{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:13Z","timestamp":1750307953482,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,14]],"date-time":"2008-06-14T00:00:00Z","timestamp":1213401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,14]]},"DOI":"10.1145\/1378533.1378547","type":"proceedings-article","created":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T13:49:02Z","timestamp":1213710542000},"page":"91-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["On spreading recommendations via social gossip"],"prefix":"10.1145","author":[{"given":"Yaacov","family":"Fernandess","sequence":"first","affiliation":[{"name":"The Hebrew University of Jerusalem, Jerusalem, Israel"}]},{"given":"Dahlia","family":"Malkhi","sequence":"additional","affiliation":[{"name":"Microsoft Research, Silicon Valley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Nocturnal. http:\/\/research.microsoft.com\/research\/sv\/Nocturnal\/.  Nocturnal. http:\/\/research.microsoft.com\/research\/sv\/Nocturnal\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-002-0082-4"},{"volume-title":"Proceedings of the 15th International Symposium on DIStributed Computing","year":"2001","author":"Pavlov E.","key":"e_1_3_2_1_4_1"},{"volume-title":"Proceedings of the 20th IEEE Symposium on Reliable Distributed Systems","year":"2001","author":"Reiter M. K.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"e_1_3_2_1_7_1","first-page":"440","volume-title":"Nature","author":"Watts J.","year":"1998"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335325"},{"key":"e_1_3_2_1_9_1","unstructured":". D. Flaxman. Expansion and Lack Thereof in Randomly Perturbed Graphs. Technical report 2006. Manuscript under submission.  . D. Flaxman. Expansion and Lack Thereof in Randomly Perturbed Graphs. Technical report 2006. Manuscript under submission."},{"volume-title":"Analysis and Applications. In Proceedings of IEEE INFOCOM","year":"2005","author":"Ghosh A.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146401"},{"key":"e_1_3_2_1_12_1","first-page":"33","volume-title":"Proceedings of the Usenix Winter Conference","author":"Osborne J.","year":"1994"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/358468.358487"},{"volume-title":"Proceedings of IEEE INFOCOM","year":"2002","author":"Halpern J. Y.","key":"e_1_3_2_1_14_1"},{"volume-title":"Proceedings of Middleware","year":"1998","author":"Minsky Y.","key":"e_1_3_2_1_15_1"},{"volume-title":"Renesse. Scalable and Secure Resource Location. In Proceedings of IEEE Hawaii International Conference on System Sciences","year":"2000","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/945506.945507"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176982"},{"issue":"2","key":"e_1_3_2_1_19_1","volume":"13","author":"Gavidia D.","year":"2005","journal-title":"J. Network Syst. Manage."},{"key":"e_1_3_2_1_20_1","unstructured":". Guerraoui S. B. Handurukande and A.-M. Kermarrec. GosSkip: a Gossip-based Structured Overlay Network for Efficient Content-based Filtering. Technical report 2004.  . Guerraoui S. B. Handurukande and A.-M. Kermarrec. GosSkip: a Gossip-based Structured Overlay Network for Efficient Content-based Filtering. Technical report 2004."},{"volume-title":"IPDPS: IEEE International Parallel and Distributed Processing Symposium. IEEE","year":"2006","author":"Malkhi D.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","first-page":"565","volume-title":"Randomized Rumor Spreading. In FOCS'00: Proceedings of the 41st Annual Symposium on Foundations of Computer Science","author":"Schindelhauer C.","year":"2000"},{"key":"e_1_3_2_1_23_1","first-page":"134","volume-title":"Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems","author":"Mansour Y.","year":"1999"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1120717.1120723"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080202"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988788"},{"key":"e_1_3_2_1_27_1","first-page":"102","volume-title":"P2PECON'04: Proceeding of the 2004 ACM SIGCOMM workshop on Economics of peer-to-peer systems","author":"Mcgrew R.","year":"2004"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_29_1","first-page":"188","volume-title":"HICSS'02: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)","author":"Mohtashemi M.","year":"2002"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_3_2_1_31_1","first-page":"251","volume-title":"The Sybil Attack. In IPTPS'01: Revised Papers from the First International Workshop on Peer-to-Peer Systems","author":"Douceur R.","year":"2002"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073873"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_18"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047917"},{"key":"e_1_3_2_1_36_1","first-page":"1","volume-title":"NSDI'06: Proceedings of the 3rd conference on 3rd Symposium on Networked Systems Design &amp; Implementation","author":"Sirer E.","year":"2006"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080204"}],"event":{"name":"SPAA08: 20th ACM Symposium on Parallelism in Algorithms and Architectures","sponsor":["ACM Association for Computing Machinery","SIGACT ACM Special Interest Group on Algorithms and Computation Theory","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Munich Germany","acronym":"SPAA08"},"container-title":["Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378533.1378547","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1378533.1378547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:57:53Z","timestamp":1750258673000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378533.1378547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,14]]},"references-count":37,"alternative-id":["10.1145\/1378533.1378547","10.1145\/1378533"],"URL":"https:\/\/doi.org\/10.1145\/1378533.1378547","relation":{},"subject":[],"published":{"date-parts":[[2008,6,14]]},"assertion":[{"value":"2008-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}