{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:59:30Z","timestamp":1729645170228,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aiccsa.2005.1387016","type":"proceedings-article","created":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T15:16:50Z","timestamp":1112368610000},"page":"47-54","source":"Crossref","is-referenced-by-count":3,"title":["RNG-based searching and broadcasting algorithms over internet graphs and peer-to-peer computing systems"],"prefix":"10.1109","author":[{"given":"O.","family":"Escalante","sequence":"first","affiliation":[]},{"given":"T.","family":"Perez","sequence":"additional","affiliation":[]},{"given":"J.","family":"Solano","sequence":"additional","affiliation":[]},{"given":"I.","family":"Stojmenovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2000.892042"},{"journal-title":"OSPF protocol charter","year":"0","author":"moy","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(82)90070-X"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2002.1021797"},{"journal-title":"BRITE Universal Topology Generation From A User's Perspective","year":"2001","author":"medina","key":"16"},{"journal-title":"Gossip Versus Deterministic Flooding Low Message Overhead and High Reliability for Broadcasting on Small Networks","year":"1999","author":"lin","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.2316\/Journal.202.2005.4.202-1540"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/BF02247943"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209193"},{"journal-title":"Routing and Data Location in Overlay Peer-to-peer Networks","year":"2002","author":"rinaldi","key":"21"},{"key":"20","article-title":"The cost of application-level broad-cast in a fully decentralized peer-to-peer network","author":"portmann","year":"2002","journal-title":"ISCC 2002"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/584066.584069"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(80)90066-7"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/49.12889"},{"key":"25","article-title":"DIP: Distance information protocol for IDMaps","author":"jin","year":"2003","journal-title":"IEEE Int Symp on Comp & Comm ISCC"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/90.958323"},{"key":"27","article-title":"Location-aware topology matching in P2P systems","author":"liu","year":"2004","journal-title":"IEEE INFOCOM"},{"key":"3","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emerge of scaling in random networks","volume":"286","author":"baraba?si","year":"1999","journal-title":"Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/606272.606299"},{"journal-title":"Modeling large-scale peer-to-peer networks and a case study of gnutella","year":"2000","author":"jovanovic","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832534"},{"key":"6","article-title":"Yappers: A peer-to-peer lookup service over arbitrary topology","author":"ganesan","year":"2003","journal-title":"INFOCOM"},{"key":"5","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/316194.316229","article-title":"On power-law relationships of the internet topology","author":"faloutsos","year":"1999","journal-title":"SIGCOMM"},{"journal-title":"Intelligent Flooding over the Internet","year":"2002","author":"escalante-mendieta","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/5.163414"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313529"}],"event":{"name":"The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005.","location":"Cairo, Egypt"},"container-title":["The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9525\/30191\/01387016.pdf?arnumber=1387016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T13:53:11Z","timestamp":1497621191000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1387016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2005.1387016","relation":{},"subject":[]}}