{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:21:47Z","timestamp":1730290907978,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ptp.2002.1046311","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T19:45:08Z","timestamp":1056570308000},"page":"41-48","source":"Crossref","is-referenced-by-count":10,"title":["Building a P2P forum system with JXTA"],"prefix":"10.1109","author":[{"given":"E.","family":"Halepovic","sequence":"first","affiliation":[]},{"given":"R.","family":"Deters","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"minar","journal-title":"JXTA Chat Sans Server","key":"ref10"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref14","first-page":"50","article-title":"Mapping the Gnutella Network","volume":"6","author":"ripeanu","year":"0","journal-title":"IEEE Internet Computing"},{"year":"0","author":"ritter","journal-title":"Why Gnutella can t scale No really","key":"ref15"},{"key":"ref16","article-title":"A Measurement Study of Peer-to-Peer File Sharing Systems","author":"saroiu","year":"2002","journal-title":"Proc MMCN'02"},{"year":"0","key":"ref17"},{"year":"0","author":"shirky","journal-title":"What is P2P and what isn't","key":"ref18"},{"year":"0","key":"ref19"},{"year":"0","key":"ref28"},{"year":"0","author":"ernst","journal-title":"The JXTA Enterprise How-To Revision 1 2","key":"ref4"},{"year":"0","author":"wilson","key":"ref27"},{"year":"0","author":"dornfest","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref29"},{"year":"0","key":"ref5"},{"year":"0","author":"li","key":"ref8"},{"year":"0","author":"koetzle","journal-title":"JXTA Helping To Build The X Internet","key":"ref7"},{"year":"0","author":"breidenbach","journal-title":"Feature Peer-to-peer potential Network World Fusion","key":"ref2"},{"year":"0","author":"minar","journal-title":"Distributed Systems Topologies Part 1","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/4236.978370"},{"year":"0","author":"sundsted","journal-title":"The practice of peer-to-peer computing Discovery","key":"ref20"},{"year":"0","author":"sundsted","journal-title":"The practice of peer-to-peer computing Trust and security in peer-to-peer networks","key":"ref22"},{"year":"0","author":"sundsted","journal-title":"The practice of peer-to-peer computing Introduction and history","key":"ref21"},{"year":"0","author":"traversat","key":"ref24"},{"year":"0","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/4236.978371"},{"year":"0","key":"ref25"}],"event":{"acronym":"PTP-02","name":"Second International Conference on Peer-to-Peer Computing (P2P 2002)","location":"Linkoping, Sweden"},"container-title":["Proceedings. Second International Conference on Peer-to-Peer Computing,"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8107\/22420\/01046311.pdf?arnumber=1046311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T19:21:49Z","timestamp":1489173709000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1046311\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ptp.2002.1046311","relation":{},"subject":[]}}