Results 31 to 40 of about 95,792 (317)

Enabling Dynamic Querying over Distributed Hash Tables [PDF]

open access: yesJournal of Parallel and Distributed Computing, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
TALIA, Domenico, TRUNFIO, Paolo
openaire   +1 more source

Fault Tolerant DHT-Based Routing in MANET

open access: yesSensors, 2022
In Distributed Hash Table (DHT)-based Mobile Ad Hoc Networks (MANETs), a logical structured network (i.e., follows a tree, ring, chord, 3D, etc., structure) is built over the ad hoc physical topology in a distributed manner.
Saleem Zahid   +5 more
doaj   +1 more source

Stealth distributed hash table [PDF]

open access: yesProceedings of the 2006 ACM CoNEXT conference on - CoNEXT '06, 2006
Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment.
Brampton, Andrew   +4 more
openaire   +2 more sources

Choosing a random peer [PDF]

open access: yes, 2004
We present the first fully distributed algorithm which chooses a peer uniformly at random from the set of all peers in a distributed hash table(DHT). Our algorithm has latency O(log n) and sends O(log n) message in expectation for a standard DHT like ...
Jared Saia, Valerie King
core   +1 more source

Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks

open access: yesInternational Journal of Distributed Sensor Networks, 2010
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni   +1 more
doaj   +1 more source

Investigation of personal data protection mechanism based on blockchain technology

open access: yesScientific Reports, 2023
Blockchain technology is increasingly being used in personal data protection. Inspired by the importance of data security, this paper proposes a personal data protection mechanism based on blockchain, combined with distributed hash tables and ...
Rongrong Zhu   +3 more
doaj   +1 more source

Message passing on the QCDSP supercomputer [PDF]

open access: yes, 1999
The QCDSP machines were designed for lattice gauge calculations. For planning it is crucial to explore this architecture for other computationally intensive tasks. Here I describe an implementation of a simple message passing scheme.
Creutz, Creutz, Michael Creutz
core   +2 more sources

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Decentralized Data Management Privacy-Aware Framework for Positive Energy Districts

open access: yesEnergies, 2021
Energy Transition (ET) needs actors to perform independent actions on multiple levels of governance. These actors may need to write and read their data, and at the same time they want to protect their data from unauthorized access.
Sidra Aslam   +2 more
doaj   +1 more source

A real-time distributed hash table [PDF]

open access: yes2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications, 2014
Currently, the North American power grid uses a centralized system to monitor and control wide-area power grid states. This centralized architecture is becoming a bottleneck as large numbers of wind and photo-voltaic (PV) generation sources require real-time monitoring and actuation to ensure sustained reliability.
null Tao Qian   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy