{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:51:08Z","timestamp":1729644668397,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ftdcs.2003.1204328","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T16:27:43Z","timestamp":1087921663000},"page":"159-165","source":"Crossref","is-referenced-by-count":2,"title":["Looking for a common view for mobile worlds"],"prefix":"10.1109","author":[{"given":"M.","family":"Gradinariu","sequence":"first","affiliation":[]},{"given":"M.","family":"Raynal","sequence":"additional","affiliation":[]},{"given":"G.","family":"Simon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012363200403"},{"key":"ref32","article-title":"A k-mutual exclusion algorithm for ad-hoc mobile networks","author":"walter","year":"2001","journal-title":"Proceedings of the Workshop on Principles of Mobile Computing (POMC'01)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1018018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"article-title":"Designing a Super-Peer Networks","year":"2002","author":"yang","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/584490.584508"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1094876"},{"journal-title":"Gnutella Website","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/105474699566026"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s004460100054"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/305619.305649"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/376868.376889"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2002.1030849"},{"key":"ref19","first-page":"264","article-title":"Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-Hop Networks","author":"li","year":"2001","journal-title":"Proceedings of ACM Symposium on Principles of Distributed Computing (PODC"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/3-540-45546-9_2","article-title":"Application level muticast using content addressable networks","author":"ratnasamy","year":"2001","journal-title":"Proc of the Third International Workshop on Networked Group Communication"},{"key":"ref4","first-page":"100","article-title":"Scribe: A large-scale and descetralized application-level multicast infrastructure","volume":"20","author":"castro","year":"2001","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/9789814350938_0018"},{"key":"ref6","article-title":"Freenet: A distributed anonymous information storage and retrieval system","author":"clarke","year":"2000","journal-title":"Proceedings of the ICSI Workshop on Design Issues in Anonymity and Unobservability"},{"key":"ref29","article-title":"Pastry: Scalable distributed object location and routing for large-scale peer-to-peer systems","author":"rowstrom","year":"2001","journal-title":"International Conference on Distributed Systems Platforms (Middleware)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/584490.584499"},{"article-title":"Dynamic Graph Algorithms","year":"1996","author":"eppstein","key":"ref8"},{"key":"ref7","first-page":"45","article-title":"Distributed computing on the move: from mobile computing to cooperative robotics and nanorobotics","author":"defago","year":"2001","journal-title":"Proceedings of the Workshop on Principles of Mobile Computing (POMC'01)"},{"key":"ref2","article-title":"Efficient and Precise Support for Large Multi-User Virtual Environment","author":"barrus","year":"1996","journal-title":"MIT Research Laboratory of Electronics Technical Report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/0967-1846\/5\/3\/002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/584490.584505"},{"key":"ref20","first-page":"233","article-title":"Analysis of the Evolution of Peer-to-Peer Systems","author":"liben","year":"2002","journal-title":"Proceedings of ACM Symposium on Principles of Distributed Computing (PODC"},{"article-title":"A Network Software Architecture for Large Scale Virtual Environments","year":"1995","author":"macedonia","key":"ref22"},{"article-title":"Distributed algorithms","year":"1996","author":"lynch","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1997.631180"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/345848.345871"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2000.840515"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1998.740505"}],"event":{"name":"The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, 2003. FTDCS 2003.","location":"San Juan, Puerto Rico"},"container-title":["The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, 2003. FTDCS 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8565\/27118\/01204328.pdf?arnumber=1204328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:15:34Z","timestamp":1497586534000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1204328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ftdcs.2003.1204328","relation":{},"subject":[]}}