The IEEE Symposium on Computers and Communications 2010
DOI: 10.1109/iscc.2010.5546607
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting locality using geographic coordinates and semantic proximity in Chord

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Due to the virtual layer of the P2P architectures, peers disconnection from their underlying physical layer is allowed. This means that creation of a group of peers (clusters) for doing a particular task on a microgrid is possible [106]. Examples of clustering objectives include energy balancing, islanding and blackout prevention [37].…”
Section: Future Trends For Dynamic Microgridsmentioning
confidence: 99%
“…Due to the virtual layer of the P2P architectures, peers disconnection from their underlying physical layer is allowed. This means that creation of a group of peers (clusters) for doing a particular task on a microgrid is possible [106]. Examples of clustering objectives include energy balancing, islanding and blackout prevention [37].…”
Section: Future Trends For Dynamic Microgridsmentioning
confidence: 99%
“…In a P2P system, each peer can join and leave the system at any arbitrary time. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously changing [24]. This means that the finger table is dynamically built through a stabilization mechanism.…”
Section: Description Of the Chosen Dht Algorithmmentioning
confidence: 99%
“…The underlying physical network path could be significantly different from the path on the overlay network if locality in DHTs is not considered. Therefore, the lookup latency in the overlay network could be quite higher and decrease the performance of the application layer [21,24,25].…”
Section: Introductionmentioning
confidence: 99%