Results 31 to 40 of about 95,792 (317)
Enabling Dynamic Querying over Distributed Hash Tables [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
TALIA, Domenico, TRUNFIO, Paolo
openaire +1 more source
Fault Tolerant DHT-Based Routing in MANET
In Distributed Hash Table (DHT)-based Mobile Ad Hoc Networks (MANETs), a logical structured network (i.e., follows a tree, ring, chord, 3D, etc., structure) is built over the ad hoc physical topology in a distributed manner.
Saleem Zahid +5 more
doaj +1 more source
Stealth distributed hash table [PDF]
Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment.
Brampton, Andrew +4 more
openaire +2 more sources
We present the first fully distributed algorithm which chooses a peer uniformly at random from the set of all peers in a distributed hash table(DHT). Our algorithm has latency O(log n) and sends O(log n) message in expectation for a standard DHT like ...
Jared Saia, Valerie King
core +1 more source
Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni +1 more
doaj +1 more source
Investigation of personal data protection mechanism based on blockchain technology
Blockchain technology is increasingly being used in personal data protection. Inspired by the importance of data security, this paper proposes a personal data protection mechanism based on blockchain, combined with distributed hash tables and ...
Rongrong Zhu +3 more
doaj +1 more source
Message passing on the QCDSP supercomputer [PDF]
The QCDSP machines were designed for lattice gauge calculations. For planning it is crucial to explore this architecture for other computationally intensive tasks. Here I describe an implementation of a simple message passing scheme.
Creutz, Creutz, Michael Creutz
core +2 more sources
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Decentralized Data Management Privacy-Aware Framework for Positive Energy Districts
Energy Transition (ET) needs actors to perform independent actions on multiple levels of governance. These actors may need to write and read their data, and at the same time they want to protect their data from unauthorized access.
Sidra Aslam +2 more
doaj +1 more source
A real-time distributed hash table [PDF]
Currently, the North American power grid uses a centralized system to monitor and control wide-area power grid states. This centralized architecture is becoming a bottleneck as large numbers of wind and photo-voltaic (PV) generation sources require real-time monitoring and actuation to ensure sustained reliability.
null Tao Qian +2 more
openaire +1 more source

