{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:12Z","timestamp":1750307472710,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,8,30]],"date-time":"2010-08-30T00:00:00Z","timestamp":1283126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,30]]},"DOI":"10.1145\/1851276.1851289","type":"proceedings-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T13:06:04Z","timestamp":1283259964000},"page":"55-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Improving peer-to-peer file distribution"],"prefix":"10.1145","author":[{"given":"Ben","family":"Leong","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Youming","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Su","family":"Wen","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Cristina","family":"Carbunaru","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Yong Meng","family":"Teo","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Christopher","family":"Chang","sequence":"additional","affiliation":[{"name":"California Institute of Technology, Pasadena, CA, USA"}]},{"given":"Tracey","family":"Ho","sequence":"additional","affiliation":[{"name":"California Institute of Technology, Pasadena, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of IEEE INFOCOM '06","author":"Bharambe A. R.","year":"2006","unstructured":"A. R. Bharambe , C. Herley , and V. N. Padmanabhan . Analyzing and improving a BitTorrent network's performance mechanisms . In Proceedings of IEEE INFOCOM '06 , April 2006 . A. R. Bharambe, C. Herley, and V. N. Padmanabhan. Analyzing and improving a BitTorrent network's performance mechanisms. In Proceedings of IEEE INFOCOM '06, April 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/P2P.2008.45"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/NETCOD.2010.5487668"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the P2P Economics Workshop","author":"Cohen B.","year":"2003","unstructured":"B. Cohen . Incentives build robustness in BitTorrent . In Proceedings of the P2P Economics Workshop , 2003 . B. Cohen. Incentives build robustness in BitTorrent. In Proceedings of the P2P Economics Workshop, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-3-540-24668-8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1254882.1254919"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1402958.1402987"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of IPTPS '08","author":"Marciniak P.","year":"2008","unstructured":"P. Marciniak , N. Liogkas , A. Legout , and E. Kohler . Small is not always beautiful . In Proceedings of IPTPS '08 , February 2008 . P. Marciniak, N. Liogkas, A. Legout, and E. Kohler. Small is not always beautiful. In Proceedings of IPTPS '08, February 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of NSDI '07","author":"Piatek M.","year":"2007","unstructured":"M. Piatek , T. Isdal , T. Anderson , A. Krishnamurthy , and A. Venkataramani . Do incentives build robustness in BitTorrent ? In Proceedings of NSDI '07 , April 2007 . M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani. Do incentives build robustness in BitTorrent? In Proceedings of NSDI '07, April 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1015467.1015508"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGOPS ACM Special Interest Group on Operating Systems"],"acronym":"SIGCOMM '10","name":"SIGCOMM '10: ACM SIGCOMM 2010 Conference","location":"New Delhi India"},"container-title":["Proceedings of the first ACM asia-pacific workshop on Workshop on systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851276.1851289","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1851276.1851289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:44Z","timestamp":1750248524000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851276.1851289"}},"subtitle":["winner doesn't have to take all"],"short-title":[],"issued":{"date-parts":[[2010,8,30]]},"references-count":10,"alternative-id":["10.1145\/1851276.1851289","10.1145\/1851276"],"URL":"https:\/\/doi.org\/10.1145\/1851276.1851289","relation":{},"subject":[],"published":{"date-parts":[[2010,8,30]]},"assertion":[{"value":"2010-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}