{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:21:45Z","timestamp":1729646505301,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/infcom.2005.1498488","type":"proceedings-article","created":{"date-parts":[[2005,8,24]],"date-time":"2005-08-24T14:00:58Z","timestamp":1124892058000},"page":"2124-2134","source":"Crossref","is-referenced-by-count":8,"title":["Network overlay construction under limited end-to-end reachability"],"prefix":"10.1109","volume":"3","author":[{"family":"Wenjie Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Cheng Jin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Jamin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/BF02189308"},{"key":"17","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","article-title":"Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems","volume":"2218","author":"rowstron","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8897-3"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1145\/383059.383071","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","author":"stoica","year":"2001","journal-title":"Proceedings of the 2001 conference on Applications technologies architectures and protocols for computer communications"},{"journal-title":"Computers and Intractability","year":"1979","author":"garey","key":"33"},{"key":"15","article-title":"Topology-aware routing in structured peer-to-peer overlay networks","author":"castro","year":"2002","journal-title":"Int Workshop on Future Directions in Distributed Computing"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/90.879344"},{"key":"16","article-title":"The impact of DHT routing geometry on resilience and proximity","author":"gummadi","year":"2002","journal-title":"ACM SIGCOMM 02"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948211"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1005847.1005860"},{"journal-title":"FastTrack","year":"0","key":"14"},{"key":"37","article-title":"Network overlay construction under limited end-to-end addressability","volume":"cse tr 489 4","author":"wang","year":"2004","journal-title":"Technical Report"},{"key":"11","article-title":"Characterizing guarded hosts in peer-to-peer file sharing systems","author":"wang","year":"2004","journal-title":"IEEE Global Internet and Next Generation Networks Symposium"},{"key":"38","article-title":"Evaluation and characterization of available bandwidth probing techniques","volume":"21","author":"hu","year":"2003","journal-title":"IEEE JSAC Special Issue in Internet and WWW Measurement Mapping and Modeling"},{"key":"12","article-title":"Early experience with an internet broadcast system based on overlay multicast","author":"chu","year":"2004","journal-title":"USENIX Annual Technical Conference"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"20","article-title":"Tapestry: An infrastructure for fault-tolerant wide-area location and routing","volume":"ucb csd 1 1141","author":"zhao","year":"2001","journal-title":"Technical Report"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1145\/964723.383065","article-title":"IPNL: A NAT-extened internet architecture","author":"francis","year":"2001","journal-title":"Proc of ACM SIGCOMM '01"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944770"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944763"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383064"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339426"},{"key":"27","article-title":"Inet-3.0: Internet topology generator","volume":"cse tr 456 2","author":"winick","year":"2002","journal-title":"Technical Report"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/35.587723"},{"key":"29","article-title":"A measurement study of peer-to-peer file sharing systems","author":"saroiu","year":"2002","journal-title":"MMCN'02"},{"key":"3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/345063.339337","article-title":"A case for end system multicast","author":"chu","year":"2000","journal-title":"ACM SIGMETRICS"},{"year":"0","key":"2"},{"key":"10","article-title":"The IP Network Address Translator (NAT)","author":"egevang","year":"1994","journal-title":"RFC 1631"},{"year":"0","key":"1"},{"key":"30","article-title":"Reliable audio for use over the internet","author":"hardman","year":"1995","journal-title":"Proc of INET"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633045"},{"key":"6","article-title":"Host multicast: A framework delivering multicast to end users","author":"zhang","year":"2002","journal-title":"Proc of IEEE INFOCOM '02"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1996.548477"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/566500.566512"},{"key":"4","article-title":"Overlay optimizations for end-host multicast","author":"wang","year":"2002","journal-title":"Networked Group Communication"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208964"},{"key":"8","article-title":"Yoid: Extending the internet multicast architecture","author":"francis","year":"2000","journal-title":"Unrefereed report"}],"event":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","location":"Miami, FL, USA"},"container-title":["Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9990\/32101\/01498488.pdf?arnumber=1498488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T07:02:07Z","timestamp":1706511727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1498488\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/infcom.2005.1498488","relation":{},"subject":[]}}