{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:11:21Z","timestamp":1761401481746},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1109\/p2p.2009.5284527","type":"proceedings-article","created":{"date-parts":[[2009,10,12]],"date-time":"2009-10-12T19:42:06Z","timestamp":1255376526000},"page":"301-310","source":"Crossref","is-referenced-by-count":20,"title":["Pushing the performance of Biased Neighbor Selection through Biased Unchoking"],"prefix":"10.1109","author":[{"given":"Simon","family":"Oechsner","sequence":"first","affiliation":[]},{"given":"Frank","family":"Lehrieder","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Hossfeld","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Metzger","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Staehle","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"Pussep","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"P2P Systems and Applications","year":"2005","author":"steinmetz","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.433"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320218"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330115"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177106"},{"key":"13","article-title":"A new approach for managing traffic of overlay applications of the smoothIT project","author":"fernandez-palacios gimenez","year":"2008","journal-title":"International Conference on Autonomous Infrastructure Management and Security (AIMS)"},{"key":"14","article-title":"Narses: A scalable flow-based network simulator","author":"giuli","year":"2002","journal-title":"CoRR Cs PF\/0211024"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1403000"},{"journal-title":"BitTorrent Protocol Specification","year":"2005","author":"cohen","key":"12"},{"journal-title":"BitTorrent specification","year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402999"},{"year":"0","key":"2"},{"journal-title":"Application-Layer Traffic Optimization (alto)","year":"0","key":"1"},{"journal-title":"Pushing BitTorrent Locality to the Limit","year":"2008","author":"blond","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1273445.1273449"},{"journal-title":"Comcast Throttles Bittorrent Traffic Seeding Impossible","year":"2007","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.48"},{"journal-title":"Data Networks","year":"1987","author":"bertsekas","key":"8"}],"event":{"name":"2009 IEEE Ninth International Conference on Peer-to-Peer Computing (P2P)","start":{"date-parts":[[2009,9,9]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2009,9,11]]}},"container-title":["2009 IEEE Ninth International Conference on Peer-to-Peer Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5273785\/5284489\/05284527.pdf?arnumber=5284527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T03:17:22Z","timestamp":1489893442000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5284527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/p2p.2009.5284527","relation":{},"subject":[],"published":{"date-parts":[[2009,9]]}}}