{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:29:44Z","timestamp":1725528584156},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/p2p.2011.6038755","type":"proceedings-article","created":{"date-parts":[[2011,10,13]],"date-time":"2011-10-13T16:40:25Z","timestamp":1318524025000},"page":"352-355","source":"Crossref","is-referenced-by-count":0,"title":["Pitfalls of re-sharing BitTorrent contents: The failure of daily pattern"],"prefix":"10.1109","author":[{"given":"Haiyang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xu","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiangchuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Strange Bedfellows: Community Identification in BitTorrent","author":"choffnes","year":"0","journal-title":"Proc USENIX IPTPS"},{"key":"ref11","article-title":"Strange Bedfellows: Community Identification in BitTorrent","author":"choffnes","year":"0","journal-title":"Proc USENIX IPTPS"},{"key":"ref12","article-title":"Do Incentives Build Robustness in BitTorrent?","author":"piatek","year":"0","journal-title":"Proc USENIX NSDI"},{"key":"ref13","article-title":"The Sybil Attack","author":"douceur","year":"0","journal-title":"Proc of the 1st Int Workshop on Peer-to-Peer Syst"},{"key":"ref14","article-title":"BitTorrent-like File Sharing Protocol Design","author":"fan","year":"0","journal-title":"Proc ICNP"},{"key":"ref15","article-title":"Exploiting BitTorrent for fun (but not profit)","author":"liogkas","year":"0","journal-title":"Proc USENIX IPTPS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1016527.1016537"},{"key":"ref4","article-title":"BitTorrent Darknets","author":"dhungel","year":"0","journal-title":"Proc IEEE InfoCom"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080198"},{"key":"ref6","article-title":"One Hop Reputations for Peer to Peer File Sharing Workloads","author":"piatek","year":"0","journal-title":"Proc NSDI"},{"key":"ref5","article-title":"Modeling and Performance Analysis of Bit Torrent-Like Peer-to-Peer Networks","author":"qiu","year":"0","journal-title":"Proc ACM Sigcomm"},{"key":"ref8","article-title":"The Evolution of Cooperation","author":"axelrod","year":"1985","journal-title":"Basic Books"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658954"},{"key":"ref2","article-title":"Dynamic Swarm Management for Improved BitTorrent Performance","author":"dan","year":"0","journal-title":"Proc USENIX IPTPS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330113"},{"key":"ref9","article-title":"Public and Private BitTorrent Communities: A measurement Study","author":"meulpolder","year":"0","journal-title":"Proc USENIX IPTPS"}],"event":{"name":"2011 IEEE International Conference on Peer-to-Peer Computing (P2P)","start":{"date-parts":[[2011,8,31]]},"location":"Kyoto, Japan","end":{"date-parts":[[2011,9,2]]}},"container-title":["2011 IEEE International Conference on Peer-to-Peer Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6030112\/6038647\/06038755.pdf?arnumber=6038755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:40:08Z","timestamp":1490060408000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6038755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/p2p.2011.6038755","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}