Results 151 to 160 of about 17,491 (180)
Some of the next articles are maybe not open access.
2T-DHT: A Two Tier DHT for Implementing Publish/Subscribe
2009 International Conference on Computational Science and Engineering, 2009In this paper, we propose a two-tiered Distributed Hash Table (DHT) based overlay for an implementation of publish/subscribe. In this overlay, upper tier consists of stable nodes with more resources whereas lower tier contains less stable nodes with limited resources.
Mayank Pandey +2 more
openaire +1 more source
Generalised running DHT and real-time (DHT) analysers
Proceedings of ICASSP '94. IEEE International Conference on Acoustics, Speech and Signal Processing, 2002Introduces generalised running discrete Hartley transforms (DHT) and recursive DHT real-time analysers. Four types (I-IV) are described. They are defined and used as bases for updating both the discrete Hartley and Fourier transforms sample by sample.
openaire +1 more source
Hierarchical DHT Architectures
2012Distributed Hash Tables (DHT) are presently used in several large-scale distributed systems in the Internet and envisaged as a key mechanism to provide identifier-locator separation for mobile hosts in Future Internet. Such decentralized structured data storage systems become increasingly complex serving popular social networking, P2P applications, and
Dmitry Korzun, Andrei Gurtov
openaire +1 more source
2019 IEEE 13th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2019
BitTorrent is one of the largest source of data exchange over the Internet. The copyright and legal pressure from authorities systematically close torrent hosting sites, futilely trying to stop the damage done to the creative industry. As a consequence, the centralized portals allowing for the search of torrent files, are more and more replaced by the ...
Robert-George Simion, Mihai-Lica Pura
openaire +1 more source
BitTorrent is one of the largest source of data exchange over the Internet. The copyright and legal pressure from authorities systematically close torrent hosting sites, futilely trying to stop the damage done to the creative industry. As a consequence, the centralized portals allowing for the search of torrent files, are more and more replaced by the ...
Robert-George Simion, Mihai-Lica Pura
openaire +1 more source
2017 25th Telecommunication Forum (TELFOR), 2017
The intense push toward the Internet of Everything (IoE) paradigm, and the desire to raise the level of efficiency of socio-technical systems engineering, entails reconsidering a traditional SCADA system. Any sort of intelligence in system behavior should start with high quality data, and this is where SCADA plays the central role.
M. Sagi, E. Varga
openaire +1 more source
The intense push toward the Internet of Everything (IoE) paradigm, and the desire to raise the level of efficiency of socio-technical systems engineering, entails reconsidering a traditional SCADA system. Any sort of intelligence in system behavior should start with high quality data, and this is where SCADA plays the central role.
M. Sagi, E. Varga
openaire +1 more source
14-th IEEE International Conference on Peer-to-Peer Computing, 2014
Crawling a DHT allows researchers to monitor the behaviour of peers, determine their geographic location, etc. However, it has always been an error-prone process as it is not feasible to capture a full snapshot of the Mainline DHT in a timely manner.
Niels Zeilemaker, Johan Pouwelse
openaire +1 more source
Crawling a DHT allows researchers to monitor the behaviour of peers, determine their geographic location, etc. However, it has always been an error-prone process as it is not feasible to capture a full snapshot of the Mainline DHT in a timely manner.
Niels Zeilemaker, Johan Pouwelse
openaire +1 more source
2009 International Conference on High Performance Switching and Routing, 2009
In peer to peer networks, the overlay topology connecting peers is an important component in addition to peer and data organization and search. In fact, topological characteristics have an important impact on the efficiency of search on such networks. In this paper, we address this issue for Chord based P2P systems.
Salma Ktari, Artur Hecker, Houda Labiod
openaire +1 more source
In peer to peer networks, the overlay topology connecting peers is an important component in addition to peer and data organization and search. In fact, topological characteristics have an important impact on the efficiency of search on such networks. In this paper, we address this issue for Chord based P2P systems.
Salma Ktari, Artur Hecker, Houda Labiod
openaire +1 more source
25th IEEE International Conference on Distributed Computing Systems Workshops, 2005
Most peer-to-peer (P2P) overlays based on distributed hash tables (DHTs) focus on stationary Internet hosts. However, when nodes in the last-mile wireless extension are allowed to join the overlay, we will face immediately the problem of peer mobility. That is, when a peer moves to a new location in the network, all the state information regarding the ...
null Hung-Chang Hsiao +1 more
openaire +1 more source
Most peer-to-peer (P2P) overlays based on distributed hash tables (DHTs) focus on stationary Internet hosts. However, when nodes in the last-mile wireless extension are allowed to join the overlay, we will face immediately the problem of peer mobility. That is, when a peer moves to a new location in the network, all the state information regarding the ...
null Hung-Chang Hsiao +1 more
openaire +1 more source
Towards a scalable and robust DHT
Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures, 2006zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Awerbuch, Baruch, Scheideler, Christian
openaire +1 more source
A survey of DHT security techniques
ACM Computing Surveys, 2011Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been shown to be notoriously difficult to protect against security attacks.
Urdaneta Paredes, G.A. +2 more
openaire +2 more sources

