{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T11:10:10Z","timestamp":1724757010008},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,21]]},"DOI":"10.1145\/1851476.1851562","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T12:04:33Z","timestamp":1285157073000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["BTWorld"],"prefix":"10.1145","author":[{"given":"Maciej","family":"Wojciechowski","sequence":"first","affiliation":[{"name":"TU Delft, The Netherlands"}]},{"given":"Mihai","family":"Capot\u0103","sequence":"additional","affiliation":[{"name":"TU Delft, The Netherlands"}]},{"given":"Johan","family":"Pouwelse","sequence":"additional","affiliation":[{"name":"TU Delft, The Netherlands"}]},{"given":"Alexandru","family":"Iosup","sequence":"additional","affiliation":[{"name":"TU Delft, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2010,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.029"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_24"},{"key":"e_1_3_2_1_3_1","volume-title":"Computer Science and Telecommunications Board","author":"}}Committee on Research Horizons in Networking","unstructured":"}}Committee on Research Horizons in Networking , Computer Science and Telecommunications Board , National Research Council . Looking over the fence at networks: A neighbor's view of networking research. Technical report, National Academy Press, 2001. }}Committee on Research Horizons in Networking, Computer Science and Telecommunications Board, National Research Council. Looking over the fence at networks: A neighbor's view of networking research. Technical report, National Academy Press, 2001."},{"key":"e_1_3_2_1_4_1","volume-title":"IPTPS","author":"D\u00e1n G.","year":"2009","unstructured":"}} G. D\u00e1n and N. Carlsson . Dynamic swarm management for improved BitTorrent performance . In IPTPS , 2009 . }}G. D\u00e1n and N. Carlsson. Dynamic swarm management for improved BitTorrent performance. In IPTPS, 2009."},{"key":"e_1_3_2_1_5_1","volume-title":"IPTPS","author":"D\u00e1n G.","year":"2010","unstructured":"}} G. D\u00e1n and N. Carlsson . Power-law revisited: A large scale measurement study of P2P content popularity . In IPTPS , 2010 . }}G. D\u00e1n and N. Carlsson. Power-law revisited: A large scale measurement study of P2P content popularity. In IPTPS, 2010."},{"key":"e_1_3_2_1_6_1","volume-title":"PEX and Magnet Links Explained","year":"2009","unstructured":"}}Ernesto. BitTorrent's Future? DHT , PEX and Magnet Links Explained , 2009 . {Online} torrentfreak.com. }}Ernesto. BitTorrent's Future? DHT, PEX and Magnet Links Explained, 2009. {Online} torrentfreak.com."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298325"},{"key":"e_1_3_2_1_8_1","volume-title":"IPTPS","author":"Fessant F. L.","year":"2004","unstructured":"}} F. L. Fessant , S. B. Handurukande , A.-M. Kermarrec , and L. Massouli\u00e9 . Clustering in peer-to-peer file sharing workloads . In IPTPS , 2004 . }}F. L. Fessant, S. B. Handurukande, A.-M. Kermarrec, and L. Massouli\u00e9. Clustering in peer-to-peer file sharing workloads. In IPTPS, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251090"},{"key":"e_1_3_2_1_10_1","first-page":"39","volume-title":"AIRWeb","author":"Gy\u00f6ngyi Z.","year":"2005","unstructured":"}} Z. Gy\u00f6ngyi and H. Garcia-Molina . Web spam taxonomy . In AIRWeb , pages 39 -- 47 , 2005 . }}Z. Gy\u00f6ngyi and H. Garcia-Molina. Web spam taxonomy. In AIRWeb, pages 39--47, 2005."},{"key":"e_1_3_2_1_11_1","volume-title":"BitTorrent","author":"Hazel G.","year":"2008","unstructured":"}} G. Hazel and A. Norberg . Extension for Peers to Send Metadata Files. Enhancement Proposal 9 , BitTorrent , 2008 . {Online} bittorrent.org\/beps\/bep_0009.html. }}G. Hazel and A. Norberg. Extension for Peers to Send Metadata Files. Enhancement Proposal 9, BitTorrent, 2008. {Online} bittorrent.org\/beps\/bep_0009.html."},{"key":"e_1_3_2_1_12_1","volume-title":"BitTorrent","author":"Hoffman J.","year":"2008","unstructured":"}} J. Hoffman . Multitracker Metadata Extension. Enhancement Proposal 12 , BitTorrent , 2008 . {Online} bittorrent.org\/beps\/bep_0012.html. }}J. Hoffman. Multitracker Metadata Extension. Enhancement Proposal 12, BitTorrent, 2008. {Online} bittorrent.org\/beps\/bep_0012.html."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1134822.1134925"},{"key":"e_1_3_2_1_14_1","volume-title":"Ipoque Internet studies","year":"2006","unstructured":"}}Ipoque. Ipoque Internet studies , 2006 --2009. {Online} ipoque.com\/resources\/internet-studies. }}Ipoque. Ipoque Internet studies, 2006--2009. {Online} ipoque.com\/resources\/internet-studies."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028804"},{"key":"e_1_3_2_1_17_1","volume-title":"BitTorrent","author":"Loewenstern A.","year":"2008","unstructured":"}} A. Loewenstern . DHT Protocol . Enhancement Proposal 5 , BitTorrent , 2008 . {Online} bittorrent.org\/beps\/bep_0005.html. }}A. Loewenstern. DHT Protocol. Enhancement Proposal 5, BitTorrent, 2008. {Online} bittorrent.org\/beps\/bep_0005.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658954"},{"key":"e_1_3_2_1_19_1","volume-title":"IPTPS","author":"Meulpolder M.","year":"2010","unstructured":"}} M. Meulpolder , L. D'Acunto , M. Capot\u00e2 , M. Wojciechowski , J. Pouwelse , D. Epema , and H. Sips . Public and private BitTorrent communities: A measurement study . In IPTPS , 2010 . }}M. Meulpolder, L. D'Acunto, M. Capot\u00e2, M. Wojciechowski, J. Pouwelse, D. Epema, and H. Sips. Public and private BitTorrent communities: A measurement study. In IPTPS, 2010."},{"key":"e_1_3_2_1_20_1","first-page":"29","volume-title":"NSDI","author":"Miklas A.","year":"2009","unstructured":"}} A. Miklas , S. Saroiu , A. Wolman , and A. Brown . Bunker: A privacy-oriented platform for network tracing . In NSDI , pages 29 -- 42 , 2009 . }}A. Miklas, S. Saroiu, A. Wolman, and A. Brown. Bunker: A privacy-oriented platform for network tracing. In NSDI, pages 29--42, 2009."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.256"},{"key":"e_1_3_2_1_22_1","volume-title":"Workshop on Web Content Caching and Distribution.","author":"Parker A.","unstructured":"}} A. Parker . The True Picture of Peer-To-Peer File-Sharing, 2005. Panel Presentation, IEEE Int'l . Workshop on Web Content Caching and Distribution. }}A. Parker. The True Picture of Peer-To-Peer File-Sharing, 2005. Panel Presentation, IEEE Int'l. Workshop on Web Content Caching and Distribution."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559865"},{"key":"e_1_3_2_1_24_1","volume-title":"NSDI","author":"Piatek M.","year":"2007","unstructured":"}} M. Piatek , T. Isdal , T. Anderson , A. Krishnamurthy , and A. Venkataramani . Do incentives build robustness in BitTorrent ? In NSDI , 2007 . }}M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani. Do incentives build robustness in BitTorrent? In NSDI, 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_19"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978369"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0088-1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637222"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096552"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00975-4_18"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2009053"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2001730"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129588"}],"event":{"name":"HPDC '10: The 19th International Symposium on High Performance Distributed Computing","location":"Chicago Illinois","acronym":"HPDC '10","sponsor":["University of Arizona University of Arizona","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1851476.1851562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T02:00:00Z","timestamp":1673402400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851476.1851562"}},"subtitle":["towards observing the global BitTorrent file-sharing network"],"short-title":[],"issued":{"date-parts":[[2010,6,21]]},"references-count":33,"alternative-id":["10.1145\/1851476.1851562","10.1145\/1851476"],"URL":"https:\/\/doi.org\/10.1145\/1851476.1851562","relation":{},"subject":[],"published":{"date-parts":[[2010,6,21]]},"assertion":[{"value":"2010-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}