• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Qian Ning, Wu Guoxin, and Zhao Shenghui. A Bayesian Network-Based Search Method in Unstructured Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2009, 46(6): 889-897.
Citation: Qian Ning, Wu Guoxin, and Zhao Shenghui. A Bayesian Network-Based Search Method in Unstructured Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2009, 46(6): 889-897.

A Bayesian Network-Based Search Method in Unstructured Peer-to-Peer Networks

More Information
  • Published Date: June 14, 2009
  • Object discovery is a fundamental service and a critical issue in peer-to-peer (P2P) networks, which has a great impact on the performance and scalability of P2P networks. Many search methods have been proposed for unstructured peer-to-peer networks during the past few years, but complicated organization, high search cost and maintenance overhead make them less practicable. To avoid these weaknesses, the authors propose an adaptive and efficient method for search in unstructured P2P networks, the Bayesian network-based search method (BNS), which retains the simplicity, robustness and fully decentralized nature like Gnutella. This approach assumes that if a peer has a particular resource and this resource has some relation to a resource that one is interested in, it is very likely that this peer has the resource that one is interested in as well. This scheme utilizes feedback from previous searches, including not only the feedback of an interested object itself but also those objects which have some semantic relations to the interested object. It applies Bayesian network to establish an inference model, infers probabilities based on this model, and probabilistically directs future searches. Experimental results show that the BNS method is effective, achieving high success rate and more discovered objects, low bandwidth consumption and less maintenance, and a good adaptation to changing network topologies.
  • Related Articles

    [1]Pang Tao, Duan Zhenhua. Symbolic Model Checking of WISHBONE on-Chip Bus[J]. Journal of Computer Research and Development, 2014, 51(12): 2759-2771. DOI: 10.7544/issn1000-1239.2014.20131164
    [2]Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, Liu Linyuan. Real-Time Systems Contact Checking and Resolution Based on Time Petri Net[J]. Journal of Computer Research and Development, 2012, 49(2): 413-420.
    [3]Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao. Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time[J]. Journal of Computer Research and Development, 2011, 48(8): 1542-1553.
    [4]Liu Li, Chen Mingyu, Bao Yungang, Xu Jianwei, Fan Jianping. A Stream Checking and Prefetching Algorithm Based on Page Level Stream Buffer Architecture[J]. Journal of Computer Research and Development, 2009, 46(10): 1758-1767.
    [5]Jiang Hua, Li Xiang. Model Checking for Mobile Ambients[J]. Journal of Computer Research and Development, 2009, 46(10): 1750-1757.
    [6]Gong Rui, Chen Wei, Liu Fang, Dai Kui, and Wang Zhiying. Control Flow Checking and Recovering by Compiler Signatures and Hardware Checking[J]. Journal of Computer Research and Development, 2009, 46(2): 345-351.
    [7]Zhang Junhua, Huang Zhiqiu, and Cao Zining. Counterexample Generation for Probabilistic Timed Automata Model Checking[J]. Journal of Computer Research and Development, 2008, 45(10): 1638-1645.
    [8]Zhao Mingfeng, Song Wen, Yang Yixian. Confusion Detection Based on Petri-Net[J]. Journal of Computer Research and Development, 2008, 45(10): 1631-1637.
    [9]Huang Weiping. Program Restructuring to Improve Efficiency of Software Model Checking[J]. Journal of Computer Research and Development, 2008, 45(8): 1417-1422.
    [10]He Jian, Qin Zheng. Modeling and Checking the Behavior of Software Architecture[J]. Journal of Computer Research and Development, 2005, 42(11): 2018-2024.

Catalog

    Article views (601) PDF downloads (569) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return