{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:43:59Z","timestamp":1729676639819,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icacci.2013.6637277","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:21:09Z","timestamp":1383088869000},"page":"794-799","source":"Crossref","is-referenced-by-count":0,"title":["DisTree: A scheme for DHT"],"prefix":"10.1109","author":[{"given":"Niteesh","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510756"},{"key":"22","first-page":"1","author":"maenpaa","year":"2009","journal-title":"Study on Maintenance Operations in A Chord-based Peer-to-Peer Session Initiation Protocol Overlay Network"},{"year":"2009","key":"17"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571857"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v5i10.792","article-title":"Free riding on gnutella","author":"adar","year":"2000","journal-title":"First Monday"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1011767.1011794"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015507"},{"key":"16","first-page":"7","article-title":"Experiences with coralcdn: A five-year operational view","author":"freedman","year":"2010","journal-title":"Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803069"},{"key":"14","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1145\/502059.502053","article-title":"Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility","volume":"35","author":"rowstron","year":"2001","journal-title":"SIGOPS Oper Syst Rev"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502054"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"journal-title":"Kademlia A Peer-to-peer Information System Based on the XOR Metric","year":"2002","author":"maymounkov","key":"21"},{"key":"3","article-title":"A scalable content addressable network","author":"ratnasamy","year":"2000","journal-title":"Berkeley"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"2","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","article-title":"Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems","volume":"2218","author":"rowstron","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"10","first-page":"59","article-title":"Publius: A robust, tamperevident, censorship-resistant web publishing system","author":"waldman","year":"2000","journal-title":"Proc 9th USENIX Security Symposium"},{"key":"7","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/3-540-45748-8_15","article-title":"Serving dns using a peer-to-peer lookup service","volume":"2429","author":"cox","year":"2002","journal-title":"Peer-to-Peer Systems"},{"journal-title":"An experimental study of the skype peer-to-peer voip system","year":"2006","author":"guha","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","article-title":"Freenet: A distributed anonymous information storage and retrieval system","volume":"2009","author":"clarke","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"year":"2009","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"}],"event":{"name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2013,8,22]]},"location":"Mysore","end":{"date-parts":[[2013,8,25]]}},"container-title":["2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621059\/6637135\/06637277.pdf?arnumber=6637277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:01:58Z","timestamp":1498093318000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6637277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icacci.2013.6637277","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}