Abstract
Like Pythagorean theorem and Newton Law, excellent theories are always simple and graceful. DHT, which performs so graceful that only two basic operations: get data from DHT and put data into DHT, is wildly used in many aspects of applications. In this chapter several DHT applications will be discussed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
W. Litwin, Marie-Anna Neimat, and D. A. Schneider. Lh*-a scalable, distributed data structure. In ACM Transactions on Database Systems, volume 21, December 1996.
Distributed hash table. http://en.wikipedia.org/wiki/Distributed_hash_table.
Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma, and Steven Lim. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials, 7:72–93, 2005.
Stephanos, Androutsellis-Theotokis, and Diomidis Spinellis. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4):335–371, December 2004.
D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In STOC ’97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, pages 654–663, May 1997.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM ’01 Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 149–160, August 2001.
Coralcdn. http://www.coralcdn.org/.
Hazelcast. http://www.hazelcast.com.
Avinash Lakshman and Prashant Malik. Cassandra: a decentralized structured storage system. ACM SIGOPS Operating Systems Review, 44:35–40, April 2010.
Websphere extreme scale. http://www-01.ibm.com/software/webservers/appserv/extremescale.
Bamboo. http://bamboo-dht.org.
Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, Gunavardhan Kakulapati, Avinash Lakshman, Alex Pilchin, Swaminathan Sivasubramanian, Peter Vosshall, and Werner Vogels. Dynamo: Amazon’s highly available key-value store. In Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, 2007.
Guangyu Shi, Jian Chen, Hao Gong, Lingyuan Fan, Haiqiang Xue, Qingming Lu, and Liang Liang. A dht key-value storage system with carrier grade performance. In Euro-Par 2009 Parallel Processing, volume 5704, pages 361–374, 2009.
Codeen. http://codeen.cs.princeton.edu/.
Gnunet: Gnu’ framework for secure peer-to-peer networking. https://gnunet.org/.
Filipe Araujo and Luis Rodrigues. Survey on distributed hash tables, 2006. https://estudogeral.sib.uc.pt/handle/10316/13603.
Stephanos Androutsellis-Theotokis and Diomidis Spinellis. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36:335–371, December 2004.
Siamak Sarmady. A survey on peer-to-peer and dht, 2010. http://www.sarmady.com/siamak/papers/p2p-290808-2.pdf.
Zhang YiMing, Lu XiCheng, and Li DongSheng. Survey of dht topology construction techniques in virtual computing environments. Science China Information sciences, 54(11):2221–2235, November 2011.
Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz. Handling churn in a dht. In Proceedings of the USENIX Annual Technical Conference, June 2004.
Us secure hash algorithm 1 (sha1), 2001. http://http://www.ietf.org/rfc/rfc3174.txt.
Paola Flocchini, Amiya Nayak, and Ming Xie. Enhancing peer-to-peer systems through redundancy. IEEE Journal on Selected Areas in Communications, 25(1):15–24, January 2007.
Yuh-Jzer Joung and Jiaw-Chang Wang. chord 2:a two-layer chord for reducing maintenance overhead via heterogeneity. Computer Networks, 51(3):712–731, February 2007.
M. Frans Kaashoek and David R. Karger. Koorde: A simple degree-optimal distributed hash table. Lecture Notes in Computer Science, 2735:98–107, 2003.
De bruijn graph. http://en.wikipedia.org/wiki/De_Bruijn_graph.
G. Cordasco, L. Gargano, A. Negro, V. Scarano, and M. Hammar. F-chord: Improved uniform routing on chord. Networks, 52(4):325–332, June 2008.
Moni Naor and Udi Wiede. Know thy neighbor’s neighbor: Better routing for skip-graphs and small worlds. In Peer-to-Peer Systems III, volume 3279, pages 269–277, 2005.
G. S. Manku. The power od lookahead in small-world routing networks. In STOC, 2004.
Gurmeet Singh Manku, Moni Naor, and Udi Wieder. Know thy neighbor’s neighbor: The power of lookahead in randomized p2p networks. In Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, pages 54–63, 2004.
Prasanna Ganesan and Gurmeet Singh Manku. Optimal routing in chord. In Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, pages 176–185, 2004.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Schenker. A scalable content-addressable network. In SIGCOMM ’01 Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 161–172, August 2001.
Daishi Kato. Gisp: Global information sharing protocol—a distributed index for peer-to-peer systems. In Second International Conference on Peer-to-Peer Computing, pages 65–72, September 2002.
Petar Maymounkov and David Mazières. Gisp: Global information sharing protocol—a distributed index for peer-to-peer systems. In 1st International Workshop on Peer-to-Peer Systems, March 2002.
Overnet. http://www.overnet.org/.
emule. http://www.amule.org/.
emule. http://www.bittorrent.com.
Johan Pouwelse, Pawel Garbacki, Dick Epema, and Henk Sips. The bittorrent p2p file-sharing system: Measurements and analysis. Lecture Notes in Computer Science, 3640:205–216, 2005.
D. Stutzbach and R. Rejaie. Improving lookup performance over a widely-deployed dht. In 25th IEEE International Conference on Computer Communications, 2006.
Di Wu, Ye Tian, and Kam Wing Ng. Analytical study on improving lookup performance of distributed hash table systems under churn. In Sixth IEEE International Conference on Peer-to-Peer Computing, September 2006.
Zhonghong Ou, Erkki Harjula, Otso Kassinen, and Mika Ylianttila. Performance evaluation of a kademlia-based communication-oriented p2p system under churn. Computer Networks, 54(5):689–705, April 2010.
Hun J. Kang, Eric Chan-Tin, Nicholas J. Hopper, and Yongdae Kim. Why kad lookup fails. In IEEE P2P’09, September 2009.
Andreas Binzenhofer and Holger Schnabel. Improving the performance and robustness of kademlia-based overlay networks. Kommunikation in Verteilten Systemen (KiVS), pages 15–26, 2007.
Antony Rowstron and Peter Druschel. Pastry: Scalabel, distributed object location and routing for large-scale peer-to-peer systems. In IFIP/ACM International Conference on Distributed Systems Platforms, pages 329–350, November 2001.
Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John D. Kubiatowicz. Tapestry: A resilient global-scale overlay for service deployment. In IEEE Journal on Selected Areas in Communications, volume 22, 2004.
An architecture for ip address allocation with cidr, September 1993. http://merlot.tools.ietf.org/html/rfc1518.
Dahlia Malkhi, Moni Naor, and David Ratajczak. Viceroy: A scalabel and dynamic emulation of the butterfly. In Proceedings of the twenty-first annual symposium on Principles of distributed computing, pages 183–192, 2002.
Elena Meshkovaa, Janne Riihijarvia, Marina Petrovaa, and Petri Mahonen. A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks. Computer Networks, 52(11):2097–2128, August 2008.
C. G. Plaxton, R. Rajaraman, and A. W. Richa. Accessing nearby copies of replicated objects in a distributed environment. Theory of Computing Systems, 32(3):241–280, 1999.
Ryan Huebsch, Joseph M. Hellerstein, Nick Lanham, Boon Thau Loo, Scott Shenker, and Ion Stoica. Querying the internet with pier. In Proceedings of the 29th international conference on Very large data bases, volume 29, pages 321–332, 2003.
Opendht. http://opendht.org/.
Planetlab. http://www.planet-lab.org/.
Michael J. Freedman, Eric Freudenthal, and David Mazieres. Democratizing content publication with coral. In Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, 2004.
Michael J. Freedman and Princeton University. Experiences with coralcdn: A five-year operational view. In Proceedings of the 7th USENIX conference on Networked systems design and implementation, 2010.
Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu. Opendht: A public dht service and its uses. In Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, 2005.
Jxta: The language and platform independent protocol for p2p networking. http://jxta.kenai.com.
D. Brookshier, D. Govoni, N. Krishnan, and J. C. Soto. JXTA: Java P2P Programming. Daniel Brookshier Darren Govoni Navaneeth Krishnan Juan Carlos Sotoen, 2002.
Jxta v2.0 protocols specification. http://jxta.kenai.com/Specifications/JXTAProtocols2_0.pdf.
Bernard Traversat, Mohamed Abdelaziz, and Eric Pouyoul. Project jxta: A loosely-consistent dht rendezvous walker, 2004. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.3.9419&rep=rep1&type=pdf.
Gnunet. http://en.wikipedia.org/wiki/GNUnet.
Christian Grothoff. The gnunet dht. http://grothoff.org/christian/teaching/2011/2194/dht.pdf.
Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu, and Tiberiu Stef. Gnunet - a truly anonymous networking infrastructure. In Proc. Privacy Enhancing Technologies Workshop, 2002.
S. Kaffille and K. Loesing. Open Chord version 1.0.4 User’s Manual, 2007. http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/Dateien/Forschung/open-chord_1.0.4_manual.pdf.
Hazelcast documentation. http://www.hazelcast.com/documentation.jsp.
Patrick Hunt, Mahadev Konar, Flavio P. Junqueira, and Benjamin Reed. Zookeeper: wait-free coordination for internet-scale systems. In Proceeding USENIXATC’10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference, 2010.
Internet indirection infrastructure. http://i3.cs.berkeley.edu/.
Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, and Sonesh Surana. Internet indirection infrastructure. In SIGCOMM, 2002.
Overlay weaver. http://overlayweaver.sourceforge.net/.
Kazuyuki Shudo, Yoshio Tanaka, and Satoshi Sekiguchi. Overlay weaver: An overlay construction toolkit. Computer Communications, 31(2):402–412, February 2008.
Apache software foundation. http://en.wikipedia.org/wiki/Apache_Software_Foundation.
Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, and Robert E. Gruber. Bigtable: A distributed storage system for structured data. In Proceedings of the 7th Conference on USENIX Symposium on Operating Systems Design and Implementation, volume 7, pages 205–218, 2006.
Naohiro Hayashibara, Xavier Defago, Rami Yared, and Takuya Katayama. The φ accrual failure detector. In Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004.
Cassandra. http://en.wikipedia.org/wiki/Apache_Cassandra.
Cassandra. http://cassandra.apache.org/.
IBM. Scalable, Integrated Solutions for Elastic Caching Using IBM WebSphere eXtreme Scale, 2011. Redbooks.
Dynamo: A flawed architecture. http://news.ycombinator.com/item?id=915212.
Bruce S. Davie and Jan Medved. A programmable overlay router for service provider innovation. In Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow, 2009.
Maidsafe. http://www.maidsafe.net/maidsafe-dht.asp.
Freepastry. http://www.freepastry.org/FreePastry/.
Jdht. http://dks.sics.se/jdht/.
Khashmir. http://khashmir.sourceforge.net/.
Charles Killian, James W. Anderson, Ryan Braud, Ranjit Jhala, and Amin Vahdat. Mace: Language support for building distributed systems. In Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation, 2007.
Dijjer. http://www.dijjer.org.
Akamai. http://www.akamai.com/.
Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovic, and Fabian E. Bustamante. Drafting behind akamai. In SIGCOMM’06, 2006.
D. M. Moen. Overview of overlay multicast protocols. http://bacon.gmu.edu/XOM/pdfs/Multicast%20Overview.pdf.
Stefan Birrer and Fabian E. Bustamante. A comparison of resilient overlay multicast approaches. IEEE Journal on Selected Areas in Communications, 25(9):1695–1705, 2007.
Miguel Castro, Peter Druschel, Anne Marie Kermarrec, and Antony Rowstron. Scribe: A large-scale and decentralized application-level multicast infrasstructure. In IEEE Journal on Selected Areas in Communications, volume 20, October 2002.
Jae Woo Lee, Henning Schulzrinne, Wolfgang Kellerer, and Zoran Despotovic. mdht: Multicast-augmented dht architecture for high availability and immunity to churn. In Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, 2009.
Andrea Passarella, Franca Delmastro, and Marco Conti. Xscribe: a stateless, cross-layer approach to p2p multicast in multi-hop ad hoc networks. In Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, 2006.
Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Animesh Nandi, Antony Rowstron, and Atul Singh. Splitstream: high-bandwidth multicast in cooperative environments. ACM SIGOPS Operating Systems Review, 37(5):298–313, December 2003.
Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, and John D. Kubiatowicz. Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination. In Proceedings of the 11th international workshop on Network and operating systems support for digital audio and video, 2001.
W.-P. Ken Yiu, Xing Jin, and S.-H. Gary Chan. Challenges and approaches in large-scale p2p media streaming. IEEE Multimedia, 14(2):50–59, 2007.
Michael J. Freedman, Karthik Lakshminarayanan, and David Mazières. Oasis: Anycast for any service. In Proceedings of the 3rd conference on Networked Systems Design and Implementation - Volume 3, 2006.
Guodong Wang, Yang Chen, Lei Shi, Eng Keong Lua, Beixing Deng, and Xing Li. Proxima: towards lightweight and flexible anycast service. In Proceedings of the 28th IEEE international conference on Computer Communications Workshops, 2009.
Hitesh Ballani and Paul Francis. Towards a global ip anycast service. In Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, 2005.
Hitesh Ballani and Paul Francis. Analysis of an anycast based overlay system for scalable service discovery and execution. Computer Networks, 54(1):97–111, January 2010.
Byung gon Chun, Peter Wu, Hakim Weatherspoon, and John Kubiatowicz. Chunkcast: An anycast service for large content distribution. In In Proceedings of the 5th International Workshop on Peer-to-Peer Systems, 2006.
Ip version 6 addressing architecture. http://tools.ietf.org/html/rfc4291.
Venugopalan Ramasubramanian and Emin Gün Sirer. The design and implementation of a next generation name service for the internet. In Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, 2004.
Venugopalan Ramasubramanian and Emin Gün Sirer. Beehive: Exploiting power law query distributions for o(1) lookup performance in peer to peer overlays. symposium on networked systems design and implementation. In Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1, 2004.
V. Pappas, D. Massey, A. Terzis,, and L. Zhang. A comparative study of the dns design with dht-based alternatives. In INFOCOM, 2006.
Fang Qiming, Yang Guangwen, Wu Yongwei, and Zheng Weimin. P2p web search technology. Journal of Software, 19(10):2706–2719, October 2008.
Yacy. http://yacy.de/.
B. Goetz. The lucene search engine: Powerful, flexible, and free, 2002. http://www.javaworld.com/javaworld/jw-09-2000/jw-0915-lucene.html?page=1.
Solandra. https://github.com/tjake/Solandra.
Elastic. http://www.elasticsearch.org/.
Faroo. http://www.faroo.com.
John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Chris Wells, and Ben Zhao. Oceanstore: An architecture for global-scale persistent storage. ACM SIGOPS Operating Systems Review, 34(5):190–201, November 2000.
Peter Druschel and Antony Rowstron. Past: A large-scale, persistent peer-to-peer storage utility. In Eighth Workshop on Hot Topics in Operating Systems, pages 75–80, May 2001.
Marcel Karnstedt, Kai-Uwe Sattler, Martin Richtarsky, Jessica Muller, Manfred Hauswirth, Roman Schmidt, and Renault John. Unistore: Querying a dht-based universal storage. IEEE 23rd International Conference on Data Engineering, 1:1503–1504, 2007.
Martin Raack. Okeanos: Reconfigurable fault-tolerant transactional storage supporting object deletions. In High Performance Computing (HiPC), 2010 International Conference on, pages 1–10, december 2011.
Antony Rowstron and Peter Druschel. Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility. In SOSP ’01 Proceedings of the eighteenth ACM symposium on Operating systems principles, pages 188–201, 2001.
Qinlu He, Zhanhuai Li, and Xiao Zhang. Study on dht based open p2p cloud storage services systems. In 2010 International Conference on Computational and Information Sciences, 2010.
Napster. http://en.wikipedia.org/wiki/Napster.
Ian Clarke, Scott G. Miller, Theodore W. Hong, Oskar Sandberg, and Brandon Wiley. Protecting free expression online with freenet. IEEE Internet Computing, 6(1):40–49, 2002.
Freenet. http://freenetproject.org.
Ian Clarke. A distributed decentralised information storage and retrieval system, 1999. http://freenetproject.org/papers/ddisrs.pdf.
L. Clarke, O. Sandberg, B. Wiley, and T.W. Hong. Freenet: a distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies. International Workshop on Design Issues in Anonymity and Unobservability, 2000.
Toby Walsh. Searching in a small world. In IJCAI, pages 1172–1177, 1999.
Vilhelm Verende. Switching for a small world. Master’s thesis, Chalmers University of Technology, 2007. http://www.cse.chalmers.se/~vive/vilhelm_thesis.pdf.
Ian Clarke, Oskar Sandberg, Matthew Toseland, and Vilhelm Verendel. Private communication through a network of trusted connections: The dark freenet, 2010. http://freenetproject.org/papers/freenet-0.7.5-paper.pdf.
Peter Biddle, Paul Engl, Marcus Peinado, and Bryan Willman. The darknet and the future of content distribution. In Digital Rights Management: Technological, Economic, Legal and Political Aspects, volume 2770, pages 344–365, 2003.
Salman A. Baset and Henning Schulzrinne. An analysis of the skype peer-to-peer internet telephony protocol. Proceedings IEEE INFOCOM 2006 25TH IEEE International Conference on Computer Communications, 6(c):1–11, 2004.
David A. Bryan, Bruce Lowekamp, and Cullen Jennings. Sosimple: A serverless, standards-based, p2p sip communication system. In AAA-IDEA’05, pages 42–49, 2005.
Marti A. Motoyama and George Varghese. Crosstalk: scalably interconnecting instant messaging networks. In Proceedings of the 2nd ACM workshop on Online social networks, 2009.
Wei Tsang Ooi. Dht and p2p games, 2009. http://www.slideshare.net/weitsang/lecture-7-dht-and-p2p-games-presentation.
Adeona, 2009. http://adeona.cs.washington.edu/.
Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno. Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with dhts. In Proceedings of the 17th conference on Security symposium, pages 275–290, 2008.
Jim Gray. An analysis of the skype peer-to-peer internet telephony protocol. Queue, 6(3):63–68, May 2008.
David P. Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, and Dan Werthimer. Seti@home: An experiment in public-resource computing. Communications of the ACM, 45(11):56–61, November 2002.
S. Keshav. Efficient and decentralized computation of approximate global state. ACM SIGCOMM Computer Communication Revie, 36(1), January 2006.
Rafik Makhloufi, Gregory Bonnet, Guillaume Doyen, and Dominique Gaiti. Decentralized aggregation protocols in peer-to-peer networks: A survey. In Proceedings of the 4th IEEE International Workshop on Modelling Autonomic Communications, number 1, pages 111–116, 2009.
David Kempe, Alin Dobra, and Johannes Gehrke. Gossip-based computation of aggregate information. In 44th Annual IEEE Symposium on Foundations of Computer Science, 2003.
Ji Li, Karen Sollins, and Dah-Yoh Lim. Implementing aggregation and broadcast over distributed hash tables. In ACM SIGCOMM Computer Communication Review, volume 35, pages 81–92, January 2005.
Marc S. Artigas, Pedro Garcia, and Antonio F. Skarmeta. Deca: A hierarchical framework for decentralized aggregation in dhts. In 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, October 2006.
Matthew Harren, Joseph M. Hellerstein, Ryan Huebsch, Boon Thau Loo, Scott Shenker, and Ion Stoica. Complex queries in dht based p eer-to-peer networks. In Proceeding IPTPS ’01 Revised Papers from the First International Workshop on Peer-to-Peer Systems, pages 242–259, 2002.
Bauer Daniel, Hurley Paul, Pletka Roman, and Waldvogel Marcel. Complex queries in dht based peer-to-peer networks. In Proceeding 29th Annual IEEE International Conference on Local Computer Networks, May 2004.
Davide Carfi, Massimo Coppola, Domenico Laforenza, and Laura Ricci. Ddt: A distributed data structure for the support of p2p range query. In CollaborateCom’09, pages 1–10, 2009.
Guanling Lee, Jia-Sin Huang, and Yi-Chun Chen. Supporting filename partial matches in structured peer-to-peer overlay. In 5th International Conference on Grid and Pervasive Computing, 2010.
Tan Yunsong and Wu Yuntao. Efficient range indexing in dht-based peer-to-peer networks. In International Forum on Information Technology and Applications, 2009.
Guido Urdaneta, Guillaume Pierre, and Maarten van Steen. A survey of dht security techniques. ACM Computing Surveys, 43, January 2011.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Zhang, H., Wen, Y., Xie, H., Yu, N. (2013). DHT Applications. In: Distributed Hash Table. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-9008-1_4
Download citation
DOI: https://doi.org/10.1007/978-1-4614-9008-1_4
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-9007-4
Online ISBN: 978-1-4614-9008-1
eBook Packages: Computer ScienceComputer Science (R0)