Results 21 to 30 of about 8,789 (300)
A Metadata Prefetching Strategy Based on Provenance Information [PDF]
In distributed file systems,metadata prefetching can reduce the response latency of metadata server.Existing metadata prefetching strategies prefetch metadata according to its past file access pattern,without considering the correlations between process ...
WU Guojin,HU Cheng
doaj +1 more source
Decentralized and permission-less green energy certificates with GECKO
A growing demand in sustainable energy harvested from renewable resources, such as wind or solar power, leads to new challenges in the electricity grid, which in future is also referred to as the smart grid. This also reflects in a more decentralized and
Fabian Knirsch +3 more
doaj +1 more source
Enabling Dynamic Querying over Distributed Hash Tables [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
TALIA, Domenico, TRUNFIO, Paolo
openaire +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni +1 more
doaj +1 more source
Fault Tolerant DHT-Based Routing in MANET
In Distributed Hash Table (DHT)-based Mobile Ad Hoc Networks (MANETs), a logical structured network (i.e., follows a tree, ring, chord, 3D, etc., structure) is built over the ad hoc physical topology in a distributed manner.
Saleem Zahid +5 more
doaj +1 more source
Stealth distributed hash table [PDF]
Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment.
Brampton, Andrew +4 more
openaire +2 more sources
Investigation of personal data protection mechanism based on blockchain technology
Blockchain technology is increasingly being used in personal data protection. Inspired by the importance of data security, this paper proposes a personal data protection mechanism based on blockchain, combined with distributed hash tables and ...
Rongrong Zhu +3 more
doaj +1 more source
Decentralized Data Management Privacy-Aware Framework for Positive Energy Districts
Energy Transition (ET) needs actors to perform independent actions on multiple levels of governance. These actors may need to write and read their data, and at the same time they want to protect their data from unauthorized access.
Sidra Aslam +2 more
doaj +1 more source
A real-time distributed hash table [PDF]
Currently, the North American power grid uses a centralized system to monitor and control wide-area power grid states. This centralized architecture is becoming a bottleneck as large numbers of wind and photo-voltaic (PV) generation sources require real-time monitoring and actuation to ensure sustained reliability.
null Tao Qian +2 more
openaire +1 more source

