{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:22:18Z","timestamp":1729653738600,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/iscc.2008.4625722","type":"proceedings-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T19:09:41Z","timestamp":1221764981000},"page":"487-494","source":"Crossref","is-referenced-by-count":1,"title":["Multicast-P2P content distribution in large-scale enterprise networks"],"prefix":"10.1109","author":[{"given":"Raime","family":"Bustos","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Aguilar","sequence":"additional","affiliation":[]},{"family":"Kia Makki","sequence":"additional","affiliation":[]},{"given":"Raimund K.","family":"Ege","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/JCN.2002.6596917","article-title":"efficient implementations of a delay-constrained leastcost multicast algorithm","volume":"4","author":"feng","year":"2002","journal-title":"Journal of Communications and Networks"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1117\/12.325879","article-title":"beta-binomial video traffic modeling for the knockout atm multicasting switch","author":"rodriguez","year":"1998","journal-title":"Proceedings of SPIE"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/258612.258676"},{"journal-title":"Local Patch Server Sun Microsystems","year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/BF01193338"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1145\/964723.383071","article-title":"chord: a scalable peer-to-peer lookup service for internet applications","author":"stoica","year":"2001","journal-title":"ACM SIGCOMM"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v5i10.792","article-title":"free riding on gnutella","volume":"5","author":"adar","year":"2000","journal-title":"First Monday"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(97)00095-9"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1109\/AINA.2006.195","article-title":"hymonet: a peer-to-peer hybrid multicast overlay network for efficient live media streaming","author":"chang","year":"2006","journal-title":"Proc 19th Int Conf Advanced Information Networking and Applications"},{"journal-title":"Proceedings of International Symposium on Performance Evaluation of Computer and Telecommunication Systems","article-title":"multicast service overlay design","year":"2005","author":"lao","key":"20"},{"journal-title":"Overcast Reliable Multicasting with an Overlay Network","year":"0","author":"jannoti","key":"22"},{"journal-title":"A Viable Solution for Large-Scale Multicast Service Support","year":"2005","author":"lao","key":"23"},{"article-title":"multilevel priority opportunistic routing algorithm for wireless sensor networks","year":"2007","author":"bustos","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031506"},{"key":"26","first-page":"101","volume":"31","author":"jia","year":"1999","journal-title":"A Distributed Multicast Routing Protocol For Real-Time Multicast Applications Computer Networks The International Journal of Computer and Telecommunications Networking"},{"key":"27","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1002\/dac.469","article-title":"an integrated routing and admission control mechanism for real-time multicast connection establishment","volume":"14","author":"jia","year":"2000","journal-title":"International Journal of Communication Systems"},{"year":"0","key":"3"},{"journal-title":"ACM Conf on Principles of Distributed Computing (PODC)","article-title":"analysis of the evolution of peerto-peer systems","year":"2002","author":"liben-nowell","key":"2"},{"year":"0","key":"10"},{"year":"0","key":"1"},{"journal-title":"IPTPS","article-title":"the case for cooperative networking","year":"2002","author":"padmanabhan","key":"7"},{"journal-title":"Gnutella Peer-to-peer file sharing software application","year":"0","key":"6"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1145\/964723.383071","article-title":"chord: a scalable peer-to-peer lookup service for internet applications","author":"stoica","year":"2001","journal-title":"ACM SIGCOMM"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WIRLES.2005.1549537"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2007.4381545"},{"journal-title":"Incentives build robustness in Bittorrent","year":"2003","author":"cohen","key":"8"}],"event":{"name":"2008 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2008,7,6]]},"location":"Marrakech","end":{"date-parts":[[2008,7,9]]}},"container-title":["2008 IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4607772\/4625572\/04625722.pdf?arnumber=4625722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T02:43:03Z","timestamp":1557801783000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4625722\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iscc.2008.4625722","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}