{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:51:50Z","timestamp":1747806710399},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/nca.2004.1347755","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T11:28:24Z","timestamp":1099913304000},"page":"5-14","source":"Crossref","is-referenced-by-count":23,"title":["Araneola: a scalable reliable multicast system for dynamic environments"],"prefix":"10.1109","author":[{"given":"R.","family":"Melamed","sequence":"first","affiliation":[]},{"given":"I.","family":"Keidar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2004.1347755"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571857"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238054"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209234"},{"key":"16","article-title":"Gossip versus deterministically constrained flooding on small networks","author":"lin","year":"2000","journal-title":"Disc"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335325"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945473"},{"key":"11","article-title":"Koorde: A simple degree-optimal hash table","author":"kaashoek","year":"2003","journal-title":"IPTPS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1189583"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774772"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1145\/263105.263155","article-title":"End-to-end Internet packet dynamics","author":"paxson","year":"1997","journal-title":"SIGCOMM"},{"key":"22","article-title":"A measurement study of peer-to-peer file sharing systems","author":"saroiu","year":"2002","journal-title":"MCN"},{"key":"23","article-title":"Structure management for scalable overlay service construction","author":"shen","year":"2004","journal-title":"NSDI"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060313"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721335.010"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312207"},{"key":"2","article-title":"Understanding availability","author":"bhagwan","year":"2003","journal-title":"IPTPS"},{"key":"10","article-title":"Overcast: Reliable multicasting with an overlay network","author":"jannotti","year":"2000","journal-title":"OSDI"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1996.546190"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941428"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/863955.864000"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803069"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945474"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00015-3"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/BF01275669"}],"event":{"name":"Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings.","location":"Boston, MA, USA"},"container-title":["Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9330\/29641\/01347755.pdf?arnumber=1347755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:38:28Z","timestamp":1497598708000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1347755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/nca.2004.1347755","relation":{},"subject":[]}}