{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:42:22Z","timestamp":1742395342429,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/infcom.2005.1497894","type":"proceedings-article","created":{"date-parts":[[2005,8,24]],"date-time":"2005-08-24T10:00:58Z","timestamp":1124877658000},"page":"225-236","source":"Crossref","is-referenced-by-count":17,"title":["A performance vs. cost framework for evaluating DHT design tradeoffs under churn"],"prefix":"10.1109","volume":"1","author":[{"family":"Jinyano Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Stribling","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Morris","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.F.","family":"Kaashock","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T.A.","family":"Gil","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637203"},{"key":"22","article-title":"Operating systems support for planetary-scale network services","author":"bavier","year":"2004","journal-title":"Proceedings of the 1st NSDI"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"23","article-title":"Exploiting network proximity in peer-to-peer overlay networks","volume":"msr tr 2002 82","author":"castro","year":"2002","journal-title":"Microsoft Research Tech Rep"},{"key":"18","article-title":"Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems","author":"rowstron","year":"2001","journal-title":"Proceedings of the 18th IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware 2001)"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209238"},{"key":"15","article-title":"Scalability in adaptive multimetric overlays","author":"rodriguez","year":"2004","journal-title":"Proceedings of the 24th ICDCS"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/564875.564877"},{"key":"13","article-title":"Designing a DHT for low latency and high throughput","author":"dabek","year":"2004","journal-title":"Proceedings of the 1st NSDI"},{"key":"14","article-title":"Exploring tradeoffs in failure detection in routing overlays","volume":"ucb csd 3 1285","author":"zhuang","year":"2003","journal-title":"Tech Rep"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"12","article-title":"Total recall: System support for automated availability management","author":"bhagwan","year":"2004","journal-title":"Proceedings of the 1st NSDI"},{"key":"21","article-title":"Examining the tradeoffs of structured overlays in a dynamic non-transitive network","author":"gerding","year":"2003","journal-title":"ML class project"},{"key":"3","article-title":"Handling churn in a DHT","author":"rhea","year":"2004","journal-title":"Proceedings of the 2004 USENIX Technical Conference"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510756"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571863"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863998"},{"key":"10","article-title":"Efficient routing for peer-to-peer overlays","author":"gupta","year":"2004","journal-title":"Proceedings of the 1st NSDI"},{"key":"7","first-page":"149","article-title":"Chord: A scalable peer-to-peer lookup protocol for Internet applications","author":"stoica","year":"2002","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"6","article-title":"Comparing the performance of distributed hash tables under churn","author":"li","year":"2004","journal-title":"Proc of the 1st Int Workshop on Peer-to-Peer Syst"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005712"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311872"},{"key":"9","article-title":"Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead","author":"gupta","year":"2003","journal-title":"Proceedings of the 2nd IPTPS"},{"key":"8","article-title":"Kademlia: A peer-to-peer information system based on the XOR metric","author":"maymounkov","year":"2002","journal-title":"Proceedings of the 1st IPTPS"}],"event":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","location":"Miami, FL, USA"},"container-title":["Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9990\/32099\/01497894.pdf?arnumber=1497894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T22:13:43Z","timestamp":1489529623000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1497894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/infcom.2005.1497894","relation":{},"subject":[]}}