{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:02:50Z","timestamp":1750251770935,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ptp.2004.1334931","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T16:27:50Z","timestamp":1099931270000},"page":"53-62","source":"Crossref","is-referenced-by-count":36,"title":["Adaptive peer-to-peer topologies"],"prefix":"10.1109","author":[{"given":"T.","family":"Condie","sequence":"first","affiliation":[]},{"given":"S.D.","family":"Kamvar","sequence":"additional","affiliation":[]},{"given":"H.","family":"Garcia-Molina","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Tapestry: An infrastructure for fault-tolerant wide-area location and routing","volume":"ucb csd 1 1141","author":"zhao","year":"2001","journal-title":"Technical Report"},{"key":"17","first-page":"393","article-title":"Collective dynamics of 'small-world' networks","author":"watts","year":"1998","journal-title":"Nature"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/ICDCS.2004.1281585"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/383059.383071"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/ICDCS.2004.1281617"},{"key":"13","article-title":"A measurement study of peer-to-peer file sharing systems","author":"saroiu","year":"2002","journal-title":"Proceedings of Multimedia Computing and Networking 2002 (MMCN '02)"},{"key":"14","article-title":"Simulating a file-sharing P2P network","author":"schlosser","year":"2002","journal-title":"Proc First Workshop Semantics in P2P and Grid Computing"},{"year":"0","journal-title":"The Limewire website","key":"11"},{"key":"12","article-title":"Can heterogeneity make Gnutella scalable?","author":"lv","year":"2002","journal-title":"First International Workshop on P2P Systems"},{"key":"3","article-title":"Adaptive P2P topologies","author":"condie","year":"0","journal-title":"Extended Technical Report"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/863955.864000"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/1060289.1060317"},{"key":"10","article-title":"Optimization by simulated annealing","volume":"4598","author":"kirkpatrick","year":"1983","journal-title":"Science"},{"year":"0","journal-title":"Gnutella Website","key":"7"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1145\/586110.586136","article-title":"Query-flood DoS Attacks in Gnutella","author":"daswani","year":"2002","journal-title":"ACM CCS"},{"year":"2002","author":"crespo","journal-title":"Semantic Overlay Networks","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1059981.1059983"},{"key":"9","article-title":"Incentives for combatting freeriding on P2P networks","author":"kamvar","year":"2003","journal-title":"Euro-Par"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/775240.775242"}],"event":{"name":"Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings.","location":"Zurich, Switzerland"},"container-title":["Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9261\/29415\/01334931.pdf?arnumber=1334931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T01:57:59Z","timestamp":1682819879000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1334931\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ptp.2004.1334931","relation":{},"subject":[]}}