Results 31 to 40 of about 8,512 (160)
Distributed ATrie Group Join: Towards Zero Network Cost
The combination of powerful parallel frameworks and on-demand commodity hardware in distributed computing has made both analytics and decision support systems canonical to enterprises of all sizes.
Prajwol Sangat +2 more
doaj +1 more source
Product Pre-Launch Prediction From Resilient Distributed e-WOM Data
Pre-launch success prediction of a product is a challenge in today's electronic world. Based on this prediction, industries can avoid huge losses by deciding on whether to launch or not to launch a product into the market.
Sandhya Narayanan +2 more
doaj +1 more source
Big Tech companies operating in a data-driven economy offer services that rely on their users’ personal data and usually store this personal information in “data silos” that prevent transparency about their use and opportunities for data sharing for ...
Mirko Zichichi +2 more
doaj +1 more source
DEVELOPING APACHE SPARK BASED RIPLEY’S K FUNCTIONS FOR ACCELERATING SPATIOTEMPORAL POINT PATTERN ANALYSIS [PDF]
Ripley’s K functions are powerful tools for studying the spatial arrangement or spatiotemporal distribution characteristics of geographic phenomena and events in spatial analysis and has been used in many fields.
Z. Gui +7 more
doaj +1 more source
The Management Strategy of Metadata in Large-scale Network Storage System
The wan Internet storage system based on Distributed Hash Table uses fully distributed data and metadata management, and constructs an extensible and efficient mass storage system for the application based on Internet.
Zhong Haifeng, Xiong Jianying
doaj +1 more source
POSITION-BASED DISTRIBUTED HASH TABLES
In this thesis we want to create scalable, fault-tolerant and self-configuring dictionaries that can be deployed in a wide range of networks, including highly dynamic networks with frequent membership changes, like peer-to-peer overlay networks or wireless ad hoc networks.
openaire +4 more sources
We are witnessing the advent of personal manufacturing, where home users and small and medium enterprises manufacture products locally, at the point and time of need.
Anton Vedeshin +4 more
doaj +1 more source
Achieving Online and Scalable Information Integrity by Harnessing Social Spam Correlations
Malicious web links, social rumors, fraudulent advertisements, faked comments, and biased propaganda are overwhelmingly influencing online social networks. Enabling information integrity is a hot topic in both academia and industry.
Hailu Xu +5 more
doaj +1 more source
Design and Implementation of DHT Algorithm for NDN
A novel distributed Hash table(DHT)algorithm under named data networking(NDN), which was called ndnDHT, was proposed. The algorithm brings the DHT to NDN for the first time. A new binary method using the structure of NDN was designed.
Kai Lei, Meng Yuan
doaj +2 more sources
Packet Classification Using GPU and One-Level Entropy-Based Hashing
The demand for on-line analyzing of internet traffic for both security and QoS consideration directly increases as a function of using diverse applications and as malicious attacks increase.
Shlomo Greenberg +3 more
doaj +1 more source

