Results 271 to 280 of about 95,792 (317)
Image adaptive encryption using EfficientNet B3 feature guided multi scroll chaotic map with modulo controlled pseudo parallel processing. [PDF]
Subathra S, Thanikaiselvan V.
europepmc +1 more source
Security of Quantum Key Distribution with One-Time-Pad-Protected Error Correction and Its Performance Benefits. [PDF]
Novak R.
europepmc +1 more source
DNS-Sensor: A Sensor-Driven Architecture for Real-Time DNS Cache Poisoning Detection and Mitigation. [PDF]
Yu H +5 more
europepmc +1 more source
Securing e-governance against shadow attacks with blockchain technology. [PDF]
Mishra P, R G.
europepmc +1 more source
Spherical Polar Pattern Matching for Star Identification. [PDF]
Fu J, Lin L, Li Q.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2007 IEEE Wireless Communications and Networking Conference, 2007
This paper presents an architecture called social distributed hash table (SDHT) that combines strengths of distributed hash table (DHT) algorithms and social networks making mobile search fast and context oriented. The paper presents possible implementations of the proposed architecture in the IP multimedia subsystem (IMS) and as a standalone SIP based
Marcin Matuszewski +1 more
openaire +1 more source
This paper presents an architecture called social distributed hash table (SDHT) that combines strengths of distributed hash table (DHT) algorithms and social networks making mobile search fast and context oriented. The paper presents possible implementations of the proposed architecture in the IP multimedia subsystem (IMS) and as a standalone SIP based
Marcin Matuszewski +1 more
openaire +1 more source
TYPHOON: mobile distributed hash tables
Journal of Parallel and Distributed Computing, 2005TYPHOON is a capability-aware peer-to-peer (P2P) system. It exploits the heterogeneity of nodes in the system based on the concept of virtual homes. Nodes participating in the system are classified as good and inactive. TYPHOON uses resources provided by good peers. It is thus more reliable and agile than a naive structured P2P system. When a good peer
Hung-Chang Hsiao +2 more
openaire +1 more source
Distributed MapReduce framework using distributed hash table
2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013), 2013In past years, Cloud computing is gained more attention in industry and academic area. The advance technologies are needed to match the demand of the development of cloud computing. MapReduce is one of the enabling technology. MapReduce is a programming model supporting parallel computation especially for data-intensive cloud computing applications ...
Chuan-Feng Chiu +2 more
openaire +1 more source
2005
In the last few years, an increasing number of massively distributed systems with millions of participants has emerged within very short time frames. Applications, such as instant messaging, file-sharing, and content distribution have attracted countless numbers of users.
Klaus Wehrle, Stefan Götz, Simon Rieche
openaire +1 more source
In the last few years, an increasing number of massively distributed systems with millions of participants has emerged within very short time frames. Applications, such as instant messaging, file-sharing, and content distribution have attracted countless numbers of users.
Klaus Wehrle, Stefan Götz, Simon Rieche
openaire +1 more source

