2003
DOI: 10.1145/774763.774784
|View full text |Cite
|
Sign up to set email alerts
|

The power of epidemics

Abstract: Building very large computing systems is extremely challenging, given the lack of robust scalable communication technologies. This threatens a new generation of mission-critical but very large computing systems. Fortunately, a new generation of "gossip-based" or epidemic communication primitives can overcome a number of these scalability problems, offering robustness and reliability even in the most demanding settings. Epidemic protocols emulate the spread of an infection in a crowded population, and are both … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Rumour-like mechanisms form the basis for the phenomena of viral marketing, where companies exploit social networks of their customers on the Internet in order to promote their products via the socalled 'word-of-email' and 'word-of-web' [4]. Finally, rumor-mongering forms the basis for an important class of communication protocols, called gossip algorithms, which are used for large-scale information dissemination on the Internet, and in peer-to-peer file sharing applications [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…Rumour-like mechanisms form the basis for the phenomena of viral marketing, where companies exploit social networks of their customers on the Internet in order to promote their products via the socalled 'word-of-email' and 'word-of-web' [4]. Finally, rumor-mongering forms the basis for an important class of communication protocols, called gossip algorithms, which are used for large-scale information dissemination on the Internet, and in peer-to-peer file sharing applications [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…For example, in [29,57] messages are forwarded according to a set of predefined probabilistic rules, whereas [53] discusses a deterministic algorithm, approximating the connected dominating set of each node. Alternative information propagation techniques simulate various epidemic models [25,55,56,63].…”
Section: Related Workmentioning
confidence: 99%
“…Epidemic Algorithms. An alternative approach to be mentioned in this scope is the use of epidemic algorithms [9,55,63]. There exist a variety of epidemic algorithms, starting with the basic epidemic protocol [18,28], through neighborhood epidemics [25] and up to hierarchical epidemics [56].…”
Section: Related Workmentioning
confidence: 99%
“…For communicating the tasks and termination messages across the network, an epidemic-style or gossiping protocol (see, e.g., Ref. [16,17]) can be utilised. In principle, this is similar to the spreading of good solutions: each agent forwards the task initiation/termination messages it receives to its neighbours (or a subset of those), until some criteria is met (e.g., a large enough number of neighbours have already received the message).…”
Section: Scheduling: Task Initiation and Terminationmentioning
confidence: 99%