2019
DOI: 10.2298/csis180411002n
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent query processing in P2P networks: Semantic issues and routing algorithms

Abstract: P2P networks have become a commonly used way of disseminating content on the Internet. In this context, constructing efficient and distributed P2P routing algorithms for complex environments that include a huge number of distributed nodes with different computing and network capabilities is a major challenge. In the last years, query routing algorithms have evolved by taking into account different features (provenance, nodes' history, topic similarity, etc.). Such features are usually stored in auxiliary data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 97 publications
(144 reference statements)
0
6
0
Order By: Relevance
“…• Basic Searching Algorithms: The most common and foremost algorithms to search relevant resources in unstructured P2P systems are Breadth-First Search (BFS) or flooding [22,23].…”
Section: Existing Systems and Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations
“…• Basic Searching Algorithms: The most common and foremost algorithms to search relevant resources in unstructured P2P systems are Breadth-First Search (BFS) or flooding [22,23].…”
Section: Existing Systems and Algorithmsmentioning
confidence: 99%
“…BFS tries to find the maximum number of results. However, this generates a large number of messages and increases the number of connected peers with heavy network traffic compared to other approaches [23]. Napster and Gnutella are the suitable examples who implemented this routing method [24,25].…”
Section: Existing Systems and Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, their distributed architecture makes P2P incredibly invulnerable to cyberattacks. Unlike standard models, P2P does not aspect of failure [18]. There are three types of P2P overlay technologies that are called unstructured, structured and hybrid.…”
Section: How It Workmentioning
confidence: 99%