2005
DOI: 10.1504/ijhpcn.2005.008562
|View full text |Cite
|
Sign up to set email alerts
|

'Dominating-set-based' searching in peer-to-peer networks

Abstract: The peer-to-peer network for sharing information and data through direct exchange has emerged rapidly in recent years. The searching problem is a basic issue that addresses the question "Where is X". Breadth-first search, the basic searching mechanism used in Gnutella networks [7], floods the networks to maximize the return results. Depth-first search used in Freenet [6] retrieves popular files faster than other files but on average the return results are not maximized. Other searching algorithms used in peer-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Aiming at this, several search algorithms have been raised and have a favourable effect in practical applications (Tsoumakos and Roussopoulos, 2006;Watanobe et al, 2006;Yang and Li, 2005). Aiming at this, several search algorithms have been raised and have a favourable effect in practical applications (Tsoumakos and Roussopoulos, 2006;Watanobe et al, 2006;Yang and Li, 2005).…”
Section: Search Algorithms On Distributed Networkmentioning
confidence: 99%
“…Aiming at this, several search algorithms have been raised and have a favourable effect in practical applications (Tsoumakos and Roussopoulos, 2006;Watanobe et al, 2006;Yang and Li, 2005). Aiming at this, several search algorithms have been raised and have a favourable effect in practical applications (Tsoumakos and Roussopoulos, 2006;Watanobe et al, 2006;Yang and Li, 2005).…”
Section: Search Algorithms On Distributed Networkmentioning
confidence: 99%
“…If p∊ D, i.e. p is a dominator, let u = p, f' = f, C' = C, D' = D, the node is removed after performing (8).…”
Section: Index Maintenancementioning
confidence: 99%
“…These works include iterative deepening [7], k-walker random walk [8], modified random BFS [9], two-level k-walker random walk [10], directed BFS [12], intelligent search [9], local indices based search [12], routing indices based search [11], attenuated bloom filter based search [12], adaptive probabilistic search [12], and dominating set based search [13]. They can be classified as BFS based or Depth First Search (DFS) based.…”
Section: Related Workmentioning
confidence: 99%