{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:32Z","timestamp":1750308752536,"version":"3.41.0"},"reference-count":14,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMETRICS Perform. Eval. Rev."],"published-print":{"date-parts":[[2006,12]]},"abstract":"<jats:p>An efficient approach for information diffusion in distributed systems is to utilize epidemic algorithms that involve pair-wise propagation of updates. Epidemic algorithms are fully distributed and randomized approaches such that every peer in an information diffusion session picks a (subset of the other) peer(s) randomly for efficient propagation of updates, through periodic rounds. The underlying epidemics theory for the biological systems studies the spreading of infectious diseases through a population [1,2]. When applied to an information diffusion application, such protocols have beneficial features such as scalability, robustness against failures and provision of eventual consistency. Exact as well as asymptotical distributions have been studied for different epidemic models in [3,4]. In contrast to such previous studies, we investigate variations of the epidemic algorithms used in the context of distributed information diffusion and derive exact diffusion probabilities for them.<\/jats:p>","DOI":"10.1145\/1215956.1215961","type":"journal-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:52:18Z","timestamp":1175802738000},"page":"6-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exact probability distributions for peer-to-peer epidemic information diffusion"],"prefix":"10.1145","volume":"34","author":[{"given":"Emine \u015eule","family":"Yazici","sequence":"first","affiliation":[{"name":"Ko\u00e7 University, Istanbul, Turkey"}]},{"given":"Selda","family":"K\u00fc\u00e7\u00fck\u00e7if\u00e7i","sequence":"additional","affiliation":[{"name":"Ko\u00e7 University, Istanbul, Turkey"}]},{"given":"\u00d6znur","family":"\u00d6zkasap","sequence":"additional","affiliation":[{"name":"Ko\u00e7 University, Istanbul, Turkey"}]},{"given":"Mine","family":"\u00c7a\u01e7lar","sequence":"additional","affiliation":[{"name":"Ko\u00e7 University, Istanbul, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2006,12]]},"reference":[{"volume-title":"Charles Griffin and Compan","year":"1975","author":"Bailey N. T. J.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1006\/scdb.1999.0305"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1239\/jap\/1032374634"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/0147013"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312207"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297243"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948136"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.07.032"},{"volume-title":"Proc. of IEEE INFOCOM","year":"2006","author":"Massoulie L.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254823"},{"volume-title":"Cambridge University Press","year":"1992","author":"van Lint J. H.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11902140_90"},{"volume-title":"Proc. of IEEE INFOCOM","year":"2005","author":"Massoulie L.","key":"e_1_2_1_14_1"}],"container-title":["ACM SIGMETRICS Performance Evaluation Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1215956.1215961","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1215956.1215961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:22Z","timestamp":1750278142000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1215956.1215961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["10.1145\/1215956.1215961"],"URL":"https:\/\/doi.org\/10.1145\/1215956.1215961","relation":{},"ISSN":["0163-5999"],"issn-type":[{"type":"print","value":"0163-5999"}],"subject":[],"published":{"date-parts":[[2006,12]]},"assertion":[{"value":"2006-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}