{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:02:26Z","timestamp":1725706946857},"reference-count":55,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/p2p.2013.6688710","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T18:33:31Z","timestamp":1388774011000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Experimental analyses of data distribution on data center networks"],"prefix":"10.1109","author":[{"given":"Shakir","family":"James","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick","family":"Crowley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"35","DOI":"10.1145\/1477942.1477946"},{"year":"2011","journal-title":"Cisco Data Center Design-IP Network Infrastructure","key":"36"},{"year":"0","journal-title":"The TCP\/UDP Bandwidth Measurement Tool","key":"33"},{"year":"0","journal-title":"Open Network Lab","key":"34"},{"doi-asserted-by":"publisher","key":"39","DOI":"10.1109\/HOTWEB.2006.355259"},{"doi-asserted-by":"publisher","key":"37","DOI":"10.1007\/s10951-007-0017-9"},{"year":"2008","author":"kurose","journal-title":"Computer Networking A Top-down Approach","key":"38"},{"doi-asserted-by":"publisher","key":"43","DOI":"10.1145\/1015467.1015508"},{"key":"42","article-title":"Sharing the data center network","author":"shieh","year":"2011","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"41","DOI":"10.1145\/1851182.1851192"},{"year":"1991","author":"jain","journal-title":"The Art of Computer Systems Peiformance Analysis Techniques for Experimental Design Measurement Simulation and Modeling","key":"40"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1145\/1831407.1831427"},{"year":"2005","author":"legout","journal-title":"Understanding Bittorrent An Experimental Perspective INRIA","key":"23"},{"key":"24","article-title":"Rarest first and chokealgorithms are enough","author":"legout","year":"2006","journal-title":"LMC"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1145\/1254882.1254919"},{"key":"26","article-title":"Do incentives build robustness in bittorrent","author":"piatek","year":"2007","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1109\/SURV.2010.021110.00036"},{"year":"0","key":"28"},{"year":"0","key":"29"},{"key":"3","article-title":"Murder: Using bittorrent for fast website deploys","author":"gadea","year":"2010","journal-title":"Technical Talk CUSEC"},{"year":"2010","author":"cook","journal-title":"A Day in the Life of Facebook Operations","key":"2"},{"year":"0","journal-title":"OpenStack Image Registry and Delivery Service","key":"1"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/1402958.1402968"},{"year":"0","key":"30"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/1592568.1592577"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/1592568.1592576"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1145\/2018436.2018448"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1402958.1402967"},{"year":"0","key":"31"},{"key":"9","article-title":"Chain replication for supporting high through put and availability","author":"van renesse","year":"2004","journal-title":"OSDI"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/945449.945450"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/1177080.1177104"},{"doi-asserted-by":"publisher","key":"55","DOI":"10.1145\/1402958.1402999"},{"key":"17","article-title":"Incentives build robustness in BitTorrent","author":"cohen","year":"2003","journal-title":"P2PEcon"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/INFCOM.2004.1356981"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/945445.945474"},{"key":"16","article-title":"Optimal peer-to-peer technique formassive content distribution","author":"zheng","year":"2008","journal-title":"INFO COM"},{"key":"13","article-title":"Overcast: Reliable multi casting with on overlay network","author":"jannotti","year":"2000","journal-title":"OSDI"},{"key":"14","article-title":"Fastreplica: Efficient large file distribution within content delivery networks","author":"cherkasova","year":"2003","journal-title":"USlTS"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/JSAC.2002.803066"},{"year":"2000","author":"chawathe","journal-title":"Scattercast An architecture for Internet broadcast distribution as an infrastructure service","key":"12"},{"key":"21","article-title":"Antfarm: Efficient content distribution with managed swarms","author":"peterson","year":"2009","journal-title":"NSDl"},{"key":"20","article-title":"Maintaining high bandwidth under dynamic network conditions","author":"kostic","year":"2005","journal-title":"ATEC"},{"doi-asserted-by":"publisher","key":"49","DOI":"10.1145\/1273445.1273449"},{"key":"48","doi-asserted-by":"crossref","DOI":"10.1117\/12.651034","article-title":"How efficient is bittorrent","author":"wu","year":"2006","journal-title":"Proc 2003SPlE Multimedia Computing and Networking Con\/"},{"key":"45","article-title":"The delicate trade offs in bittorrent like file sharing protocol design","author":"fan","year":"2006","journal-title":"ICNP"},{"doi-asserted-by":"publisher","key":"44","DOI":"10.1145\/1064212.1064215"},{"doi-asserted-by":"publisher","key":"47","DOI":"10.1109\/INFOCOM.2006.328"},{"doi-asserted-by":"publisher","key":"46","DOI":"10.1145\/1375457.1375478"},{"year":"0","key":"10"},{"key":"51","article-title":"Exploiting network proximity in distributed hash tables","author":"castro","year":"2002","journal-title":"FuDiCo"},{"key":"52","doi-asserted-by":"crossref","DOI":"10.1145\/1402958.1403000","article-title":"Taming the torrent: A practical approach to reducing cross-isp traffic in peer-to-peer systems","author":"choffnes","year":"2008","journal-title":"SIGCOMM"},{"key":"53","article-title":"Pitfalls for isp-friendly p2p design","author":"piatek","year":"2009","journal-title":"HotNets"},{"doi-asserted-by":"publisher","key":"54","DOI":"10.1109\/ICDCSW.2006.76"},{"doi-asserted-by":"publisher","key":"50","DOI":"10.1109\/ICDCS.2006.48"}],"event":{"name":"2013 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P)","start":{"date-parts":[[2013,9,9]]},"location":"Trento, Italy","end":{"date-parts":[[2013,9,11]]}},"container-title":["IEEE P2P 2013 Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679377\/6688689\/06688710.pdf?arnumber=6688710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:13:47Z","timestamp":1498108427000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6688710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/p2p.2013.6688710","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}