{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:03:34Z","timestamp":1774541014900,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/infocom.2015.7218668","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T17:33:36Z","timestamp":1440437616000},"page":"2758-2766","source":"Crossref","is-referenced-by-count":57,"title":["Ricci curvature of the Internet topology"],"prefix":"10.1109","author":[{"given":"Chien-Chun","family":"Ni","sequence":"first","affiliation":[]},{"given":"Yu-Yao","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"David Gu","sequence":"additional","affiliation":[]},{"given":"Emil","family":"Saucan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"barab\u00e1si","year":"1999","journal-title":"Science"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"ref33","article-title":"IBM ILOG CPLEX optimization studio v12.3","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633039"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"56122","DOI":"10.1103\/PhysRevE.70.056122","article-title":"Models of social networks based on social distance attachment","volume":"70","author":"bogu\u00f1\u00e1","year":"2004","journal-title":"Physical Review E"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","article-title":"On random graphs","volume":"6","author":"erd?s","year":"1959","journal-title":"Publicationes Mathematicae"},{"key":"ref36","first-page":"1","article-title":"Ollivier's Ricci Curvature, Local Clustering and Curvature-Dimension Inequalities on Graphs","author":"jost","year":"2011","journal-title":"Discrete & Computational Geometry"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.07.017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/4236.978369","article-title":"Mapping the gnutella network","volume":"6","author":"ripeanu","year":"2002","journal-title":"IEEE Internet Computing"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/90.958323"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018450"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/978-3-642-23822-2_27","article-title":"Investigating the openpgp web of trust","volume":"6879","author":"ulrich","year":"2011","journal-title":"Computer Security ESORICS 2011 ser Lecture Notes in Computer Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.84.066108"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s000390050009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9586-7_3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2007.03.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2010.554320"},{"key":"ref18","first-page":"97","article-title":"Greedy routing with guaranteed delivery using ricci flows","author":"sarkar","year":"2009","journal-title":"Proc of the 8th International Symposium on Information Processing in Sensor Networks (IPSN'09)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4310\/MRL.1996.v3.n6.a8"},{"key":"ref28","article-title":"Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design","author":"ripeanu","year":"2002","journal-title":"IEEE Internet Computing Journal"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.815300"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1232722.1232727"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316229"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.965863"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1145\/2487788.2488173","article-title":"KONECT - The Koblenz Network Collection","author":"kunegis","year":"2013","journal-title":"Proc of the 21st Int'l Conf Companion on World Wide Web"},{"key":"ref5","article-title":"University of Oregon route views project","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096546"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504735"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2748\/tmj\/1325886283"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfa.2008.11.001"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462131"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0075847"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2023322"},{"key":"ref22","article-title":"On the geometry of metric measure spaces - Springer","author":"sturm","year":"2006","journal-title":"Acta Mathematica"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062083"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4007\/annals.2009.169.903"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.838597"},{"key":"ref24","article-title":"A rough curvature-dimension condition for metric measure spaces - Springer","author":"bonciocat","year":"2014","journal-title":"Central European Journal of Mathematics"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019258"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfa.2009.01.029"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354510"},{"key":"ref26","article-title":"Stanford large network dataset collection","year":"0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2004.70"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfa.2008.11.001"}],"event":{"name":"IEEE INFOCOM 2015 - IEEE Conference on Computer Communications","location":"Kowloon, Hong Kong","start":{"date-parts":[[2015,4,26]]},"end":{"date-parts":[[2015,5,1]]}},"container-title":["2015 IEEE Conference on Computer Communications (INFOCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7172813\/7218353\/07218668.pdf?arnumber=7218668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T07:05:34Z","timestamp":1691910334000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7218668\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/infocom.2015.7218668","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}