{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:10:37Z","timestamp":1725570637619},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icdcsw.2005.136","type":"proceedings-article","created":{"date-parts":[[2005,7,28]],"date-time":"2005-07-28T01:00:20Z","timestamp":1122512420000},"page":"815-821","source":"Crossref","is-referenced-by-count":3,"title":["TruGrid: A Self-Sustaining Trustworthy Grid"],"prefix":"10.1109","author":[{"family":"Yanmin Zhu","sequence":"first","affiliation":[]},{"family":"Jinsong Han","sequence":"additional","affiliation":[]},{"family":"Yunhao Liu","sequence":"additional","affiliation":[]},{"given":"L.M.","family":"Ni","sequence":"additional","affiliation":[]},{"family":"Chunming Hu","sequence":"additional","affiliation":[]},{"family":"Jinpeng Huai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"journal-title":"The Standard Performance Evaluation Corporation (SPEC) Home Page","year":"2004","key":"ref11"},{"key":"ref12","article-title":"Building topol-ogy-aware overlays using global soft-state","author":"xu","year":"0","journal-title":"23th IEEE International Conference on Distributed Computing Systems Providence RI United States"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281576"},{"key":"ref4","article-title":"Nim-rod\/G: an architecture of a resource management and scheduling system in a global computational grid","author":"buyya","year":"2000","journal-title":"HPC ASIA 2000"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0166-5316(86)90008-8"},{"key":"ref6","article-title":"Incentive-Based P2P Scheduling in Grid Computing","author":"zhu","year":"0","journal-title":"International Conference on Grid and Cooperative Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022275"},{"key":"ref8","article-title":"Security considerations for peer-to-peer distributed hash tables","author":"sit","year":"0","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015894"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/32.121753"},{"key":"ref1","first-page":"177","article-title":"Enterprise: A market-like task scheduler for distributed computing environ-ments","author":"malone","year":"1988","journal-title":"The Ecology of Computation"},{"key":"ref9","article-title":"Enforcing fair sharing of peer-to-peer re-sources","author":"ngan","year":"0","journal-title":"Proc 2nd International Workshop on Peer-to-Peer Systems (IPTP'03)"}],"event":{"name":"25th IEEE International Conference on Distributed Computing Systems Workshops","location":"Columbus, OH, USA"},"container-title":["25th IEEE International Conference on Distributed Computing Systems Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9817\/30953\/01437266.pdf?arnumber=1437266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T03:42:50Z","timestamp":1489549370000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1437266\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icdcsw.2005.136","relation":{},"subject":[]}}