2009 28th IEEE International Symposium on Reliable Distributed Systems 2009
DOI: 10.1109/srds.2009.20
|View full text |Cite
|
Sign up to set email alerts
|

X-BOT: A Protocol for Resilient Optimization of Unstructured Overlays

Abstract: Gossip, or epidemic, protocols have emerged as a highly scalable and resilient approach to implement several application level services such as reliable multicast, data aggregation, publish-subscribe, among others. All these protocols organize nodes in an unstructured random overlay network. In many cases, it is interesting to bias the random overlay in order to optimize some efficiency criteria, for instance, to reduce the stretch of the overlay routing. In this paper we propose X-BOT, a new protocol that all… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…To evaluate the performance of the proposed algorithm called LA_Match, it is compared with three algorithms: PROP-O [6,15], X-BOT [12,17], and THANCS [7]. It should be noted that, the proposed algorithm, like algorithms PROP-O, X-BOT, and THANCS (to which the proposed algorithm is compared) uses only the delays of links for solving the topology matching problem.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…To evaluate the performance of the proposed algorithm called LA_Match, it is compared with three algorithms: PROP-O [6,15], X-BOT [12,17], and THANCS [7]. It should be noted that, the proposed algorithm, like algorithms PROP-O, X-BOT, and THANCS (to which the proposed algorithm is compared) uses only the delays of links for solving the topology matching problem.…”
Section: Resultsmentioning
confidence: 99%
“…Reported algorithms can be classified into three classes of algorithms ( Fig. 4): algorithms in which each peer in the network uses some services such as GPS 1 or Oracle to gather information about the location of peers [23][24][25], algorithms in which each peer in the network uses information about landmark peers [26][27][28][29][30][31][32][33], and algorithms in which each peer in the network uses local information about its neighbors [6,7,9,11,12,16,17,[34][35][36][37][38][39]. In the rest of this section, we briefly review these classes of algorithms.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations