29th Annual IEEE International Conference on Local Computer Networks
DOI: 10.1109/lcn.2004.32
|View full text |Cite
|
Sign up to set email alerts
|

Bringing efficient advanced queries to distributed hash tables

Abstract: Interest in distributed storage is fueled by demand for reliability and resilience combined with ubiquitous availability. Peer-to-peer (P2P) storage networks are known for their decentralized control, self-organization, and adaptation. Advanced searching for documents and resources remains an open problem. The flooding approach favored by some P2P networks is ineffiencient in resource usage, but more scalable and resource-efficient solutions based on Distributed Hash Tables (DHT) lack in query expressiveness a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0
2

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 22 publications
0
14
0
2
Order By: Relevance
“…It is applied in networking literature [4]. [12]) and share Web cache information ( [13]). BFs have great potential for representing a set in main memory [14] in stand-alone applications.…”
Section: Fig 1: Bloom Filtermentioning
confidence: 99%
“…It is applied in networking literature [4]. [12]) and share Web cache information ( [13]). BFs have great potential for representing a set in main memory [14] in stand-alone applications.…”
Section: Fig 1: Bloom Filtermentioning
confidence: 99%
“…Guo et al [8] proposed dynamic Bloom filters that can grow as needed by adding static sized Bloom filters to a list of Bloom filters as soon as the actual Bloom filter's false positive rate increases over a given threshold. Bauer et al [2] propose simple boolean set operations on Bloom filters to combine sub-queries for efficient queries on distributed hash tables. However, Bloom filters are by far not the only way to go.…”
Section: Related Workmentioning
confidence: 99%
“…We use Bloom filters to encode the social information of users as they allow efficient set operations according to [2]. As already stated, we enhance our system with this user specific information and utilise this information in the lookup procedure of potentially interesting contacts as well as in our two-way message protocol.…”
Section: Related Workmentioning
confidence: 99%
“…The first strategy requires d DHT lookups; one lookup per attribute. The intermediate result sets of these lookups are intersected to produce a final result set, either at the query initiator [8] or by pipelining the intermediate result sets through a number of nodes [9], [11], [12]. The second strategy requires only one lookup by taking only one intermediate result set to derive the query answers, but requires each key-value pair to include the complete attributes of its associated resource.…”
Section: Related Workmentioning
confidence: 99%