{"id":"https://openalex.org/W1967162373","doi":"https://doi.org/10.1109/dbta.2010.5659014","title":"Structuring Peer-to-Peer Networks Using Temporal and Semantic Locality","display_name":"Structuring Peer-to-Peer Networks Using Temporal and Semantic Locality","publication_year":2010,"publication_date":"2010-11-01","ids":{"openalex":"https://openalex.org/W1967162373","doi":"https://doi.org/10.1109/dbta.2010.5659014","mag":"1967162373"},"language":"en","primary_location":{"id":"doi:10.1109/dbta.2010.5659014","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dbta.2010.5659014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 2nd International Workshop on Database Technology and Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068211239","display_name":"Guoming Lai","orcid":"https://orcid.org/0000-0003-3272-5201"},"institutions":[{"id":"https://openalex.org/I41147446","display_name":"Anshan Normal University","ror":"https://ror.org/04s5wwh39","country_code":"CN","type":"education","lineage":["https://openalex.org/I41147446"]},{"id":"https://openalex.org/I4210165736","display_name":"Hanshan Normal University","ror":"https://ror.org/05tqaz865","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210165736"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guoming Lai","raw_affiliation_strings":["Department of Math and Information Technology, Anshan Normal University, Chaozhou, China","Dept. of Math & Inf. Technol., Hanshan Normal Univ., Chaozhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Math and Information Technology, Anshan Normal University, Chaozhou, China","institution_ids":["https://openalex.org/I41147446"]},{"raw_affiliation_string":"Dept. of Math & Inf. Technol., Hanshan Normal Univ., Chaozhou, China","institution_ids":["https://openalex.org/I4210165736"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102641228","display_name":"Shengyun Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165736","display_name":"Hanshan Normal University","ror":"https://ror.org/05tqaz865","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210165736"]},{"id":"https://openalex.org/I41147446","display_name":"Anshan Normal University","ror":"https://ror.org/04s5wwh39","country_code":"CN","type":"education","lineage":["https://openalex.org/I41147446"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengyun Yang","raw_affiliation_strings":["Department of Math and Information Technology, Anshan Normal University, Chaozhou, China","Dept. of Math & Inf. Technol., Hanshan Normal Univ., Chaozhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Math and Information Technology, Anshan Normal University, Chaozhou, China","institution_ids":["https://openalex.org/I41147446"]},{"raw_affiliation_string":"Dept. of Math & Inf. Technol., Hanshan Normal Univ., Chaozhou, China","institution_ids":["https://openalex.org/I4210165736"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108510061","display_name":"Dehui Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I41147446","display_name":"Anshan Normal University","ror":"https://ror.org/04s5wwh39","country_code":"CN","type":"education","lineage":["https://openalex.org/I41147446"]},{"id":"https://openalex.org/I4210165736","display_name":"Hanshan Normal University","ror":"https://ror.org/05tqaz865","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210165736"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dehui Yuan","raw_affiliation_strings":["Dean's Office, Anshan Normal University, Chaozhou, China","Dean's Office, Hanshan Normal Univ., Chaozhou, China"],"affiliations":[{"raw_affiliation_string":"Dean's Office, Anshan Normal University, Chaozhou, China","institution_ids":["https://openalex.org/I41147446"]},{"raw_affiliation_string":"Dean's Office, Hanshan Normal Univ., Chaozhou, China","institution_ids":["https://openalex.org/I4210165736"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068211239"],"corresponding_institution_ids":["https://openalex.org/I41147446","https://openalex.org/I4210165736"],"apc_list":null,"apc_paid":null,"fwci":0.7122,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70193726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"17","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8615516424179077},{"id":"https://openalex.org/keywords/locality","display_name":"Locality","score":0.7628775835037231},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6648045182228088},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6629042625427246},{"id":"https://openalex.org/keywords/locality-of-reference","display_name":"Locality of reference","score":0.6218419075012207},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.565131664276123},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5208690166473389},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5016205310821533},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4393451511859894},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.43245309591293335},{"id":"https://openalex.org/keywords/overlay-network","display_name":"Overlay network","score":0.4221875071525574},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.4170815944671631},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.2737343907356262},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19347825646400452},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16480690240859985},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.11425939202308655},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09991520643234253},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0900450348854065}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8615516424179077},{"id":"https://openalex.org/C2779808786","wikidata":"https://www.wikidata.org/wiki/Q6664603","display_name":"Locality","level":2,"score":0.7628775835037231},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6648045182228088},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6629042625427246},{"id":"https://openalex.org/C27602214","wikidata":"https://www.wikidata.org/wiki/Q1868547","display_name":"Locality of reference","level":3,"score":0.6218419075012207},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.565131664276123},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5208690166473389},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5016205310821533},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4393451511859894},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.43245309591293335},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.4221875071525574},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.4170815944671631},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2737343907356262},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19347825646400452},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16480690240859985},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.11425939202308655},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09991520643234253},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0900450348854065},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dbta.2010.5659014","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dbta.2010.5659014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 2nd International Workshop on Database Technology and Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1564976454","https://openalex.org/W2123589715","https://openalex.org/W2137163943","https://openalex.org/W2154706496","https://openalex.org/W2155659292","https://openalex.org/W2158049821","https://openalex.org/W2165847233","https://openalex.org/W2167414245","https://openalex.org/W2167898414","https://openalex.org/W4250390143","https://openalex.org/W6633748593"],"related_works":["https://openalex.org/W1555349535","https://openalex.org/W89955905","https://openalex.org/W2583128298","https://openalex.org/W2053359564","https://openalex.org/W1691715735","https://openalex.org/W1637847238","https://openalex.org/W2161159383","https://openalex.org/W2042060105","https://openalex.org/W2749656779","https://openalex.org/W2104417748"],"abstract_inverted_index":{"Current":[0],"resource":[1,88],"locating":[2],"algorithms":[3],"either":[4],"cannot":[5],"yield":[6],"good":[7],"lookup":[8],"performance,":[9],"or":[10],"incur":[11],"high":[12],"search":[13,21,48],"cost":[14],"and":[15,64,73,95],"system":[16,47,55,128],"maintenance":[17],"overhead.":[18],"The":[19],"poor":[20],"efficiency":[22],"of":[23,31],"these":[24],"approaches":[25],"may":[26],"seriously":[27],"limit":[28],"the":[29,86,90,101,103,109,115,127],"scalability":[30],"current":[32],"P2P":[33,46,54],"systems.":[34],"In":[35],"this":[36],"paper,":[37],"we":[38],"propose":[39],"to":[40,44,99,108],"exploit":[41],"two-dimensional":[42],"locality":[43,63,66],"improve":[45],"efficiency.":[49],"We":[50],"present":[51],"a":[52,69,74,80],"locality-aware":[53],"architecture":[56],"called":[57],"Forecast,":[58],"which":[59],"explicitly":[60],"exploits":[61],"temporal":[62,70,93],"semantic":[65,75,111],"by":[67],"constructing":[68],"neighbor":[71],"overlay":[72,113],"friend":[76,112],"overlay,":[77],"respectively.":[78],"Given":[79],"query,":[81],"Forecast":[82],"first":[83],"looks":[84],"for":[85,114],"target":[87],"among":[89],"query":[91,104],"generator's":[92],"neighbors,":[94],"if":[96],"it":[97],"fails":[98],"hit":[100],"targets,":[102],"will":[105],"be":[106],"forwarded":[107],"relevant":[110],"second":[116],"search.":[117],"Simulation":[118],"results":[119],"show":[120],"that":[121],"our":[122],"scheme":[123],"can":[124],"greatly":[125],"improves":[126],"performance.":[129]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
