Searching behavior in peer-to-peer communities

Sai Ho Kwok, S. M. Lui, R. Cheung, S. Chan, C. C. Yang

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

Abstract

The focus of this paper is the searching behavior in peer-to-peer (P2P) communities and in that context, will discuss potential for enhancement of the P2P protocol using searching behavior. Due to excessive network traffic, network scalability is a major P2P problem. The purpose of this paper is to study searching behavior by using log files and subsequently, will propose solutions to reduce the amount of redundant searching activities. In the current research, log data containing over 5 million query messages was collected over seven consecutive days using a Gnutella-based P2P program. The results of this study will be instrumental in providing ways to reduce existing problems with P2P network traffic.

Original languageEnglish
Title of host publicationProceedings - ITCC 2003, International Conference on Information Technology
Subtitle of host publicationComputers and Communications
EditorsPradip K. Srimani, Emma Regentova, Ray Hashemi, Elaine Lawrence, Mario Cannataro, Amanda Spink, Wolf Bein
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages130-134
Number of pages5
ISBN (Electronic)0769519164, 9780769519166
DOIs
Publication statusPublished - 2003
EventInternational Conference on Information Technology: Computers and Communications, ITCC 2003 - Las Vegas, United States
Duration: 28 Apr 200330 Apr 2003

Publication series

NameProceedings ITCC 2003, International Conference on Information Technology: Computers and Communications

Conference

ConferenceInternational Conference on Information Technology: Computers and Communications, ITCC 2003
Country/TerritoryUnited States
CityLas Vegas
Period28/04/0330/04/03

Bibliographical note

Publisher Copyright:
© 2003 IEEE.

Fingerprint

Dive into the research topics of 'Searching behavior in peer-to-peer communities'. Together they form a unique fingerprint.

Cite this