2001
DOI: 10.1007/3-540-44751-2_15
|View full text |Cite
|
Sign up to set email alerts
|

P-Grid: A Self-Organizing Access Structure for P2P Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
380
0
5

Year Published

2004
2004
2013
2013

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 399 publications
(385 citation statements)
references
References 6 publications
0
380
0
5
Order By: Relevance
“…The availability of efficient algorithms depends mostly on the ability to build a spanning tree on the overlay. A tree-based system such as P-Grid [9] offers a natural support for broadcast. Others such as Chord [10], Tapestry [11] or Kademlia [12], can be seen as k-ary trees.…”
Section: Related Workmentioning
confidence: 99%
“…The availability of efficient algorithms depends mostly on the ability to build a spanning tree on the overlay. A tree-based system such as P-Grid [9] offers a natural support for broadcast. Others such as Chord [10], Tapestry [11] or Kademlia [12], can be seen as k-ary trees.…”
Section: Related Workmentioning
confidence: 99%
“…They use logical ring structures to divide the address space up amongst the peers, and they use some notion of routing tables, finger tables, or neighbor lists to keep connections to a number of other peers in the overlay network, which resembles some similarity with the secondary connections in our approach [2,[4][5][6]. In the case of Chord [2], e.g., each peer maintains a so called finger table that consists of references to the peer opposite to itself in the ring, to the peer a quarter rotation ahead, to the peer an eighth rotation ahead, and so on.…”
Section: Related Workmentioning
confidence: 99%
“…For file sharing applications, e.g., the pre-dominant operation is the retrieval of a (key, value) pair for a given key. Many peer-to-peer infrastructures, such as distributed hash tables [2][3][4][5][6], are optimized for exactly this retrieval operation.…”
Section: Introductionmentioning
confidence: 99%
“…The approach presented in this paper uses the P-Grid [9] distributed hash table (DHT). We assume that the reader is familiar with the general concepts of DHTs and will thus only address the specific and relevant properties of P-Grid.…”
Section: The P-grid Overlaymentioning
confidence: 99%
“…Our clustering algorithm is based on the spring relaxation technique used for example in peerto-peer systems for virtual coordinate systems [7] and for path optimization in stream-based overlays [8] to find minimal energy configurations. In our case, we try to find the minimal configuration for variables stored on nodes organized in an P-Grid [9] overlay network. P-Grid provides us a distributed index of the Bayesian network and efficient lookup mechanisms.…”
Section: Introductionmentioning
confidence: 99%