{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T04:46:00Z","timestamp":1764132360196,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/ipdps.2006.1639493","type":"proceedings-article","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T19:59:56Z","timestamp":1152561596000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":9,"title":["Tree-based overlay networks for scalable applications"],"prefix":"10.1109","author":[{"given":"D.C.","family":"Arnold","sequence":"first","affiliation":[]},{"given":"G.D.","family":"Pack","sequence":"additional","affiliation":[]},{"given":"B.P.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/545151.545177"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/358923.358934"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1627-9"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289588"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1031120.1031121"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/BF01231602"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"11","first-page":"306","article-title":"Lilith: Scalable execution of user code for distributed computing","author":"evensky","year":"1997","journal-title":"International Symposium on High Performance Distributed Computing (HPDC '97)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055330"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060303"},{"key":"20","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Fifth Berkeley Symposium on Mathematical Statistics and Probability"},{"key":"22","first-page":"215","article-title":"Scalable cluster administration: Chiba city i approach and lessons learned","author":"navarro","year":"2002","journal-title":"IEEE International Conference on Cluster Computing (Cluster 2006)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1048935.1050172"},{"article-title":"The distributed performance consultant and the sub-graph folding algorithm: On-line automated performance diagnosis on thousands of processes","year":"0","author":"roth","key":"24"},{"key":"25","first-page":"289","article-title":"Wide area cluster monitoring with ganglia","author":"sacerdoti","year":"2003","journal-title":"IEEE International Conference on Cluster Computing (CLUSTER 2003)"},{"key":"26","first-page":"39","article-title":"Supermon: A high-speed cluster monitoring system","author":"sottile","year":"2002","journal-title":"IEEE International Conference on Cluster Computing (Cluster 2006)"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1065385.1065432"},{"key":"28","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1145\/1073204.1073259","article-title":"High performance imaging using large camera arrays","volume":"24","author":"wilburn","year":"2005","journal-title":"ACM Transactions on Graphics"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1023\/B:APIN.0000033637.51909.04"},{"key":"3","article-title":"Ygdrasil: Aggregator network toolkit for the grid","author":"balle","year":"2004","journal-title":"in a minisymposium at Workshop on State-of-the-art in Scientific Computing"},{"article-title":"Zero-cost reliability for tree-based overlay networks","year":"2005","author":"arnold","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2001.937550"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/34.400568"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ACV.1998.732882"},{"journal-title":"Special Section on Data Mining for Intrusion Detection and Threat Analysis volume 30(4) of ACM SIGMOD Record","first-page":"4","year":"2001","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790416"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1997.609410"}],"event":{"name":"Proceedings 20th IEEE International Parallel & Distributed Processing Symposium","start":{"date-parts":[[2006,4,25]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2006,4,29]]}},"container-title":["Proceedings 20th IEEE International Parallel &amp; Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10917\/34366\/01639493.pdf?arnumber=1639493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T07:23:00Z","timestamp":1497684180000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1639493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2006.1639493","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}