期刊文献+

一种信任优化搜索的p2p节点资源定位算法 被引量:1

Trust Optimization Search p2p Node Localization Algorithm
下载PDF
导出
摘要 传统HDHT方法采取信任机制完成异构节点资源定位,在节点选择初期信任尚未建立时,一些处理能力较弱的节点会发生拥塞,从而严重影响到搜索算法的性能。为此,提出一种信任优化搜索的p2p节点资源定位算法,其以信任度为基础,建立一个搜索区间,在每一次的搜索过程中,利用Direct_Search对搜索方向进行优化,保证每个节点都能沿着信任度最优化方向被搜索,避免在传统算法下由p2p网络异构分布造成节点被重复搜索的弊端。实验表明,此算法不仅在信任建立初期可以提高节点的资源搜索效率,并且可以在信任建立以后,提高下载成功率。算法在p2p的查询周期平台上得以实现,并通过实验分析了算法的有效性。 The traditional method HDHT uses trust mechanism to complete isomerism node location of the resources. When the node selection initial trust is yet not established, some processing power weaker node will generate conges- tion. Node congestion phenomenon will severely affect the performance of the search algorithm. This paper put forward a trust optimization search p2p node localization algorithm, which is based on credibility, establishes a search interval, in every search process, uses the direct search to optimize the search direction, to ensure that each node can be searched a- long the trust optimization direction, avoid the disadvantages of repeatly searching node due to p2p network heterogene- ous distribution in the traditional algorithm. Experimental results show that this algorithm not only in the initial trust establishment can improve the node resources search efficiency, but also can improve download success rate after setting up trust. Algorithm can be realized in p2p query cycle platform,and the experimental analysis verifies the effectiveness of the proposed algorithm.
出处 《计算机科学》 CSCD 北大核心 2013年第7期71-73,112,共4页 Computer Science
基金 黑龙江省教育厅科学研究项目基金(12521146)资助
关键词 异构网络 信任机制 资源定位 Heterogeneous network, Trust mechanism, Resource location
  • 相关文献

参考文献11

二级参考文献40

  • 1王晓燕.CtoC电子商务中的信任问题:一个进化博弈分析模型[J].商业研究,2005(6):179-181. 被引量:22
  • 2张书钦,李山林,杨永田.基于信任的对等网络拓扑构造[J].小型微型计算机系统,2006,27(2):246-249. 被引量:5
  • 3田慧蓉,邹仕洪,王文东,程时端.激励一致的自适应P2P拓扑构造[J].软件学报,2006,17(4):845-853. 被引量:13
  • 4马新新,赵洋,秦志光.Improving Resilience against DDoS Attack in Unstructured P2P Networks[J].Journal of Electronic Science and Technology of China,2007,5(1):18-22. 被引量:6
  • 5LIANG J,NAOUMOV N, ROSS K W. The index poisoning attack in P2P file sharing systems[ C]//Proc of the 25th IEEE International Conference on Computer Communications. Barcelona : [ s. n. ] , 2006 : 1-12.
  • 6MARCO D. Ant colony optimization and swarm intelligence [ M ]. Brussels : Springer,2006 : 100-109.
  • 7ELKE M, ARNO P, GERTI K. Using taxonomies for content-based routing with ants [ J ]. Journal of Computer Networks, 2007,51 (16) : 4514-4528.
  • 8KAMVAR S D, SCHLOSSER M T,GARCIA M H. The eigentrust algorithm for reputation management in P2P networks[ C ]//Proc of the 12th International Conference on World Wide Web. New York: ACM Press, 2003 : 640- 651.
  • 9罗文杰.PeeHo-Peer(P2P)综述[EB/OL].(2005-11-03).http://docs.huihoo.com/p2p/1/index.html.
  • 10Kalogeraki V, Gunopulos D, Zeinalipour-yazti D. A Local Search Mechanism for Peer-to-Peer Networks[C]//Proc. of the llth International Conference on Information and Knowledge Management. New York, USA: ACM Press, 2002: 300-307.

共引文献348

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部