{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:21:49Z","timestamp":1730290909247,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ptp.2002.1046321","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T19:45:08Z","timestamp":1056570308000},"page":"120-127","source":"Crossref","is-referenced-by-count":0,"title":["Multishelf: an experiment in peer-to-peer infomediation"],"prefix":"10.1109","author":[{"given":"Z.","family":"Segall","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Fortier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G.","family":"Kortuem","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Schneider","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Workman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"year":"0","key":"ref4"},{"journal-title":"Extreme Programming Explained Embrace Change","year":"1999","author":"beck","key":"ref3"},{"key":"ref10","article-title":"When Peer-to-Peer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ad-hoc Networks","author":"kortuem","year":"2001","journal-title":"Proceedings 2001 International Conference on Peer-to-Peer Computing (P2P2001)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008340529122"},{"key":"ref11","article-title":"Proem: A Peer-to-Peer Computing Platform for Mobile Ad-hoc Networks","author":"kortuem","year":"2001","journal-title":"Online proceedings Advanced Topic Workshop Middleware for Mobile Computing"},{"key":"ref5","article-title":"Intermediaries and Cybermediaries: A Continuing Role for Mediating Players in the Electronic Marketplace","volume":"1","author":"sarkar","year":"1995","journal-title":"Journal of Computer Mediated Communications"},{"key":"ref12","article-title":"Middleware for Mobile Peer-to-Peer Computing","author":"kortuem","year":"0","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review (MC2R)"},{"journal-title":"GIMPS The Great Internet Mersenne Prime Search","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2000.839475"},{"key":"ref2","article-title":"Doom Stalks the Dotcoms","author":"greenwald","year":"2000","journal-title":"TIME Magazine"},{"year":"0","key":"ref9"},{"journal-title":"Net worth shaping markets when customers make the rules","year":"1999","author":"hagel","key":"ref1"}],"event":{"name":"Second International Conference on Peer-to-Peer Computing (P2P 2002)","acronym":"PTP-02","location":"Linkoping, Sweden"},"container-title":["Proceedings. Second International Conference on Peer-to-Peer Computing,"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8107\/22420\/01046321.pdf?arnumber=1046321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T19:25:40Z","timestamp":1489173940000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1046321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ptp.2002.1046321","relation":{},"subject":[]}}