IEEE P2P 2013 Proceedings 2013
DOI: 10.1109/p2p.2013.6688721
|View full text |Cite
|
Sign up to set email alerts
|

OBST: A self-adjusting peer-to-peer overlay based on multiple BSTs

Abstract: Abstract-The design of scalable and robust overlay topologies has been a main research subject since the very origins of peer-to-peer (p2p) computing. Today, the corresponding optimization tradeoffs are fairly well-understood, at least in the static case and from a worst-case perspective.This paper revisits the peer-to-peer topology design problem from a self-organization perspective. We initiate the study of topologies which are optimized to serve the communication demand, or even self-adjusting as demand cha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…In particular, it leads us to a third connection, namely to information and coding theory, see also [3] for a code-based network deisgn of arbitrary degree. It is known that the expected path length in binary search trees [23] as well as in network designs providing local routing [2,3,21] is related to the entropy H(X) (over the elements X in the data structure) resp. conditional entropy of the distribution: H(X|Y ) + H(Y |X) is a lower bound on the expected path length of local routing tree designs [21] where X, Y are the random variables distributed according to the marginal distribution of the sources and destinations in D. This bound is tight for the limited case where D is a product distribution (i.e., p(i, j) = p(i)p(j)).…”
Section: Putting Things Into Perspective and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, it leads us to a third connection, namely to information and coding theory, see also [3] for a code-based network deisgn of arbitrary degree. It is known that the expected path length in binary search trees [23] as well as in network designs providing local routing [2,3,21] is related to the entropy H(X) (over the elements X in the data structure) resp. conditional entropy of the distribution: H(X|Y ) + H(Y |X) is a lower bound on the expected path length of local routing tree designs [21] where X, Y are the random variables distributed according to the marginal distribution of the sources and destinations in D. This bound is tight for the limited case where D is a product distribution (i.e., p(i, j) = p(i)p(j)).…”
Section: Putting Things Into Perspective and Related Workmentioning
confidence: 99%
“…Our objective is to minimize the expected path length [1,2,21] of the designed host network N ∈ N : For u, v ∈ V (N ), let d N (u, v) denote the shortest path between u and v in N . Given a distribution D over V × V and a graph N over V , the Expected Path Length (EPL) of route requests is defined as:…”
Section: Introductionmentioning
confidence: 99%
“…Preliminary versions of the results presented in this paper appeared at DISC 2012 [20], IEEE IPDPS 2013 [6], and IEEE P2P 2013 [4].…”
Section: Related Workmentioning
confidence: 99%
“…Compute the approximate median priority M by using the algorithm AMF. 5 Compute |L low |, |L high |, and |g s | using the balanced skip list formed by AMF if the condition in Equation 2 is true. 6 Determine the membership vector bit V x d by using P (x), M , |L low |, |L high |, and |g s | and update is-dominating-group D x d .…”
Section: E Assignment Of New Timestampsmentioning
confidence: 99%