{"id":"https://openalex.org/W2547513535","doi":"https://doi.org/10.1109/ccis.2012.6664267","title":"Exploiting peer's location information for improving routing and throughput performance in DHT systems","display_name":"Exploiting peer's location information for improving routing and throughput performance in DHT systems","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2547513535","doi":"https://doi.org/10.1109/ccis.2012.6664267","mag":"2547513535"},"language":"en","primary_location":{"id":"doi:10.1109/ccis.2012.6664267","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2012.6664267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058056477","display_name":"Chenhui Du","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chenhui Du","raw_affiliation_strings":["School of Electronic Engineering"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101792370","display_name":"Mei Song","orcid":"https://orcid.org/0000-0003-4476-729X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mei Song","raw_affiliation_strings":["School of Electronic Engineering"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335940","display_name":"Li Wang","orcid":"https://orcid.org/0000-0002-0973-1614"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Wang","raw_affiliation_strings":["School of Electronic Engineering"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053547114","display_name":"Yinghe Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yinghe Wang","raw_affiliation_strings":["School of Electronic Engineering"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062180418","display_name":"Xiaosu Zhan","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosu Zhan","raw_affiliation_strings":["School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5058056477"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3559422,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"711","last_page":"715"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7925961017608643},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7469192743301392},{"id":"https://openalex.org/keywords/distributed-hash-table","display_name":"Distributed hash table","score":0.6594070792198181},{"id":"https://openalex.org/keywords/chord","display_name":"Chord (peer-to-peer)","score":0.5596176981925964},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.5475226640701294},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5320932269096375},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5285010933876038},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5052762627601624},{"id":"https://openalex.org/keywords/routing-table","display_name":"Routing table","score":0.45911329984664917},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.44272473454475403},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4045400619506836},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.3213637173175812},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.16298893094062805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1186169683933258}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7925961017608643},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7469192743301392},{"id":"https://openalex.org/C2780224649","wikidata":"https://www.wikidata.org/wiki/Q863506","display_name":"Distributed hash table","level":3,"score":0.6594070792198181},{"id":"https://openalex.org/C194147245","wikidata":"https://www.wikidata.org/wiki/Q1076368","display_name":"Chord (peer-to-peer)","level":2,"score":0.5596176981925964},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.5475226640701294},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5320932269096375},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5285010933876038},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5052762627601624},{"id":"https://openalex.org/C184896649","wikidata":"https://www.wikidata.org/wiki/Q290066","display_name":"Routing table","level":4,"score":0.45911329984664917},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.44272473454475403},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4045400619506836},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.3213637173175812},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.16298893094062805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1186169683933258},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccis.2012.6664267","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2012.6664267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2012396786","https://openalex.org/W2104537395","https://openalex.org/W2111594928","https://openalex.org/W2112053513","https://openalex.org/W2115639367","https://openalex.org/W2118428193","https://openalex.org/W2127527618","https://openalex.org/W4254429697","https://openalex.org/W6653435015"],"related_works":["https://openalex.org/W2358163560","https://openalex.org/W2356769024","https://openalex.org/W2383817659","https://openalex.org/W2382217896","https://openalex.org/W2565414638","https://openalex.org/W2363507746","https://openalex.org/W2354793961","https://openalex.org/W2141390590","https://openalex.org/W2359900089","https://openalex.org/W2354997133"],"abstract_inverted_index":{"Ignoring":[0],"the":[1,48,82,90,95,103,110,125,129,138,145,152],"physical":[2,34],"relationship":[3],"between":[4],"two":[5],"peers,":[6],"traditional":[7],"structured":[8],"Peer-to-Peer":[9],"(P2P)":[10],"systems,":[11],"whose":[12],"peers":[13,58,88],"are":[14,59,116],"arranged":[15],"in":[16,78,89],"a":[17,39],"logical":[18],"ring":[19],"according":[20,64],"to":[21,43,65,118],"Distributed":[22],"Hash":[23],"Table":[24],"(DHT),":[25],"have":[26],"some":[27],"defects":[28],"on":[29,99],"delay":[30],"and":[31,85,109,133,150],"bandwidth":[32],"for":[33],"neighbor":[35],"peers.":[36],"We":[37],"proposed":[38,117],"layered":[40],"network":[41],"structure":[42],"make":[44],"full":[45],"use":[46],"of":[47,51,131,147],"location":[49,67],"information":[50,68],"each":[52,79],"peer.":[53],"In":[54],"this":[55,100],"structure,":[56],"all":[57],"separated":[60],"into":[61],"several":[62],"groups":[63],"their":[66],"indicated":[69],"by":[70,93],"Hilbert":[71],"ID.":[72],"The":[73],"super-node,":[74],"one":[75],"peer":[76],"elected":[77],"group,":[80],"forms":[81],"higher":[83],"layer":[84],"administrates":[86],"other":[87],"same":[91],"group":[92],"using":[94],"load-status":[96],"table.":[97],"Based":[98],"system":[101,153],"model,":[102],"Location-aware":[104,111],"Chord":[105],"Routing":[106],"(LCR)":[107],"protocol":[108],"P2P":[112],"Caching":[113],"(LPC)":[114],"strategy":[115],"improve":[119],"system's":[120],"performance.":[121],"Simulation":[122],"results":[123],"show":[124],"LCR":[126],"could":[127],"reduce":[128],"hops":[130],"routing":[132,135],"save":[134],"distance":[136],"while":[137],"LPC":[139],"has":[140],"remarkable":[141],"performance":[142],"at":[143],"lowering":[144],"drop-rate":[146],"access":[148],"request":[149],"improving":[151],"throughput.":[154]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
