2015
DOI: 10.1007/s10922-015-9353-9
|View full text |Cite
|
Sign up to set email alerts
|

A Self-adaptive Algorithm for Topology Matching in Unstructured Peer-to-Peer Networks

Abstract: Peer-to-peer networks are overlay networks that are constructed over underlay networks. These networks can be structured or unstructured. In these networks, peers choose their neighbors without considering underlay positions, and therefore, the resultant overlay network may have a large number of mismatched paths. In a mismatched path, a message may meet an underlay position several times, which causes redundant network traffic and end-to-end delay. In some of the topology matching algorithms called the heuris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 43 publications
0
4
0
Order By: Relevance
“…In the recent years, LA has been used in different applications such as cognitive networks, 1 ad hoc networks, 13 wireless sensor networks, 14 WiMAX networks, 15 network security, 16 wireless mesh networks, 17 mobile video network surveillance, 18 vehicular environment, 19,20 P2P networks, 9,21,22 wireless data broadcasting systems, [23][24][25] smart grid systems, 26 grid computing, 27 and cloud computing, 28 to mention a few.…”
Section: Learning Automatamentioning
confidence: 99%
See 1 more Smart Citation
“…In the recent years, LA has been used in different applications such as cognitive networks, 1 ad hoc networks, 13 wireless sensor networks, 14 WiMAX networks, 15 network security, 16 wireless mesh networks, 17 mobile video network surveillance, 18 vehicular environment, 19,20 P2P networks, 9,21,22 wireless data broadcasting systems, [23][24][25] smart grid systems, 26 grid computing, 27 and cloud computing, 28 to mention a few.…”
Section: Learning Automatamentioning
confidence: 99%
“…If a = b, the recurrence equations and are called linear reward penalty (L RP ) algorithm. More information can be found in Najim and Poznyak 11 : centertruepin+1=pin+a1pinpjn+1=1apjnj,ji, centertruepin+1=1bpinpjn+1=br1+1bpjnj,ji. In the recent years, LA has been used in different applications such as cognitive networks, 1 ad hoc networks, 13 wireless sensor networks, 14 WiMAX networks, 15 network security, 16 wireless mesh networks, 17 mobile video network surveillance, 18 vehicular environment, 19,20 P2P networks, 9,21,22 wireless data broadcasting systems, 23–25 smart grid systems, 26 grid computing, 27 and cloud computing, 28 to mention a few.…”
Section: Preliminariesmentioning
confidence: 99%
“…Learning automata have a vast variety of applications in combinatorial optimization problems, computer networks, queuing theory, image processing, information retrieval, adaptive control, neural network engineering, cloud computing, social networks, and pattern recognition …”
Section: Learning Automatamentioning
confidence: 99%
“…In the latter case, the action probability vectors remain unchanged when the action taken is penalized by the environment. Learning automata have a vast variety of applications in combinatorial optimization problems, [25][26][27][28] computer networks, 25,[29][30][31][32][33][34] queuing theory, 35 image processing, 36 information retrieval, 37,38 adaptive control, 39 neural network engineering, 40,41 cloud computing, 42 social networks, 24,[43][44][45] and pattern recognition. 46…”
Section: Learning Automatamentioning
confidence: 99%