{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:51:42Z","timestamp":1742381502536},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/p2p.2011.6038666","type":"proceedings-article","created":{"date-parts":[[2011,10,13]],"date-time":"2011-10-13T12:40:25Z","timestamp":1318509625000},"page":"92-101","source":"Crossref","is-referenced-by-count":6,"title":["Adaptive load balancing in KAD"],"prefix":"10.1109","author":[{"given":"Damiano","family":"Carra","sequence":"first","affiliation":[]},{"given":"Moritz","family":"Steiner","sequence":"additional","affiliation":[]},{"given":"Pietro","family":"Michiardi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72990-7_53"},{"key":"ref11","article-title":"Load balancing in strucured p2p systems","author":"rao","year":"0","journal-title":"Proc of IPTPS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2010.22"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1290168.1290176"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2008.28"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-009-0053-7"},{"key":"ref16","article-title":"Load reduction in the KAD peer-to-peer system","author":"steiner","year":"0","journal-title":"Proc of DBISP2P"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2009053"},{"key":"ref18","article-title":"An efficient load balancing scheme for resilient search in kad peer to peer networks","author":"wang","year":"0","journal-title":"Proc IEEE MIC"},{"key":"ref19","article-title":"Attacking the kad network: real world evaluation and high fidelity simulation using dvn","author":"wang","year":"2010","journal-title":"Security and Comm Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364690"},{"key":"ref3","article-title":"Simple load balancing for distributed hash tables","author":"byers","year":"0","journal-title":"Proc of IPTPS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497926"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354648"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284547"},{"journal-title":"KAD Load Balancing Simulator","year":"0","key":"ref7"},{"key":"ref2","article-title":"Dynamic load balancing in distributed hash tables","author":"bienkowski","year":"0","journal-title":"Proc of IPTPS"},{"year":"0","key":"ref1"},{"key":"ref9","article-title":"Kademlia: A Peer-to-peer information system based on the XOR metric","author":"maymounkov","year":"0","journal-title":"Proc of IPTPS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2008.04.008"},{"key":"ref21","article-title":"Effective load balancing in p2p systems","author":"xu","year":"0","journal-title":"Proc IEEE CCGRID"}],"event":{"name":"2011 IEEE International Conference on Peer-to-Peer Computing (P2P)","start":{"date-parts":[[2011,8,31]]},"location":"Kyoto, Japan","end":{"date-parts":[[2011,9,2]]}},"container-title":["2011 IEEE International Conference on Peer-to-Peer Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6030112\/6038647\/06038666.pdf?arnumber=6038666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T22:22:25Z","timestamp":1490048545000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6038666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/p2p.2011.6038666","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}