Results 1 to 10 of about 125 (90)

Novel distributed Hash table——BChord

open access: yesTongxin xuebao, 2008
A novel distributed Hash table(DHT) BChord was presented. BChord adopts bi-directional search mechanism of Chord. Though query items of finger table in BChord almost double to Chord, compared with Chord, BChord evi- dently increases speed at searching of
ZHENG Yan1   +3 more
doaj   +3 more sources

DHT- and blockchain-based smart identification for video conferencing

open access: yesBlockchain: Research and Applications, 2022
Video conferencing applications help people communicate via the Internet and provide a significant and consistent basis for virtual meetings. However, integrity, security, identification, and authentication problems are still universal.
Morteza Alizadeh   +2 more
doaj   +1 more source

Research on MPP Database Connection Execution Based on Shared Storage [PDF]

open access: yesJisuanji gongcheng, 2018
In order to solve the problem of low connection efficiency after the Hash distribution table is converted into a random distribution table,a parallel connection operation algorithm for Hash tables in Massively Parallel Processor(MPP) database is ...
SUN Qingxin,LEI Yingchun,GONG Yili
doaj   +1 more source

Towards a Highly Available Model for Processing Service Requests Based on Distributed Hash Tables

open access: yesMathematics, 2022
This work aims to identify techniques leading to a highly available request processing service by using the natural decentralization and the dispersion power of the hash function involved in a Distributed Hash Table (DHT).
Voichiţa Iancu, Nicolae Ţăpuş
doaj   +1 more source

Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications

open access: yesIEEE Access, 2023
The accomplishment of blockchain has increased the focus on the various applications for simplifying the confidentiality and transaction sanctuary using the decentralized architecture via consensus mechanisms between different internet of things (IoT ...
Shivani Gaba   +9 more
doaj   +1 more source

Next-Generation Distributed Hash Tables

open access: yesProceedings of the on CoNEXT Student Workshop 2023, 2023
Distributed Hash Tables (DHTs) serve as the backbone of numerous modern decentralized systems like the InterPlanetary File System (IPFS) and Ethereum. As these systems evolve and expand, there is a growing need to enhance and optimize their underlying network support. In response to these challenges, we embark on the development of a new class of DHTs,
Sokoto, Saidu   +4 more
openaire   +4 more sources

Comparison of Hash Table Performance with Open Addressing and Closed Addressing: An Empirical Study [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2015
In this paper, we conducted empirical experiments to study the performance of hashing with a large set of data and compared the results of different collision approaches. The experiment results leaned more to closed addressing than to open addressing and
Dapeng Liu, Shaochun Xu
doaj   +1 more source

Distributed Paged Hash Tables [PDF]

open access: yes, 2003
In this paper we present the design and implementation of DPH, a storage layer for cluster environments. DPH is a Distributed Data Structure (DDS) based on the distribution of a paged hash table. It combines main memory with file system resources across the cluster in order to implement a distributed dictionary that can be used for the storage of very ...
Rufino, José   +3 more
openaire   +2 more sources

Comparative Analysis of Decentralized Identity Approaches

open access: yesIEEE Access, 2022
Decentralization is essential when trust and performance must not depend on a single organization. Distributed Ledger Technologies (DLTs) and Decentralized Hash Tables (DHTs) are examples where the DLT is useful for transactional events, and the DHT is ...
Morteza Alizadeh   +2 more
doaj   +1 more source

Weighted distributed hash tables [PDF]

open access: yesProceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures, 2005
We present two methods for weighted consistent hashing also known as weighted distributed hash tables. The first method, called Linear Method, combines the standard consistent hasing introduced by Karger et al. [9] with a linear weighted distance measure.
Christian Schindelhauer   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy