{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:06:13Z","timestamp":1740171973364,"version":"3.37.3"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National Basic Research Program of China (973)","award":["2014CB340303"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (NSFC)","doi-asserted-by":"crossref","award":["61379055","61222205"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1109\/tcc.2015.2440242","type":"journal-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T19:12:03Z","timestamp":1433358723000},"page":"464-477","source":"Crossref","is-referenced-by-count":7,"title":["CSR: Classified Source Routing in Distributed Networks"],"prefix":"10.1109","volume":"6","author":[{"given":"Yiming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Dongsheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhigang","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jinshu","family":"Su","sequence":"additional","affiliation":[]},{"given":"Xicheng","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30183-7_28"},{"key":"ref38","first-page":"263","article-title":"Canon in G major: Designing DHTs with hierarchical structure","author":"ganesan","year":"0","journal-title":"Proc 24th Int Conf Distrib Comput Syst"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774774"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/972426.944768"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.850224"},{"key":"ref30","first-page":"183","article-title":"Improving the reliability of internet paths with one-hop source\n routing","author":"gummadi","year":"0","journal-title":"Proc 6th Conf Symp Operating Syst Des Implementation"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015509"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916780"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/972426.944766"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015487"},{"key":"ref60","first-page":"127","article-title":"Handling churn in a DHT","author":"rhea","year":"0","journal-title":"Proc USENIX Annu Tech Conf General Track"},{"key":"ref28","first-page":"99","article-title":"Bandwidth-efficient management of DHT routing\n tables","author":"li","year":"0","journal-title":"Proc 2nd Symp Netw Syst Des Implementation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100104"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510740"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45518-3_18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.01.004"},{"year":"0","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1984.1676455"},{"key":"ref50","first-page":"281","article-title":"Hedera: Dynamic flow scheduling for data center networks","author":"al-fares","year":"0","journal-title":"Proc NSDI"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018448"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.60"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.235"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.115"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018467"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1897852.1897877"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592577"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1984.1676437"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658943"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"ref11","first-page":"399","article-title":"F10: A fault-tolerant engineered\n network","author":"liu","year":"2013","journal-title":"Proc 10th USENIX Conf Netw Syst Des Implementation"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.157"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159931"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159933"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2014.101"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30192-9_42"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529292"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79705-0_4"},{"key":"ref18","first-page":"260","article-title":"Secureroutingdht: A protocol for reliable\n routing in p2p dht-based systems","author":"villanueva","year":"0","journal-title":"Proc 7th Int Conf Internet Web Appl Serv"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.258"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851191"},{"year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2886107.2886110"},{"key":"ref5","first-page":"5","article-title":"Ramcube: Exploiting network proximity for ram-based key-value store","author":"zhang","year":"0","journal-title":"Proc 4th USENIX Conf Hot Topics Cloud Comput"},{"key":"ref8","first-page":"15","article-title":"Serverswitch: A programmable and high performance platform for data center networks","author":"lu","year":"0","journal-title":"Proc 8th USENIX Conf Netw Syst Des Implementation"},{"key":"ref7","first-page":"11","article-title":"It's time for low latency","author":"rumble","year":"0","journal-title":"Proc 13th Usenix Conf Hot Topics in Operating Systems"},{"key":"ref49","first-page":"71","article-title":"A new trust management model\n for p2p networks","volume":"32","author":"li","year":"2009","journal-title":"Journal of Beijing University of Posts and Telecommunicatns"},{"key":"ref9","first-page":"85","article-title":"Debunking some myths about structured and unstructured overlays","author":"castro","year":"0","journal-title":"Proc 2nd Conf Symp Netw Syst Des Implementation"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2007.30"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/71.329674"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/11576235_90"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1555815.1555782"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-009-0016-x"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0034-8"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/215399.215440"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.65"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/8372844\/07116526.pdf?arnumber=7116526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:35:13Z","timestamp":1633919713000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7116526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,1]]},"references-count":60,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2015.2440242","relation":{},"ISSN":["2168-7161"],"issn-type":[{"type":"electronic","value":"2168-7161"}],"subject":[],"published":{"date-parts":[[2018,4,1]]}}}