year":"2017","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.100"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.7.1691-1695"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/app8060965"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370630"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.01.011"},{"key":"ref8","article-title":"Method and apparatus for operating system deployment","author":"danielsen","year":"2009"},{"key":"ref7","article-title":"System and method for operating system deployment in a peer-to-peer computing environment","author":"chalemin","year":"2008"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5723"},{"key":"ref9","year":"2020","journal-title":"TOP CPR Computer Recovery Card"},{"key":"ref46","first-page":"182","author":"wierzbicki","year":"2004","journal-title":"Proc IEEE Int Symp Cluster Comput and the Grid (CCGrid)"},{"key":"ref45","first-page":"99","article-title":"Peer-to-peer architecture case study: Gnutella network","author":"ripeanu","year":"2001","journal-title":"Proc 1st Int Conf Peer Peer Comput"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177106"},{"key":"ref47","first-page":"68","article-title":"Incentives build robustness in BitTorrent","volume":"6","author":"cohen","year":"2003","journal-title":"Proc Workshop Econ Peer Peer Syst"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986616"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096550"},{"key":"ref44","first-page":"224","article-title":"The eDonkey file-sharing network","volume":"51","author":"heckmann","year":"2004"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"172","DOI":"10.14419\/ijet.v7i4.36.23739","article-title":"Performance comparison between TCP and UDP protocols in different simulation scenarios","volume":"7","author":"al-dhief","year":"2018","journal-title":"Int J Eng Technol"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09328243.pdf?arnumber=9328243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T19:18:43Z","timestamp":1724440723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9328243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3052525","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}