{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:13:49Z","timestamp":1725484429123},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/p2p.2010.5569959","type":"proceedings-article","created":{"date-parts":[[2010,9,15]],"date-time":"2010-09-15T21:15:30Z","timestamp":1284585330000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["IMP: ISP-Managed P2P"],"prefix":"10.1109","author":[{"given":"S.","family":"James","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Crowley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402999"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477946"},{"journal-title":"CTorrent 1 4 DEVEL","year":"0","key":"ref10"},{"year":"2009","key":"ref11","article-title":"Internet study 2008&#x2013;2009"},{"article-title":"The art of computer systems performance analysis: techniques for experimental design, measurement, simulation, and modeling","year":"1991","author":"jain","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378239"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330115"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1269899.1254919"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.6"},{"journal-title":"Open Network Lab","year":"2010","key":"ref17"},{"key":"ref18","article-title":"Pitfalls for ISP-friendly P2P design","author":"piatek","year":"2009","journal-title":"HotNets"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2006.76"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_10"},{"journal-title":"BitTorrent specification wiki Bittorrent protocol specification v1 0","year":"0","key":"ref4"},{"journal-title":"The Digital Millennium Copyright Act of 1998","first-page":"12","year":"1998","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.48"},{"key":"ref6","article-title":"Exploiting network proximity in distributed hash tables","author":"castro","year":"2002","journal-title":"FuDiCo"},{"journal-title":"Vuze 4 2 0 4 BitTorrent client","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"year":"2001","key":"ref8","article-title":"The Gnutella Protocol Specification v0.41"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1403000"},{"journal-title":"BitTorrent enhancement proposal 8 Tracker peer obfuscation version 11049","year":"2008","key":"ref2"},{"journal-title":"The BitTorrent Protocol Specification Version 11031","year":"2008","author":"cohen","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1273445.1273449"},{"key":"ref20","article-title":"Do incentives build robustness in BitTorrent?","author":"piatek","year":"2007","journal-title":"NSDI"},{"journal-title":"Sandvine Intelligent broadband network management","year":"0","key":"ref22"},{"year":"2007","key":"ref21","article-title":"Surge in encrypted torrents blindsides record biz"},{"year":"2009","key":"ref24","article-title":"BitTorrent's future? DHT, PEX and magnet links explained"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282391"},{"journal-title":"Torrent tracker list","year":"2010","key":"ref26"},{"journal-title":"Comcast can block BitTorrent again Court rules","year":"2010","key":"ref25"}],"event":{"name":"2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)","start":{"date-parts":[[2010,8,25]]},"location":"Delft, Netherlands","end":{"date-parts":[[2010,8,27]]}},"container-title":["2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5569876\/5569954\/05569959.pdf?arnumber=5569959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T03:09:59Z","timestamp":1489892999000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5569959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/p2p.2010.5569959","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}