{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:31:11Z","timestamp":1730212271143,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/cts.2007.4621755","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T16:23:49Z","timestamp":1221582229000},"page":"177-182","source":"Crossref","is-referenced-by-count":0,"title":["Design of a Desktop P2P Computing Platform for DAG"],"prefix":"10.1109","author":[{"given":"Fabien","family":"Hantz","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"From Heterogeneous Task Scheduling to Heterogeneous Mixed Data and Task Parallel Scheduling","year":"2003","author":"suter","key":"15"},{"journal-title":"Grid Computing Making the Global Infrastructure a Reality","year":"2003","author":"thain","key":"16"},{"year":"0","key":"13"},{"journal-title":"Seti home","year":"0","key":"14"},{"journal-title":"Java Security","year":"2001","author":"oaks","key":"11"},{"year":"2000","author":"shirky","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/863955.864000"},{"year":"0","key":"2"},{"key":"1","article-title":"high performance task distribution for volunteer computing, melbourne","author":"anderson","year":"2005","journal-title":"First IEEE International Conference on e-Science and Grid Technologies"},{"first-page":"51","year":"2003","author":"legrand","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/71.242154"},{"key":"6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-36162-6_1","article-title":"peer to peer: peering into the future","volume":"2497","author":"crowcroft","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Condor high througput computing","year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.572"},{"key":"8","first-page":"103","article-title":"going beyond the sandbox: an overview of the new security architecture in the java development kit 1.2","author":"gong","year":"1997","journal-title":"USENIX Symposium on Internet Technologies and Systems"}],"event":{"name":"2007 International Symposium on Collaborative Technologies and Systems (CTS)","start":{"date-parts":[[2007,5,25]]},"location":"Orlando, FL","end":{"date-parts":[[2007,5,25]]}},"container-title":["2007 International Symposium on Collaborative Technologies and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4607773\/4621707\/04621755.pdf?arnumber=4621755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T12:51:32Z","timestamp":1580820692000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4621755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cts.2007.4621755","relation":{},"subject":[],"published":{"date-parts":[[2007,5]]}}}