{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:24:51Z","timestamp":1729610691018,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icppw.2004.1328028","type":"proceedings-article","created":{"date-parts":[[2005,4,5]],"date-time":"2005-04-05T14:48:50Z","timestamp":1112712530000},"page":"273-281","source":"Crossref","is-referenced-by-count":1,"title":["P2P resource pool and its application to optimize wide-area application level multicasting"],"prefix":"10.1109","author":[{"family":"Zheng Zhang","sequence":"first","affiliation":[]},{"family":"Yu Chen","sequence":"additional","affiliation":[]},{"family":"Shi-Ding Lin","sequence":"additional","affiliation":[]},{"family":"Bo-Ying Lu","sequence":"additional","affiliation":[]},{"family":"Shu-Ming Shi","sequence":"additional","affiliation":[]},{"family":"Xing Xie","sequence":"additional","affiliation":[]},{"family":"Chun Yuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Using Random subsets to build scalable nethwork services","author":"kostic?","year":"0","journal-title":"USITS'03"},{"key":"35","article-title":"Peer-to-peer caching schemes to address hash crowds","author":"stading","year":"0","journal-title":"IPTPS'03"},{"year":"0","key":"17"},{"key":"36","doi-asserted-by":"crossref","DOI":"10.1145\/964723.383071","article-title":"Chord: A scalable peer-to-peer lookup service for Internet applications","author":"stoica","year":"2001","journal-title":"ACM SIGCOMM 2001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/5992.895191"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019370"},{"year":"0","key":"15"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/378344.378357"},{"key":"16","article-title":"Distributed computing economics","volume":"msr tr 2003 24","author":"gray","year":"2003","journal-title":"Microsoft Technical Report"},{"key":"39","article-title":"Leafset protocol in structured P2P systems and its application in peer selection","author":"zhang","year":"0","journal-title":"Microsoft Research Technical Report"},{"key":"13","article-title":"On death, taxes, and the convergence of peer-to-peer and grid computing","author":"foster","year":"0","journal-title":"IPTPS'03"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2001.945176"},{"journal-title":"Self-Organizing Subsets From Each According to His Abilities To Each According to His Needs","year":"0","author":"vahdat","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209240"},{"key":"38","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.1996.493353","article-title":"How to model an Internet-work","author":"zegura","year":"1996","journal-title":"IEEE INFOCOM'96"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019258"},{"key":"21","article-title":"Nettimer: A tool for measuring bottleneck link bandwidth","author":"lai","year":"0","journal-title":"USITS '01"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"43","article-title":"Approximate object location and spam filtering on peer-to-peer systems","author":"zhou","year":"2003","journal-title":"Proceedings of ACM\/lFlP\/USENIX International Middleware Conference (Middleware 2003)"},{"key":"42","article-title":"Tapestry: An infrastructure for fault-tolerant wide-area location and routing","author":"zhao","year":"2001","journal-title":"UC Berkeley Tech Report"},{"key":"41","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45172-3_16","article-title":"SOMO: Self-organized metadata overlay for resource management in P2P DHT","author":"zhang","year":"2003","journal-title":"Proc of the 1st Int Workshop on Peer-to-Peer Syst"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019387"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/378344.378347"},{"key":"22","article-title":"Scooped, again","author":"ledlie","year":"0","journal-title":"IPTPS'03"},{"key":"23","article-title":"Lighthouse for scalable distributed location","author":"pias","year":"0","journal-title":"IPTPS'03"},{"year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45546-9_2","article-title":"Application level multicast using content addressable networks","author":"ratnasamy","year":"2001","journal-title":"1st International Workshop on Networked Group Communication"},{"key":"27","article-title":"Topologically-aware overlay construction and server selection","author":"ratnasamy","year":"2002","journal-title":"IEEE INFOCOM 2002"},{"journal-title":"1st International Workshop on Peer-to-Peer Systems","year":"2002","author":"renesse","key":"28"},{"key":"29","article-title":"Efficient peer-to-peer keyword searching","author":"reynolds","year":"2003","journal-title":"Proceedings of ACM\/IFIP\/USENIX International Middleware Conference (Middleware 2003)"},{"key":"3","article-title":"PIC: Practical internet coordinates for distance estimation","author":"castro","year":"0","journal-title":"Microsoft Research Technical Report"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633045"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990064"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/90.700892"},{"key":"30","article-title":"Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems","author":"rowstron","year":"2001","journal-title":"18th IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware)"},{"journal-title":"The Condor Project","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339337"},{"key":"32","article-title":"A measurement study of peer-to-peer file sharing systems","author":"saroiu","year":"2002","journal-title":"Proceedings of Multimedia Conferencing and Networking"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803069"},{"key":"31","article-title":"Wide area cluster monitoring with ganglia","author":"sacerdoti","year":"0","journal-title":"Proceedings of the IEEE Cluster 2003 Conference"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945474"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/502051.502054"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2001.945188"}],"event":{"name":"Workshops on Mobile and Wireless Networking\/High Performance Scientific, Engineering Computing\/Network Design and Architecture\/Optical Networks Control and Management\/Ad Hoc and Sensor Networks\/Compile and Run Time Techniques for Parallel Computing ICPP 2004","location":"Montreal, QC, Canada"},"container-title":["Workshops on Mobile and Wireless Networking\/High Performance Scientific, Engineering Computing\/Network Design and Architecture\/Optical Networks Control and Management\/Ad Hoc and Sensor Networks\/Compile and Run Time Techniques for Parallel Computing ICPP 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9249\/29348\/01328028.pdf?arnumber=1328028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T14:00:51Z","timestamp":1497621651000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1328028\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/icppw.2004.1328028","relation":{},"subject":[]}}