{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:17:19Z","timestamp":1729653439063,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/ccnc.2013.6488466","type":"proceedings-article","created":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T20:50:51Z","timestamp":1365195051000},"page":"329-335","source":"Crossref","is-referenced-by-count":0,"title":["A multidimensional heuristic for social routing in peer-to-peer networks"],"prefix":"10.1109","author":[{"family":"Shuo Jia","sequence":"first","affiliation":[]},{"given":"Pierre","family":"St. Juste","sequence":"additional","affiliation":[]},{"given":"R. J.","family":"Figueiredo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"159","author":"killworth","year":"1978","journal-title":"Reverse Small World Experiment"},{"year":"0","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070102"},{"year":"0","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.11.019"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"journal-title":"Skype Brought Down by Double Whammy of Overloaded Servers Client Bugs","year":"2010","author":"bright","key":"15"},{"key":"16","first-page":"1","article-title":"Semantic overlay networks for p2p systems","author":"crespo","year":"2005","journal-title":"Proc of Third International Conference on Peer-to-Peer Computing"},{"key":"13","first-page":"46","author":"clarke","year":"2001","journal-title":"Freenet A distributed anonymous information storage and retrieval system"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.046135"},{"key":"11","first-page":"251","author":"douceur","year":"2002","journal-title":"The Sybil Attack"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064275"},{"key":"21","first-page":"2001","article-title":"Small-world phenomena and the dynamics of information","author":"kleinberg","year":"2001","journal-title":"Advances in Neural Information Processing Systems (NIPS) 14"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1126\/science.1081058"},{"year":"0","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1116869"},{"journal-title":"An Experimental Study of the Small World Problem","year":"1969","author":"travers","key":"1"},{"key":"10","first-page":"329","article-title":"Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems","author":"rowstron","year":"2001","journal-title":"Proceedings of the IFIP\/ACM International Conference on Distributed Systems Platforms Heidelberg"},{"key":"7","first-page":"127","article-title":"Symphony: Distributed hashing in a small world","author":"manku","year":"2003","journal-title":"Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2005.01.007"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335325"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0503018102"},{"key":"9","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1126\/science.1070120","article-title":"Identity and search in social networks","volume":"296","author":"watts","year":"2002","journal-title":"Science"},{"journal-title":"Distributed Routing in Small-World Networks","year":"2007","author":"sandberg","key":"8"}],"event":{"name":"2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2013,1,11]]},"location":"Las Vegas, NV","end":{"date-parts":[[2013,1,14]]}},"container-title":["2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6479731\/6488412\/06488466.pdf?arnumber=6488466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T10:54:24Z","timestamp":1498042464000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6488466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2013.6488466","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}