نتایج جستجو برای: gnutella

تعداد نتایج: 408  

2003
Song Jiang Lei Guo Xiaodong Zhang

“Flooding” is a fundamental operation in unstructured Peer-to-Peer (P2P) file sharing systems, such as Gnutella. Although it is effective in content search, flooding is very inefficient because it results in a great amount of redundant messages. Our study shows that more than 70% of the generated messages are redundant for a flooding with a TTL of 7 in a moderately connected network. Existing e...

2004

As we are living in the era of technology innovation, the need of sharing information is becoming more important than ever. Peer-to-peer applications were introduced and developed in order to facilitate particularly the sharing of large video/audio files and software. Although the entire peer-to-peer research literature consists of four divisions: search, security, storage, and applications, in...

2007
Mei Li Wang-Chien Lee Anand Sivasubramaniam

Peer-to-peer (P2P) systems have received a lot of attention due to the popularity of applications such as SETI, Napster, Gnutella, and Morpheus. The P2P systems present tremendous challenges in searching data items among the numerous host nodes. While search has been studied in a similar but different context, i.e., parallel and distributed database systems, the large scale and dynamic membersh...

Journal: :Perform. Eval. 2007
Rossano Gaeta Matteo Sereno

This paper proposes the development and application of random graphs-based performance evaluation techniques to understand design trade-offs for hierarchical unstructured peer-to-peer networks. In particular, the connections between lower and higher level peers (that are known as leaves and ultra-peers in the Gnutella jargon) are modeled as a bipartite random graph while the overlay network use...

Journal: :IEEE Distributed Systems Online 2005
Daniel Hughes Geoff Coulson James Walkerdine

Individuals who use peer-to-peer (P2P) file-sharing networks such as Gnutella1 face a social dilemma. They must decide whether to contribute to the common good by sharing files or maximize their personal experience by free riding, downloading files while not contributing any to the network. Individuals gain no personal benefits from uploading files (in fact, it's inconvenient), so it's "rationa...

2003
Oleg V. Pavlov Khalid Saeed

This paper reviews the growth behavior of a popular peer-to-peer network. We propose a dynamic hypothesis that the growth, overshoot, and collapse trajectories may be the result of complex causal interactions between inadequate resources, private provision of common goods, free riding, and membership dynamics. We draw parallels with other systems that are well-understood and known to exhibit si...

2003
Thomas Fuhrmann

Formation of suitable overlay-network topologies that are able to reflect the structure of the underlying network-infrastructure, has rarely been addressed by peer-to-peer applications so far. Often, peer-to-peer protocols restrain to purely random formation of their overlay-network. This leads to a far from optimal performance of such peer-to-peer networks and ruthlessly wastes network resourc...

2006
Bertalan Forstner Hassan Charaf

In the world of Peer-to-Peer (P2P) networking different protocols have been developed to make the resource sharing or information retrieval more efficient. The SemPeer protocol is a new layer on Gnutella that transforms the connections of the nodes based on semantic information to make information retrieval more efficient. However, this transformation causes high clustering in the network that ...

2007
Matei A. Zaharia Amit Chandel Stefan Saroiu Srinivasan Keshav

The query success rate in current filesharing systems is low, for example, only 7-10% in Gnutella. An often-overlooked cause for this low recall is simply that keywords in queries and document descriptions are misspelled. Although many sophisticated approximate matching techniques have been developed by the Information Retrieval community, to our knowledge, they have not been used in popular P2...

2002
Murali Krishna Ramanathan Vana Kalogeraki Jim Pruyne

As computing and communication capabilities have continued to increase, more and more activity is taking place at the edges of the network, typically in homes or on workers desktops. This trend has been demonstrated by the increasing popularity and usability of \peer-to-peer" systems such as Napster and Gnutella. Unfortunately, this popularity has quickly shown the limitations of these systems,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید