{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T15:11:17Z","timestamp":1648912277967},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,2,3]],"date-time":"2013-02-03T00:00:00Z","timestamp":1359849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s12083-013-0197-3","type":"journal-article","created":{"date-parts":[[2013,2,2]],"date-time":"2013-02-02T06:37:14Z","timestamp":1359787034000},"page":"188-198","source":"Crossref","is-referenced-by-count":0,"title":["General packet induced queueing schemes for reducing packet delays in ADSL routers with peer-to-peer file sharing applications"],"prefix":"10.1007","volume":"7","author":[{"given":"Sheng-Wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yi-Chen","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,3]]},"reference":[{"key":"197_CR1","unstructured":"The P2P-Next integrated project. http:\/\/www.p2p-next.org\/"},{"key":"197_CR2","unstructured":"BitTorrent. http:\/\/www.bittorrent.org\/"},{"key":"197_CR3","unstructured":"eDonkey. http:\/\/www.edonkey2000.com\/"},{"key":"197_CR4","unstructured":"eMule. http:\/\/www.emule-project.net\/"},{"key":"197_CR5","doi-asserted-by":"crossref","unstructured":"He G, Hou J, Chen WP, Hamada T (2007) One size does not fit all: a detailed analysis and modeling of P2P traffic. In: IEEE global telecommunications conference (Globecom), Washington D.C., USA","DOI":"10.1109\/GLOCOM.2007.80"},{"key":"197_CR6","volume-title":"ADSL, VDSL, and multicarrier modulation","author":"JAC Bingham","year":"2010","unstructured":"Bingham JAC (2010)\u00a0ADSL, VDSL, and multicarrier modulation.\u00a0Wiley, New York, USA"},{"key":"197_CR7","doi-asserted-by":"crossref","unstructured":"Pan Y, Lee JYB (2010) Adaptive scheduling of data transfer in P2P applications over asymmetric networks. In: IEEE international conferences on communications (ICC 2010), Cape Town, South Africa","DOI":"10.1109\/ICC.2010.5501826"},{"key":"197_CR8","doi-asserted-by":"crossref","unstructured":"Allman M, Paxson V, Stevens W (1999) TCP congestion control, ETF RFC 2581. http:\/\/datatracker.ietf.org\/doc\/rfc2581\/","DOI":"10.17487\/rfc2581"},{"issue":"1","key":"197_CR9","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/JSAC.2007.070115","volume":"25","author":"J Chan","year":"2007","unstructured":"Chan J, Li VOK, Lui KS (2007) Performance comparison of scheduling algorithms for peer-to-peer collaborative file distribution. IEEE J Sel Areas Commun 25(1):146\u2013154","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"197_CR10","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/TPDS.2009.69","volume":"21","author":"K Ramachandran","year":"2010","unstructured":"Ramachandran K, Sikdar B (2010) A queuing model for evaluating the transfer latency of peer-to-peer systems. IEEE Trans Parallel Distrib Syst 21(3):367\u2013378","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"197_CR11","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1109\/TPDS.2009.127","volume":"21","author":"H Shen","year":"2010","unstructured":"Shen H (2010) An efficient and adaptive decentralized file replication algorithm in P2P file sharing systems. IEEE Trans Parallel Distrib Syst 21(6):827\u2013840","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"12","key":"197_CR12","doi-asserted-by":"crossref","first-page":"2055","DOI":"10.1109\/TPDS.2011.82","volume":"22","author":"R Gaeta","year":"2011","unstructured":"Gaeta R, Sereno M (2011) Generalized probabilistic flooding in unstructured peer-to-peer networks. IEEE Trans Parallel Distrib Syst 22(12):2055\u20132062","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"197_CR13","doi-asserted-by":"crossref","unstructured":"Jacobson V, Braden R, Borman D (1992) TCP extensions for high performance, IETF RFC 1323. http:\/\/datatracker.ietf.org\/doc\/rfc1323\/","DOI":"10.17487\/rfc1323"},{"key":"197_CR14","volume-title":"\u00a0Queueing systems volume 1: theory","author":"L Kleinrock","year":"1975","unstructured":"Kleinrock L (1975)\u00a0Queueing systems volume 1: theory.\u00a0Wiley, New York, USA"},{"key":"197_CR15","doi-asserted-by":"crossref","unstructured":"Blake S, Black D, Carlson M, Davies E, Wang Z, Weiss W (1998) An architecture for differentiated services, IETF RFC 2475. http:\/\/datatracker.ietf.org\/doc\/rfc2475\/","DOI":"10.17487\/rfc2475"},{"key":"197_CR16","unstructured":"Lien YN (2005) Performance issues of P2P file sharing over asymmetric and wireless networks. In: IEEE international conference on distributed computing systems workshops 2005, Columbus, OH, USA"},{"key":"197_CR17","unstructured":"Plissonneau L, Costeux JL, Brown P (2006) Detailed analysis of eDonkey transfers on ADSL. In: Proceedings of EuroNGI. Valencia, Spain"},{"key":"197_CR18","doi-asserted-by":"crossref","unstructured":"Aoki M, Oki E (2010) Scheme for estimating ADSL link capacity based on delay measurements of different length packets. In: IEEE global telecommunications conference (Globecom), Miami, FL, USA","DOI":"10.1109\/GLOCOM.2010.5683567"},{"key":"197_CR19","unstructured":"Gu C, Zhuang S (2010) A novel P2P traffic classification approach using back propagation neural network. In: 2010 12th IEEE international conference on communication technology (ICCT), Nanjing, China"},{"key":"197_CR20","doi-asserted-by":"crossref","unstructured":"Sun R, Yang B, Peng Li, Chen Z, Zhang L, Jing S (2010) Traffic classification using probabilistic neural networks. In: 2010 Sixth international conference on natural computation (ICNC), Yantai, China","DOI":"10.1109\/ICNC.2010.5584648"},{"key":"197_CR21","doi-asserted-by":"crossref","unstructured":"Wang C, Li T, Chen H (2009) P2P traffic identification based on double layer characteristics. In: International conference on information technology and computer science 2009, Kiev, Ukraine","DOI":"10.1109\/ITCS.2009.298"},{"key":"197_CR22","doi-asserted-by":"crossref","unstructured":"Wu CC, Chen KT, Chang YC, Lei CL (2009) Peer-to-peer application recognition based on signaling activity. In: IEEE international conference on communications(ICC 2009), Dresden, Germany","DOI":"10.1109\/ICC.2009.5199305"},{"key":"197_CR23","volume-title":"Computer networking: a top-down approach","author":"JF Kurose","year":"2010","unstructured":"Kurose JF, Rose KW (2009)\u00a0Computer networking: a top-down approach, 5th\u00a0edn.\u00a0Addison-Wesley, Boston, USA","edition":"5"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-013-0197-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-013-0197-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-013-0197-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T04:38:03Z","timestamp":1562647083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-013-0197-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,3]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["197"],"URL":"https:\/\/doi.org\/10.1007\/s12083-013-0197-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,3]]}}}