Results 11 to 20 of about 8,512 (160)

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

open access: yesCyber Security and Applications, 2023
Cloud-edge healthcare system provides storage and computing functions at the hospital servers, bringing low latency for doctors and patients. However, hospital servers cannot be trusted and have limited computing resources.
Yi Li, Meiqin Tang
doaj   +1 more source

Authentication in stealth distributed hash tables [PDF]

open access: yesJournal of Systems Architecture, 2006
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. In this paper, we acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness ...
MacQuire, Andrew   +4 more
openaire   +3 more sources

Fast distributed video deduplication via locality-sensitive hashing with similarity ranking

open access: yesEURASIP Journal on Image and Video Processing, 2019
The exponentially growing amount of video data being produced has led to tremendous challenges for video deduplication technology. Nowadays, many different deduplication approaches are being rapidly developed, but they are generally slow and their ...
Yeguang Li, Liang Hu, Ke Xia, Jie Luo
doaj   +1 more source

A Ceph-based storage strategy for big gridded remote sensing data

open access: yesBig Earth Data, 2021
When using distributed storage systems to store gridded remote sensing data in large, distributed clusters, most solutions utilize big table index storage strategies. However, in practice, the performance of big table index storage strategies degrades as
Xinyu Tang   +6 more
doaj   +1 more source

VANET Hybrid Collaborative Caching Strategy Based on PIT Similarity [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problem of repeated content transmission and long access delay in the Vehicular Ad Hoc Network(VANET),a hybrid collaborative caching strategy based on the similarity of Pending Interest Table(PIT) is designed.According to the PIT similarity
HUANG Jihai,DING Ying,ZHAO Bing
doaj   +1 more source

Decentralized and permission-less green energy certificates with GECKO

open access: yesEnergy Informatics, 2020
A growing demand in sustainable energy harvested from renewable resources, such as wind or solar power, leads to new challenges in the electricity grid, which in future is also referred to as the smart grid. This also reflects in a more decentralized and
Fabian Knirsch   +3 more
doaj   +1 more source

A Metadata Prefetching Strategy Based on Provenance Information [PDF]

open access: yesJisuanji gongcheng, 2016
In distributed file systems,metadata prefetching can reduce the response latency of metadata server.Existing metadata prefetching strategies prefetch metadata according to its past file access pattern,without considering the correlations between process ...
WU Guojin,HU Cheng
doaj   +1 more source

Enabling Dynamic Querying over Distributed Hash Tables [PDF]

open access: yesJournal of Parallel and Distributed Computing, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
TALIA, Domenico, TRUNFIO, Paolo
openaire   +1 more source

Fault Tolerant DHT-Based Routing in MANET

open access: yesSensors, 2022
In Distributed Hash Table (DHT)-based Mobile Ad Hoc Networks (MANETs), a logical structured network (i.e., follows a tree, ring, chord, 3D, etc., structure) is built over the ad hoc physical topology in a distributed manner.
Saleem Zahid   +5 more
doaj   +1 more source

Stealth distributed hash table [PDF]

open access: yesProceedings of the 2006 ACM CoNEXT conference on - CoNEXT '06, 2006
Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment.
Brampton, Andrew   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy