{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:30:44Z","timestamp":1760596244979,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icccn.2015.7288458","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T22:06:14Z","timestamp":1444082774000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["RIMBED: Recommendation Incentive Mechanism Based on Evolutionary Dynamics in P2P Networks"],"prefix":"10.1109","author":[{"given":"Xing","family":"Jin","sequence":"first","affiliation":[]},{"given":"MingChu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guanghai","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yongli","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.151"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.08.034"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167344"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.08.014"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1560","DOI":"10.1126\/science.1133755","article-title":"Five rules for the evolution of cooperation","volume":"314","author":"nowak","year":"2006","journal-title":"Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/359826a0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.09.005"},{"journal-title":"Personalized Recommendation in Social Tagging Systems Using Hierarchical Clustering Assoc Computing Machinery","year":"2008","author":"shepitsen","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00062"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.83.036101"},{"key":"ref4","first-page":"571","article-title":"A recommendation-based peer-to-peer trust model","volume":"15","author":"dou","year":"2004","journal-title":"Journal of Software"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.08.052"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.09.018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.872882"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2005.31"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.11.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0064941"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v5i10.792","article-title":"Free riding on gnutella","volume":"5","author":"adar","year":"2000","journal-title":"First Monday"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.12.025"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.08.010"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.comcom.2010.01.021","article-title":"P2p soft security: On evolutionary dynamics of p2p incentive mechanism","volume":"34","author":"yufeng","year":"2011","journal-title":"Computer Communications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2146262"},{"key":"ref23","first-page":"367","volume":"20","author":"zhao","year":"2012","journal-title":"A mathematical framework for analyzing adaptive incentive protocols in p2p networks Networking IEEE\/ACM Transactions"}],"event":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2015,8,3]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2015,8,6]]}},"container-title":["2015 24th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7287473\/7288342\/07288458.pdf?arnumber=7288458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:49:09Z","timestamp":1498250949000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7288458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icccn.2015.7288458","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}