{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T20:11:37Z","timestamp":1672517497687},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,1,15]],"date-time":"2013-01-15T00:00:00Z","timestamp":1358208000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s11227-012-0858-7","type":"journal-article","created":{"date-parts":[[2013,1,14]],"date-time":"2013-01-14T08:50:17Z","timestamp":1358153417000},"page":"700-720","source":"Crossref","is-referenced-by-count":4,"title":["Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks"],"prefix":"10.1007","volume":"66","author":[{"given":"Yong-Hyuk","family":"Moon","sequence":"first","affiliation":[]},{"given":"Jeong-Nyeo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Chan-Hyun","family":"Youn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,15]]},"reference":[{"key":"858_CR1","volume-title":"Resource allocation problems: algorithmic approaches","author":"T Ibaraki","year":"1988","unstructured":"Ibaraki T, Katoh N (1988) Resource allocation problems: algorithmic approaches. MIT Press, Cambridge"},{"key":"858_CR2","volume-title":"Proceedings of the ACM Internet measurement conference (ACM IMC)","author":"D Stutzbach","year":"2005","unstructured":"Stutzbach D, Rejaie R (2005) Understanding churn in peer-to-peer network. In: Proceedings of the ACM Internet measurement conference (ACM IMC)"},{"issue":"1","key":"858_CR3","first-page":"5","volume":"3","author":"X Zhou","year":"2012","unstructured":"Zhou X, Ge Y, Chen X, Jing Y, Sun W (2012) A distributed cache based reliable service execution and recovery approach in MANETs. J Converg 3(1):5\u201312","journal-title":"J Converg"},{"key":"858_CR4","volume-title":"Proceedings IEEE INFOCOM","author":"V Pai","year":"2005","unstructured":"Pai V, Kumar K, Tamilmani K, Sambamurthy V, Mohr AE Mohr EE (2005) Chainsaw: eliminating trees from overlay multicast. In: Proceedings IEEE INFOCOM"},{"key":"858_CR5","volume-title":"Proceedings IEEE INFOCOM","author":"X Zhang","year":"2005","unstructured":"Zhang X, Liut J, Lis B, Yum T-SP (2005) Coolstreaming\/DONet: a data-driven overlay network for efficient live media streaming. In: Proceedings IEEE INFOCOM"},{"key":"858_CR6","volume-title":"Proceedings of the multimedia computing and networking (MMCN)","author":"V Agarwal","year":"2005","unstructured":"Agarwal V, Rejaie R (2005) Adaptive multi-source streaming in heterogeneous peer-to-peer networks. In: Proceedings of the multimedia computing and networking (MMCN)"},{"key":"858_CR7","volume-title":"Proceedings of ACM multimedia modeling (ACM MMM\u201907)","author":"M Zhang","year":"2007","unstructured":"Zhang M, Chen C, Xiong Y, Zhang Q, Yang S (2007) Optimizing the throughput of data-driven based streaming in heterogeneous overlay network. In: Proceedings of ACM multimedia modeling (ACM MMM\u201907)"},{"issue":"1","key":"858_CR8","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1109\/TPDS.2005.137","volume":"16","author":"L Xiao","year":"2005","unstructured":"Xiao L, Zhuang Z, Liu Y (2005) Dynamic layer management in superpeer architectures. IEEE Trans Parallel Distrib Syst 16(1):1078\u20131091","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"5","key":"858_CR9","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1109\/TPDS.2009.94","volume":"21","author":"J-S Li","year":"2010","unstructured":"Li J-S, Chao C-H (2010) An efficient superpeer overlay construction and broadcasting scheme based on perfect difference graph. IEEE Trans Parallel Distrib Syst 21(5):594\u2013606","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"858_CR10","doi-asserted-by":"crossref","first-page":"863","DOI":"10.4218\/etrij.10.0110.0033","volume":"32","author":"H Kim","year":"2010","unstructured":"Kim H, Lee S, Lee J, Lee Y (2010) Reducing channel capacity for scalable video coding in a distributed network. ETRI J 32(6):863\u2013870","journal-title":"ETRI J"},{"issue":"3","key":"858_CR11","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.future.2008.08.001","volume":"25","author":"C Mastroianni","year":"2009","unstructured":"Mastroianni C, Cozza P, Talia D, Kelley I, Taylor I (2009) A scalable super-peer approach for public scientific computation. Future Gener Comput Syst 25(3):213\u2013223","journal-title":"Future Gener Comput Syst"},{"issue":"9","key":"858_CR12","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1109\/TCSVT.2007.905532","volume":"17","author":"H Schwarz","year":"2007","unstructured":"Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H.264\/AVC standard. IEEE Trans Circuits Syst Video Technol 17(9):1103\u20131120","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"858_CR13","first-page":"493","volume":"3","author":"DE Goldberg","year":"1989","unstructured":"Goldberg DE, Korb B, Deb K (1989) Messy genetic algorithms: motivation, analysis, and first results. Complex Syst 3:493\u2013530","journal-title":"Complex Syst"},{"issue":"1","key":"858_CR14","first-page":"11","volume":"2","author":"Q Wei","year":"2011","unstructured":"Wei Q, Qin T, Fujita S (2011) A two-level caching protocol for hierarchical peer-to-peer file sharing systems. J Converg 2(1):11\u201316","journal-title":"J Converg"},{"key":"858_CR15","author":"H Luo","year":"2011","unstructured":"Luo H, Shyu M-L (2011) Quality of service provision in mobile multimedia\u2014a survey. Hum-Cent Comput Inf Sci. doi: 10.1186\/2192-1962-1-5","journal-title":"Hum-Cent Comput Inf Sci"},{"key":"858_CR16","volume-title":"Genetic algorithms in search, optimization, and machine learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg DE (1989) Genetic algorithms in search, optimization, and machine learning. Addison-Wesley, Reading"},{"key":"858_CR17","author":"Y-H Moon","year":"2012","unstructured":"Moon Y-H, Youn C-H (2012) Integrated approach towards aggressive state-tracking migration for maximizing performance benefit in distributed computing. Clust Comput. doi: 10.1007\/s10586-011-0197-0","journal-title":"Clust Comput"},{"key":"858_CR18","first-page":"151","volume-title":"Proceedings of the genetic and evolutionary computation conference","author":"FG Lobo","year":"2000","unstructured":"Lobo FG, Goldberg DE, Pelikan M (2000) Time complexity of genetic algorithms on exponentially scaled problems. In: Proceedings of the genetic and evolutionary computation conference, pp 151\u2013158"},{"issue":"3","key":"858_CR19","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TNET.2007.893199","volume":"15","author":"D Leonard","year":"2007","unstructured":"Leonard D, Yao Z, Rai V, Loguinov D (2007) On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks. IEEE\/ACM Trans Netw 15(3):644\u2013656","journal-title":"IEEE\/ACM Trans Netw"},{"key":"858_CR20","volume-title":"Stochastic processes","author":"SM Ross","year":"1996","unstructured":"Ross SM (1996) Stochastic processes. Wiley, New York"},{"key":"858_CR21","author":"A Aikebaier","year":"2011","unstructured":"Aikebaier A, Enokido T, Takizawa M (2011) Trustworthy group making algorithm in distributed systems. Hum-Cent Comput Inf Sci. doi: 10.1186\/2192-1962-1-6","journal-title":"Hum-Cent Comput Inf Sci"},{"key":"858_CR22","unstructured":"Overlay and peer-to-peer network simulation (OverSim) framework. http:\/\/www.oversim.org\/"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-012-0858-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-012-0858-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-012-0858-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:24:08Z","timestamp":1559370248000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-012-0858-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,15]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["858"],"URL":"https:\/\/doi.org\/10.1007\/s11227-012-0858-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,15]]}}}