Pełnotekstowe zasoby PLDML oraz innych baz dziedzinowych są już dostępne w nowej Bibliotece Nauki.
Zapraszamy na https://bibliotekanauki.pl

PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2016 | 26 | 1 | 147-160

Tytuł artykułu

A mathematical model for file fragment diffusion and a neural predictor to manage priority queues over BitTorrent

Treść / Zawartość

Warianty tytułu

Języki publikacji

EN

Abstrakty

EN
BitTorrent splits the files that are shared on a P2P network into fragments and then spreads these by giving the highest priority to the rarest fragment. We propose a mathematical model that takes into account several factors such as the peer distance, communication delays, and file fragment availability in a future period also by using a neural network module designed to model the behaviour of the peers. The ensemble comprising the proposed mathematical model and a neural network provides a solution for choosing the file fragments that have to be spread first, in order to ensure their continuous availability, taking into account that some peers will disconnect.

Słowa kluczowe

Rocznik

Tom

26

Numer

1

Strony

147-160

Opis fizyczny

Daty

wydano
2016
otrzymano
2015-01-20
poprawiono
2015-07-14

Twórcy

  • Department of Mathematics and Informatics, University of Catania, Viale Andrea Doria 6, 95126, Catania, Italy
  • Department of Mathematics and Informatics, University of Catania, Viale Andrea Doria 6, 95126, Catania, Italy
  • Department of Mathematics and Informatics, University of Catania, Viale Andrea Doria 6, 95126, Catania, Italy

Bibliografia

  • Bannò, F., Marletta, D., Pappalardo, G. and Tramontana, E. (2010). Tackling consistency issues for runtime updating distributed systems, Proceedings of the IEEE International Symposium on Parallel & Distributed Processing, Workshops and PhD Forum (IPDPSW), Atlanta, GA, USA, pp. 1-8.
  • Bonanno, F., Capizzi, G., Coco, S., Napoli, C., Laudani, A. and Lo Sciuto, G. (2014). Optimal thicknesses determination in a multilayer structure to improve the SPP efficiency for photovoltaic devices by an hybrid FEM-cascade neural network based approach, Proceedings of the IEEE International Symposium on Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM), Ischia, Italy, pp. 355-362.
  • Bonanno, F., Capizzi, G., Gagliano, A. and Napoli, C. (2012a). Optimal management of various renewable energy sources by a new forecasting method, Proceedings of the IEEE International Symposium on Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM), Sorrento, Italy, pp. 934-940.
  • Bonanno, F., Capizzi, G. and Napoli, C. (2012b). Some remarks on the application of RNN and PRNN for the charge-discharge simulation of advanced lithium-ions battery energy storage, Proceedings of the IEEE International Symposium on Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM), Sorrento, Italy, pp. 941-945.
  • Borowik, G., Woźniak, M., Fornaia, A., Giunta, R., Napoli, C., Pappalardo, G. and Tramontana, E. (2015). A software architecture assisting workflow executions on cloud resources, International Journal of Electronics and Telecommunications 61(1): 17-23.
  • Calvagna, A. and Tramontana, E. (2013). Delivering dependable reusable components by expressing and enforcing design decisions, Proceedings of the IEEE Computer Software and Applications Conference (COMPSAC) Workshop (QUORS), Kyoto, Japan, pp. 493-498.
  • Capizzi, G., Napoli, C. and Paternò, L. (2012). An innovative hybrid neuro-wavelet method for reconstruction of missing data in astronomical photometric surveys, Proceedings of the International Conference on Artificial Intelligence and Soft Computing (ICAISC), Zakopane, Poland, pp. 21-29.
  • Chiani, M., Dardari, D. and Simon, M.K. (2003). New exponential bounds and approximations for the computation of error probability in fading channels, IEEE Transactions on Wireless Communications 2(4): 840-845.
  • Cohen, B. (2003). Incentives build robustness in BitTorrent, Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA, Vol. 6, pp. 68-72.
  • Cohen, B. (2008). The BitTorrent protocol specification, http://jonas.nitro.dk/bittorrent/ bittorrent-rfc.html.
  • Connor, J.T., Martin, R.D. and Atlas, L. (1994). Recurrent neural networks and robust time series prediction, Transactions on Neural Networks 5(2): 240-254.
  • Cybenko, G. (1989). Approximation by superpositions of a sigmoidal function, Mathematics of Control, Signals and Systems 2(4): 303-314.
  • Fornaia, A., Napoli, C., Pappalardo, G. and Tramontana, E. (2015). Using AOP neural networks to infer user behaviours and interests, XVI Workshop “From Object to Agents” (WOA), Napoli, Italy, pp. 46-52.
  • Ghit, B., Pop, F. and Cristea, V. (2010). Epidemic-style global load monitoring in large-scale overlay networks, Proceedings of the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Fukuoka, Japan, pp. 393-398.
  • Giunta, R., Pappalardo, G. and Tramontana, E. (2011). Aspects and annotations for controlling the roles application classes play for design patterns, Proceedings of the IEEE Asia Pacific Software Engineering Conference (APSEC), Ho Chi Minh, Vietnam, pp. 306-314.
  • Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X. and Zhang, X. (2005). Measurements, analysis, and modeling of BitTorrent-like systems, Proceedings of the ACM SIGCOMM Conference on Internet Measurement, Berkeley, CA, USA, pp. 35-48.
  • Gupta, M.M., Jin, L. and Homma, N. (2004). Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory, Wiley-IEEE Press, New York, NY.
  • Haykin, S. (2009). Neural Networks and Learning Machines, Vol. 3, Prentice Hall, New York, NY.
  • Kaune, S., Rumin, R.C., Tyson, G., Mauthe, A., Guerrero, C. and Steinmetz, R. (2010). Unraveling BitTorrent's file unavailability: Measurements and analysis, IEEE International Conference on Peer to Peer Computing (IEEE P2P), Delft, The Netherlands, pp. 1-9.
  • Lapedes, A. and Farber, R. (1986). A self-optimizing, nonsymmetrical neural net for content addressable memory and pattern recognition, Physica D: Nonlinear Phenomena 22(1): 247-259.
  • Mallat, S. (2009). A Wavelet Tour of Signal Processing: The Sparse Way, Academic Press, Cambridge.
  • Mandic, D.P. and Chambers, J. (2001). Recurrent Neural Networks for Prediction: Learning Algorithms, Architectures and Stability, John Wiley & Sons, Inc., New York, NY.
  • Menasche, D.S., Rocha, A.A., Li, B., Towsley, D. and Venkataramani, A. (2009). Content availability and bundling in swarming systems, Proceedings of the ACM Conference Co-NEXT, Rome, Italy, pp. 121-132.
  • Napoli, C., Bonanno, F. and Capizzi, G. (2010). Exploiting solar wind time series correlation with magnetospheric response by using an hybrid neuro-wavelet approach, Advances in Plasma Astrophysics: Proceedings of the International Astronomical Union, Giardini Naxos, Italy, pp. 156-158.
  • Napoli, C., Pappalardo, G. and Tramontana, E. (2013). A hybrid neuro-wavelet predictor for QoS control and stability, in M. Baldoni et al. (Eds.), Proceedings of Artificial Intelligence (AIxIA), Lecture Notes in Computer Science, Vol. 8249, Springer, Berlin pp. 527-538.
  • Napoli, C., Pappalardo, G. and Tramontana, E. (2014a). An agent-driven semantical identifier using radial basis neural networks and reinforcement learning, XV Workshop “From Objects to Agents” (WOA), Catania, Italy, Vol. 1260.
  • Napoli, C., Pappalardo, G. and Tramontana, E. (2014b). Improving files availability for BitTorrent using a diffusion model, Proceedings of the IEEE International WETICE Conference, Parma, Italy, pp. 191-196.
  • Napoli, C., Pappalardo, G., Tramontana, E., Nowicki, R., Starczewski, J. and Woźniak, M. (2015). Toward work groups classification based on probabilistic neural network approach, in L. Rutkowski et al. (Eds.), Proceedings of the International Conference on Artificial Intelligence and Soft Computing (ICAISC), Lecture Notes in Computer Science, Vol. 9119, Springer, Berlin, pp. 79-89.
  • Napoli, C., Pappalardo, G., Tramontana, E. and Zappalà, G. (2016). A cloud-distributed GPU architecture for pattern identification in segmented detectors big-data surveys, Computer Journal 59(3): 338-352, DOI: 10.1093/comjnl/bxu147.
  • Nowak, B., Nowicki, R., Woźniak, M. and Napoli, C. (2015). Multi-class nearest neighbour classifier for incomplete data handling, in L. Rutkowski et al. (Eds.), Proceedings of the International Conference on Artificial Intelligence and Soft Computing (ICAISC), Lecture Notes in Computer Science, Vol. 9119, Springer, Berlin, pp. 469-480.
  • Qiu, D. and Srikant, R. (2004). Modeling and performance analysis of BitTorrent-like peer-to-peer networks, SIGCOMM Computer Communication Review 34(4): 367-378.
  • Rabiner, L.R. and Gold, B. (1975). Theory and Application of Digital Signal Processing, Prentice-Hall, Inc., Englewood Cliffs, NJ.
  • Tramontana, E. (2013). Automatically characterising components with concerns and reducing tangling, Proceedings of the IEEE Computer Software and Applications Conference (COMPSAC), Workshop QUORS, Kyoto, Japan, pp. 499-504.
  • Visan, A., Pop, F. and Cristea, V. (2011). Decentralized trust management in peer-to-peer systems, Proceedings of the International Symposium on Parallel and Distributed Computing (ISPDC), Cluj-Napoca, Romania, pp. 232-239.
  • Williams, R.J. (1989). A learning algorithm for continually running fully recurrent neural networks, Neural Computation 1: 270-280. Williams, R.J. and Zipser, D. (1989). Experimental analysis of the real-time recurrent learning algorithm, Connection Science 1(1): 87-111.
  • Woźniak, M., Połap, D., Gabryel, M., Nowicki, R., Napoli, C. and Tramontana, E. (2015). Can we process 2D images using artificial bee colony?, in L. Rutkowski et al. (Eds.), Proceedings of the International Conference on Artificial Intelligence and Soft Computing (ICAISC), Lecture Notes in Computer Science, Vol. 9119, Springer, Berlin, pp. 660-671.

Typ dokumentu

Bibliografia

Identyfikatory

Identyfikator YADDA

bwmeta1.element.bwnjournal-article-amcv26i1p147bwm
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.