2007
DOI: 10.1002/cpe.1225
|View full text |Cite
|
Sign up to set email alerts
|

Proactive gossip‐based management of semantic overlay networks

Abstract: SUMMARYMuch research on content-based P2P searching for file-sharing applications has focused on exploiting semantic relations between peers to facilitate searching. Current methods suggest reactive ways to manage semantic relations: they rely on the usage of the underlying search mechanism, and infer semantic relationships based on the queries placed and the corresponding replies received. In this paper we follow a different approach, proposing a proactive method to build a semantic overlay. Our method is bas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(32 citation statements)
references
References 13 publications
(14 reference statements)
0
32
0
Order By: Relevance
“…Each node was running CYCLON and, in the case of RINGCAST, VICINITY too, as described above, with view length 20 for each protocol ( cyc = vic = 20). The view lengths are not crucial for the behavior of these algorithms ( [20]). Nodes were initially supplied with a certain single contact in their CYCLON views, forming a star topology.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Each node was running CYCLON and, in the case of RINGCAST, VICINITY too, as described above, with view length 20 for each protocol ( cyc = vic = 20). The view lengths are not crucial for the behavior of these algorithms ( [20]). Nodes were initially supplied with a certain single contact in their CYCLON views, forming a star topology.…”
Section: Discussionmentioning
confidence: 99%
“…Such links are maintained using a proximity-based topology construction epidemic protocol, here we use VICINITY [20]. The basic idea is that nodes maintain short views of the network of length vic .…”
Section: Deterministic Ring Links (D-links)mentioning
confidence: 99%
“…One way of solving this, is to use results of queries to know remote contents and create links [7,18,19]. A second approach is to use gossiping to distribute information about contents, so that remote peers can introduce links [21]. Yet another approach is to consider interest, for example by considering overlap in query results or cache contents [3,20].…”
Section: Related Workmentioning
confidence: 99%
“…Emphasising on protocols, Voulgaris et al [29] propose an epidemic protocol 5 that implicitly clusters peers with similar content. In [18], Penzo et al propose a strategy for incremental clustering of semantically related peers.…”
Section: Related Workmentioning
confidence: 99%
“…SON-based systems apply a periodic rewiring protocol to cluster peers with similar interests [10,29] and a fireworks-like technique [16,27] is used to route queries within the network. Peer interests may vary from descriptions of document collections [13,20], to topics in a hierarchy [8], schema synopses [7], or ontology concepts [23].…”
Section: Overviewmentioning
confidence: 99%