Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003)
DOI: 10.1109/ptp.2003.1231532
|View full text |Cite
|
Sign up to set email alerts
|

Efa: an efficient content routing algorithm in large peer-to-peer overlay networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 4 publications
0
8
0
1
Order By: Relevance
“…Structured peer-to-peer networks. Unlike the peer-topeer gossip networks employed in decentralized blockchain systems, structured peer-to-peer networks are also extensively used in another series of systems that leverage topology information to make efficient routing decisions, including tree-based multicast protocols [9,10,54] and Distributed Hash Tables (DHTs) [11,37,49,53,55]. However, these designs make the protocols leak information about the structure of the network and introduce security vulnerabilities in adversarial environments.…”
Section: Related Workmentioning
confidence: 99%
“…Structured peer-to-peer networks. Unlike the peer-topeer gossip networks employed in decentralized blockchain systems, structured peer-to-peer networks are also extensively used in another series of systems that leverage topology information to make efficient routing decisions, including tree-based multicast protocols [9,10,54] and Distributed Hash Tables (DHTs) [11,37,49,53,55]. However, these designs make the protocols leak information about the structure of the network and introduce security vulnerabilities in adversarial environments.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [11]uses constrained flooding routingalgorithm to reduce traffic in unstructured P2P system.…”
Section: Related Workmentioning
confidence: 99%
“…Because there are multiple paths between nodes, there are a large number of duplicated messages propagated in the network. There are many technologies [24,11] to control duplicated messages by cutting flooding paths. However, in a schema-heterogeneous PDMS network, optimization cannot be done by simply cutting the flooding paths.…”
Section: Problems Of Query Evaluationmentioning
confidence: 99%