{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T12:58:12Z","timestamp":1773406692413,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,9,29]],"date-time":"2013-09-29T00:00:00Z","timestamp":1380412800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s12083-013-0236-0","type":"journal-article","created":{"date-parts":[[2013,9,28]],"date-time":"2013-09-28T00:25:49Z","timestamp":1380327949000},"page":"120-136","source":"Crossref","is-referenced-by-count":32,"title":["An efficient and distributed file search in unstructured peer-to-peer networks"],"prefix":"10.1007","volume":"8","author":[{"given":"Mohammad","family":"Shojafar","sequence":"first","affiliation":[]},{"given":"Jemal H.","family":"Abawajy","sequence":"additional","affiliation":[]},{"given":"Zia","family":"Delkhah","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"Zahra","family":"Pooranian","sequence":"additional","affiliation":[]},{"given":"Ajith","family":"Abraham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,29]]},"reference":[{"issue":"5","key":"236_CR1","first-page":"184","volume":"3","author":"I Iskandar","year":"2009","unstructured":"Iskandar I, Naomie S (2009) Selective flooding based on relevant nearest-neighbor using query feedback and similarity across unstructured peer-to-peer networks. Journal of Computer Science 3(5):184\u2013190, ISSN 1549\u20133636","journal-title":"Journal of Computer Science"},{"issue":"2","key":"236_CR2","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/606272.606299","volume":"46","author":"H Balakrishnan","year":"2003","unstructured":"Balakrishnan H, Kaashoek MF, Karger D, Morris R, Stoica I (2003) Looking up data in P2P systems. Communications of ACM 46(2):43\u201348","journal-title":"Communications of ACM"},{"key":"236_CR3","doi-asserted-by":"crossref","unstructured":"Barkai D (2002) Technologies for sharing and collaborating on the net. Proceeding of the 1st International Workshop on Peer-to-Peer Computing (IPTPS\u201902), ISBN: 0-7695-1503-7, 13\u201328. doi: 10.1109\/P2P.2001.990419","DOI":"10.1109\/P2P.2001.990419"},{"key":"236_CR4","doi-asserted-by":"crossref","unstructured":"Daswani N, Garcia-molina H, Yang B (2003) Open problems in data-sharing peer-to-peer systems. Proc. of the 9th International Conference on Database Theory (ICDT\u201903) 1\u201315","DOI":"10.1007\/3-540-36285-1_1"},{"key":"236_CR5","unstructured":"Milojicic DS, Kalogeraki V, Lukose R, Nagaraja K, Pruyne J, RichardB, Rollins M, Xu Z (2002) Peer-to-peer computing, HP Lab technical report, HPL-2002-57 www.hpl.hp.com\/techreports\/2002\/HPL-2002-57R1.pdf"},{"key":"236_CR6","doi-asserted-by":"crossref","unstructured":"Lv Q, Cao P, Cohen E, Li K, Shenker S (2002) Search and replication in unstructured peer to-peer network\u2019s. Proceeding of the 16th ACM International Conference on Supercomputing (ACM ICS\u201902) 258\u2013259. doi: 10.1145\/514191.514206","DOI":"10.1145\/514191.514206"},{"key":"236_CR7","doi-asserted-by":"crossref","unstructured":"Stoica I, Morris R, Karger D, Frans M, Kaashoek, Balakrishnan H (2001) Chord: A scalable peer-to-peer lookup service for internet applications. Proceeding of the 2001 ACM Annual Conference of the Special Interest Group on Data Communication (ACM SIGCOMM\u201901) 149\u2013160. http:\/\/pdos.csail.mit.edu\/6.824\/papers\/stoica-chord.pdf","DOI":"10.1145\/964723.383071"},{"key":"236_CR8","doi-asserted-by":"crossref","unstructured":"Clarke I, Sandberg O, Theodore BW, Hong W (2001) Free net: A distributed anonymous information storage and retrieval system. Proceedings of the ICSI Workshop on Design Issues in Anonymity and Unobservability 46\u201366. www.cs.cornell.edu\/people\/egs\/615\/freenet.pdf","DOI":"10.1007\/3-540-44702-4_4"},{"key":"236_CR9","unstructured":"Manku GS, Bawa M, Raghavan P (2003) Verity Inc, Symphony: Distributed hashing in a small world. Proceeding of 4th USENIX Symposium on Internet Technology and Systems (USITS\u201903) 127\u2013140. www.infolab.stanford.edu\/~bawa\/Pub\/symphony.ps"},{"issue":"1","key":"236_CR10","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/4235.585892","volume":"1","author":"M Dorigo","year":"1997","unstructured":"Dorigo M, Gambardella LM (1997) Ant colony system: A cooperative learning approach to the traveling salesman problem. IEEE Transactions on Evolutionary Computation 1(1):53\u201366","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"236_CR11","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1613\/jair.530","volume":"9","author":"GD Caro","year":"1998","unstructured":"Caro GD, Dorigo M (1998) AntNet: Distributed stigmergy control for communications networks. Journal of Artificial Intelligence Research 9:317\u2013365","journal-title":"Journal of Artificial Intelligence Research"},{"key":"236_CR12","doi-asserted-by":"crossref","unstructured":"Babaoglu O, Meling H, Montresor A (2002) Anthill: A framework for the development of agent-based peer-to-peer systems. In Proceedings of the 22nd International Conference on Distributed Computing Systems","DOI":"10.1109\/ICDCS.2002.1022238"},{"key":"236_CR13","doi-asserted-by":"crossref","unstructured":"Wu C, Yang K, Ho J (2006) AntSearch: An ant search algorithm in unstructured peer-to-peer networks. In Proceedings of the 11th IEEE Symposium on Computers and Communications","DOI":"10.1093\/ietcom\/e89-b.9.2300"},{"key":"236_CR14","first-page":"142","volume-title":"Ant algorithms for search in unstructured peer-to-peer networks, Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW \u201806)","author":"E Michlmayr","year":"2006","unstructured":"Michlmayr E (2006) Ant algorithms for search in unstructured peer-to-peer networks, Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW \u201806). IEEE Computer Society, Washington, pp 142\u2013146"},{"key":"236_CR15","doi-asserted-by":"crossref","unstructured":"Tang D, Lu X, Yang L (2011) ACO-based search algorithm in unstructured P2P Network. In Proceedings of the 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, 1 (ICM \u201811), IEEE Computer Society, Washington, 143\u2013146","DOI":"10.1109\/ICM.2011.257"},{"key":"236_CR16","doi-asserted-by":"crossref","unstructured":"Tsoumakos D, Roussopoulos N (2003) Adaptive probabilistic search in peer-to-peer networks. Technical Report, CS-TR-4451","DOI":"10.1109\/PTP.2003.1231509"},{"key":"236_CR17","doi-asserted-by":"crossref","unstructured":"Tsoumakos D, Roussopoulos N (2003) Adaptive probabilistic search for peer-to-peer networks. Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P 2003) 102\u2013109","DOI":"10.1109\/PTP.2003.1231509"},{"key":"236_CR18","first-page":"183","volume":"2","author":"Q Huo","year":"2011","unstructured":"Huo Q, Chen J, Xu X, Zhou Y, Liu X (2011) A location-aware efficient content-based searching over unstructured P2P network. International Conference on Network Computing and Information Security (NCIS) 2:183\u2013187. doi: 10.1109\/NCIS.2011.135","journal-title":"International Conference on Network Computing and Information Security (NCIS)"},{"key":"236_CR19","first-page":"1248","volume":"3","author":"SC Rhea","year":"2002","unstructured":"Rhea SC, Kubiatowicz J (2002) Probabilistic location and routing. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM\u201902) 3:1248\u20131257. doi: 10.1109\/INFCOM.2002.1019375","journal-title":"Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM\u201902)"},{"key":"236_CR20","doi-asserted-by":"crossref","unstructured":"Yang B, Garcia-Molina H (2002) Improving search in peer-to-peer network\u2019s. Proceeding of the 22nd IEEE International Conference on Distributed Computing (IEEE ICDCS\u201902) 5\u201314, doi: 10.1109\/ICDCS.2002.1022237","DOI":"10.1109\/ICDCS.2002.1022237"},{"key":"236_CR21","unstructured":"Jawhar I, Wu J (2004) A two-level random walk search protocol for peer-to-peer networks. Proceeding of the 8th World Multi-Conference on Systemic, Cybernetics and Informatics 1\u20135. doi: www.faculty.uaeu.ac.ae\/ijawhar\/publications\/randw_S942DB.pdf"},{"issue":"2","key":"236_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2180868.2180871","volume":"30","author":"AS Tigelaar","year":"2012","unstructured":"Tigelaar AS, Hiemstra D, Trieschnigg D (2012) Peer-to-peer information retrieval: An overview. ACM Transactions on Information Systems (TOIS) 30(2):1\u201334. doi: 10.1145\/2180868.2180871","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"key":"236_CR23","doi-asserted-by":"crossref","unstructured":"Crespo A, Garcia-Molina H (2002) Routing indices for peer-to-peer systems. Proceeding of the 22nd International Conference on Distributed Computing Systems (IEEE ICDCS\u201902) 23\u201332. doi: 10.1109\/ICDCS.2002.1022239","DOI":"10.1109\/ICDCS.2002.1022239"},{"key":"236_CR24","doi-asserted-by":"crossref","unstructured":"Himali DMR, Prasad SK (2011) SPUN: A P2P Probabilistic search algorithm based on successful paths in unstructured networks. IEEE International Symposium on Parallel and Distributed Processing Workshops 1610\u20131617. doi: 10.1109\/IPDPS.2011.316","DOI":"10.1109\/IPDPS.2011.316"},{"key":"236_CR25","doi-asserted-by":"crossref","unstructured":"Kalogeraki V, Gunopulos D, Zeinalipour-Yazti D (2002) A local search mechanism for peer-to-peer networks. Proceedings of the 11th ACM Conference on Information and Knowledge Management (ACM CIKM\u201902) 300\u2013307. doi: 10.1145\/584792.584842","DOI":"10.1145\/584792.584842"},{"issue":"4","key":"236_CR26","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1504\/IJHPCN.2005.008562","volume":"3","author":"C Yang","year":"2005","unstructured":"Yang C, Li X (2005) Dominating-set-based searching in peer-to-peer networks. International Journal of High Performance Computing and Networking 3(4):205\u2013210. doi: 10.1504\/IJHPCN.2005.008562","journal-title":"International Journal of High Performance Computing and Networking"},{"key":"236_CR27","doi-asserted-by":"crossref","unstructured":"Wu Y, Izumi T, Ooshita F, Kakugawa H, Masuzawa T (2007) An adaptive randomized search protocol in peer-to-peer systems, Proceedings of the 2007 ACM symposium on Applied computing 533\u2013537. doi: 10.1145\/1244002.1244126","DOI":"10.1145\/1244002.1244126"},{"key":"236_CR28","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.websem.2011.04.004","volume":"10","author":"R Delbru","year":"2012","unstructured":"Delbru R, Campinas S, Tummarello G (2012) Searching web data: An entity retrieval and high-performance indexing model. Elsevier Web Semantics: Science, Services and Agents on the World Wide Web archive 10:33\u201358. doi: 10.1016\/j.websem.2011.04.004","journal-title":"Elsevier Web Semantics: Science, Services and Agents on the World Wide Web archive"},{"issue":"4","key":"236_CR29","doi-asserted-by":"crossref","first-page":"1210","DOI":"10.1016\/j.jnca.2011.01.007","volume":"34","author":"M Liu","year":"2011","unstructured":"Liu M, Koslela T, Ou Z, Zhou J, Riekki J, Ylianttila M (2011) Super-peer-based coordinated service provision. Journal of Network and Computer Applications archive 34(4):1210\u20131224. doi: 10.1016\/j.jnca.2011.01.007","journal-title":"Journal of Network and Computer Applications archive"},{"issue":"3","key":"236_CR30","doi-asserted-by":"crossref","first-page":"1052","DOI":"10.1016\/j.jnca.2011.12.005","volume":"35","author":"P Lee","year":"2012","unstructured":"Lee P, Jayasumana AP, DilumBandara HMN, Lim S, Chandrasekar V (2012) A peer-to-peer collaboration framework for multi-sensor data fusion. Journal of Network and Computer Applications archive 35(3):1052\u20131066. doi: 10.1016\/j.jnca.2011.12.005","journal-title":"Journal of Network and Computer Applications archive"},{"key":"236_CR31","unstructured":"Association for Computing Machinery (1998) ACM computing classification system (ACM CCS)"},{"key":"236_CR32","doi-asserted-by":"crossref","unstructured":"Ripeanu M, Foster I, Iamnitchi A (2002) Mapping the Gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal 6","DOI":"10.1007\/3-540-45748-8_8"},{"issue":"5","key":"236_CR33","first-page":"401","volume":"27","author":"N Ramzan","year":"2012","unstructured":"Ramzan N, Park H, Izquierdo B (2012) Video streaming over P2P networks: Challenges and opportunities. Image Communication Journal 27(5):401\u2013411. doi: 10.1016\/j.image.2012.02.004","journal-title":"Image Communication Journal"},{"issue":"4","key":"236_CR34","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"26","author":"S Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies. ACM Computing Surveys (CSUR) Journal 26(4):335\u2013371","journal-title":"ACM Computing Surveys (CSUR) Journal"},{"key":"236_CR35","unstructured":"Cormen TH, Leiserson ChE, Rivest RL, Stein C (2009) Introduction to algorithms, Second edition, MIT Press, ISBN 0-262-03384-4 168\u2013171"},{"key":"236_CR36","doi-asserted-by":"crossref","unstructured":"Michlmayr E (2006) Ant algorithms for search in unstructured peer-to-peer networks, Proceedings of ICDE","DOI":"10.1109\/ICDEW.2006.29"},{"key":"236_CR37","doi-asserted-by":"crossref","unstructured":"Marti S, Ganesan P, Molina HG (2004) DHT routing using social links. Proceeding of the 3rdInternational Workshop on Peer-to-Peer Systems (IPTPS\u201904)","DOI":"10.1007\/978-3-540-30183-7_10"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-013-0236-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-013-0236-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-013-0236-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T14:11:00Z","timestamp":1564150260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-013-0236-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,29]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["236"],"URL":"https:\/\/doi.org\/10.1007\/s12083-013-0236-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,29]]}}}