Please use this identifier to cite or link to this item:
http://hdl.handle.net/1893/3688
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Furness, Jamie | en_UK |
dc.contributor.author | Kolberg, Mario | en_UK |
dc.date.accessioned | 2016-12-07T00:59:18Z | - |
dc.date.available | 2016-12-07T00:59:18Z | - |
dc.date.issued | 2011 | en_UK |
dc.identifier.uri | http://hdl.handle.net/1893/3688 | - |
dc.description.abstract | Abstract-Traditionally complex queries have been performed over unstructured P2P networks by means of flooding, which is inherently inefficient due to the large number of redundant messages generated. While Distributed Hash Tables (DHTs) can provide very efficient look-up operations, they traditionally do not provide any methods for complex queries. By exploiting the structure inherent in DHTs we can perform complex querying over structured P2P networks by means of efficiently broadcasting the search query. This allows every node in the network to process the query locally, and hence is as powerful and flexible as flooding in unstructured networks, but without the inefficiency of redundant messages. While there have been various approaches proposed for broadcasting search queries over DHTs, the focus has not been on validation under churn. Comparing blind search methods for DHTs through simulation we see that churn, in particular nodes leaving the network, has a large impact on query success rate. In this paper we present novel results comparing blind search over Chord and Pastry while under varying levels of churn. We further consider how different data replication strategies can be used to enhance the query success rate. | en_UK |
dc.language.iso | en | en_UK |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_UK |
dc.relation | Furness J & Kolberg M (2011) Considering Complex Search Techniques in DHTs Under Churn. In: IEEE Consumer Communications and Networking Conference (CCNC), 2011. 8th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, 09.01.2011-12.01.2011. Institute of Electrical and Electronics Engineers (IEEE), pp. 559-564. https://doi.org/10.1109/CCNC.2011.5766542 | en_UK |
dc.rights | Published in IEEE Consumer Communications and Networking Conference (CCNC), 2011. © Copyright 2011 IEEE. © 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_UK |
dc.subject | Collaboration Tools | en_UK |
dc.subject | Computer science Mathematics | en_UK |
dc.title | Considering Complex Search Techniques in DHTs Under Churn | en_UK |
dc.type | Conference Paper | en_UK |
dc.identifier.doi | 10.1109/CCNC.2011.5766542 | en_UK |
dc.citation.spage | 559 | en_UK |
dc.citation.epage | 564 | en_UK |
dc.citation.publicationstatus | Published | en_UK |
dc.citation.peerreviewed | Refereed | en_UK |
dc.type.status | AM - Accepted Manuscript | en_UK |
dc.author.email | mko@cs.stir.ac.uk | en_UK |
dc.citation.btitle | IEEE Consumer Communications and Networking Conference (CCNC), 2011 | en_UK |
dc.citation.conferencedates | 2011-01-09 - 2011-01-12 | en_UK |
dc.citation.conferencelocation | Las Vegas, NV | en_UK |
dc.citation.conferencename | 8th IEEE Consumer Communications and Networking Conference (CCNC) | en_UK |
dc.citation.isbn | 978-1-4244-8789-9 | en_UK |
dc.contributor.affiliation | University of Stirling | en_UK |
dc.contributor.affiliation | Computing Science | en_UK |
dc.identifier.scopusid | 2-s2.0-79957903557 | en_UK |
dc.identifier.wtid | 771359 | en_UK |
dc.contributor.orcid | 0000-0002-0930-2385 | en_UK |
dcterms.dateAccepted | 2011-12-31 | en_UK |
dc.date.filedepositdate | 2012-03-06 | en_UK |
rioxxterms.type | Conference Paper/Proceeding/Abstract | en_UK |
rioxxterms.version | AM | en_UK |
local.rioxx.author | Furness, Jamie| | en_UK |
local.rioxx.author | Kolberg, Mario|0000-0002-0930-2385 | en_UK |
local.rioxx.project | Internal Project|University of Stirling|https://isni.org/isni/0000000122484331 | en_UK |
local.rioxx.freetoreaddate | 2012-03-06 | en_UK |
local.rioxx.licence | http://www.rioxx.net/licenses/all-rights-reserved|2012-03-06| | en_UK |
local.rioxx.filename | ccnc-2011-jamie.pdf | en_UK |
local.rioxx.filecount | 1 | en_UK |
local.rioxx.source | 978-1-4244-8789-9 | en_UK |
Appears in Collections: | Computing Science and Mathematics Conference Papers and Proceedings |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ccnc-2011-jamie.pdf | Fulltext - Accepted Version | 1.08 MB | Adobe PDF | View/Open |
This item is protected by original copyright |
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/
If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.