{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:10:46Z","timestamp":1729617046657,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ptp.2004.1334934","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T11:27:50Z","timestamp":1099913270000},"page":"80-89","source":"Crossref","is-referenced-by-count":1,"title":["Improving bandwidth ef .ciency of peer-to-peer storage"],"prefix":"10.1109","author":[{"given":"P.","family":"Eaton","sequence":"first","affiliation":[]},{"given":"E.","family":"Ong","sequence":"additional","affiliation":[]},{"given":"J.","family":"Kubiatowicz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"91","article-title":"Naming and integrity: Self-verifying data in peer-to-peer systems","author":"weatherspoon","year":"2002","journal-title":"Proc of FuDiCo"},{"key":"15","first-page":"127","article-title":"Opportunistic use of content addressable storage for distributed file systems","author":"tolia","year":"2003","journal-title":"Proc of Usenix Technical Conference"},{"key":"16","article-title":"The rsync algorithm","volume":"tr cs 96 5","author":"tridgell","year":"1996","journal-title":"Technical Report"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502053"},{"key":"14","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/347057.347408","article-title":"A protocol-independent technique for eliminating redundant network traffic","author":"spring","year":"2000","journal-title":"Proc of ACM SICCOMM"},{"key":"11","first-page":"1","article-title":"Pond: The OceanStore prototype","author":"rhea","year":"2003","journal-title":"Proc of USENIX FAST"},{"key":"12","article-title":"Handling chum in a dht","author":"rhea","year":"2004","journal-title":"Proc of Usenix Technical Conference"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/502051.502054"},{"key":"2","first-page":"91","article-title":"Object and file management in the EXODUS extensible database system","author":"carey","year":"1986","journal-title":"Proc of VLDB"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"10","article-title":"Fingerprinting by random polynomials","volume":"tr 15 81","author":"rabin","year":"1981","journal-title":"Technical Report"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_32"},{"key":"6","first-page":"1","article-title":"Finding similar files in a large file system","author":"manber","year":"1994","journal-title":"Proc of USENIX Winter Technical Conference"},{"journal-title":"File system support for delta compression","year":"2000","author":"macdonald","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840446"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502052"}],"event":{"name":"Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings.","location":"Zurich, Switzerland"},"container-title":["Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9261\/29415\/01334934.pdf?arnumber=1334934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:37:37Z","timestamp":1497598657000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1334934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ptp.2004.1334934","relation":{},"subject":[]}}