Results 21 to 30 of about 8,789 (300)

A Metadata Prefetching Strategy Based on Provenance Information [PDF]

open access: yesJisuanji gongcheng, 2016
In distributed file systems,metadata prefetching can reduce the response latency of metadata server.Existing metadata prefetching strategies prefetch metadata according to its past file access pattern,without considering the correlations between process ...
WU Guojin,HU Cheng
doaj   +1 more source

Decentralized and permission-less green energy certificates with GECKO

open access: yesEnergy Informatics, 2020
A growing demand in sustainable energy harvested from renewable resources, such as wind or solar power, leads to new challenges in the electricity grid, which in future is also referred to as the smart grid. This also reflects in a more decentralized and
Fabian Knirsch   +3 more
doaj   +1 more source

Enabling Dynamic Querying over Distributed Hash Tables [PDF]

open access: yesJournal of Parallel and Distributed Computing, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
TALIA, Domenico, TRUNFIO, Paolo
openaire   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks

open access: yesInternational Journal of Distributed Sensor Networks, 2010
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni   +1 more
doaj   +1 more source

Fault Tolerant DHT-Based Routing in MANET

open access: yesSensors, 2022
In Distributed Hash Table (DHT)-based Mobile Ad Hoc Networks (MANETs), a logical structured network (i.e., follows a tree, ring, chord, 3D, etc., structure) is built over the ad hoc physical topology in a distributed manner.
Saleem Zahid   +5 more
doaj   +1 more source

Stealth distributed hash table [PDF]

open access: yesProceedings of the 2006 ACM CoNEXT conference on - CoNEXT '06, 2006
Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment.
Brampton, Andrew   +4 more
openaire   +2 more sources

Investigation of personal data protection mechanism based on blockchain technology

open access: yesScientific Reports, 2023
Blockchain technology is increasingly being used in personal data protection. Inspired by the importance of data security, this paper proposes a personal data protection mechanism based on blockchain, combined with distributed hash tables and ...
Rongrong Zhu   +3 more
doaj   +1 more source

Decentralized Data Management Privacy-Aware Framework for Positive Energy Districts

open access: yesEnergies, 2021
Energy Transition (ET) needs actors to perform independent actions on multiple levels of governance. These actors may need to write and read their data, and at the same time they want to protect their data from unauthorized access.
Sidra Aslam   +2 more
doaj   +1 more source

A real-time distributed hash table [PDF]

open access: yes2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications, 2014
Currently, the North American power grid uses a centralized system to monitor and control wide-area power grid states. This centralized architecture is becoming a bottleneck as large numbers of wind and photo-voltaic (PV) generation sources require real-time monitoring and actuation to ensure sustained reliability.
null Tao Qian   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy