{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T15:39:35Z","timestamp":1771256375261,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1109\/saso.2009.43","type":"proceedings-article","created":{"date-parts":[[2009,11,5]],"date-time":"2009-11-05T18:34:01Z","timestamp":1257446041000},"page":"40-50","source":"Crossref","is-referenced-by-count":33,"title":["Myconet: A Fungi-Inspired Model for Superpeer-Based Peer-to-Peer Overlay Topologies"],"prefix":"10.1109","author":[{"given":"Paul L.","family":"Snyder","sequence":"first","affiliation":[]},{"given":"Rachel","family":"Greenstadt","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Valetto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Understanding KaZaA","author":"liang","year":"2004","journal-title":"Manuscript Polytechnic Univ"},{"key":"17","article-title":"BitTorrent protocol specification","author":"cohen","year":"0","journal-title":"Proc First Workshop the Economics of Peer-to-Peer Systems"},{"key":"18","author":"heckmann","year":"2002","journal-title":"The eDonkey 2000 Protocol"},{"key":"15","article-title":"T-Man: Fast gossip-based construction of large-scale overlay topologies","author":"jelasity","year":"0","journal-title":"University of Bologna Department of Computer Science UBLCS-2004-7"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610546"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.309"},{"key":"14","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/1315245.1315274","article-title":"Analyzing the vulnerability of superpeer networks against attack","author":"mitra","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260781"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/WCW.2005.6"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2008.35"},{"key":"20","article-title":"Peer-to-Peer Architecture Case Study: Gnutella Network","volume":"101","author":"ripeanu","year":"2001","journal-title":"Proc 1st Int Conf Peer-to-Peer Comput"},{"key":"22","article-title":"Towards autonomic control of network topologies","author":"matossian","year":"2006","journal-title":"1st IEEE Workshop on Modeling Autonomic Communication Environments (MACE) 2nd International Week on Management of Networks and Services (Manweek 2006)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.180"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2005.78"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317810"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320196"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177105"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2008.55"},{"key":"2","article-title":"Emergent computing for pervasive adaptation","author":"paechter","year":"2008","journal-title":"First PerAda Summer School on Pervasive Adaptation"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.75.051911"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420011449","author":"de castro","year":"2006","journal-title":"Fundamentals of Natural Computing Basic Concepts Algorithms and Applications"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78849-2_47"},{"key":"6","first-page":"202","article-title":"A robust protocol for building superpeer overlay topologies","author":"montresor","year":"2004","journal-title":"Proceedings of the 4th International Conference on Peer-to-Peer Computing"},{"key":"5","article-title":"mycelium?","author":"fleming","year":"2004"},{"key":"4","article-title":"PeerSim: A Peer-to-Peer Simulator","author":"jelasity","year":"0"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1017\/S0953756204001261"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11538-005-9056-6"}],"event":{"name":"2009 Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO)","location":"San Francisco, California, USA","start":{"date-parts":[[2009,9,14]]},"end":{"date-parts":[[2009,9,18]]}},"container-title":["2009 Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5298382\/5298383\/05298476.pdf?arnumber=5298476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,23]],"date-time":"2020-05-23T12:48:53Z","timestamp":1590238133000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5298476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/saso.2009.43","relation":{},"subject":[],"published":{"date-parts":[[2009,9]]}}}