Results 41 to 50 of about 8,512 (160)
Bringing efficient advanced queries to distributed hash tables [PDF]
Interest in distributed storage is fueled by demand for reliability and resilience combined with ubiquitous availability. Peer-to-peer (P2P) storage networks are known for their decentralized control, self-organization, and adaptation. Advanced searching for documents and resources remains an open problem.
Bauer, Daniel +3 more
openaire +2 more sources
Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD Systems
The emerging combination of Internet of Things (IoT) and aerospace integration aided by satellite and 6G communication techniques has stimulated the Internet of Unmanned Aerial Vehicles (UAVs), i.e., Internet of Drones (IoD). To accommodate and share the
Zhuo Ma, Jiawei Zhang
doaj +1 more source
UnoHop: Efficient Distributed Hash Table with O(1) Lookup Performance
Distributed Hash Tables (DHTs) with O(1) lookup performance strive to minimize the maintenance traffic required for disseminating membership changes information (events).
Herry Sitepu +3 more
doaj
Replica Placement and Location using Distributed Hash Tables [PDF]
Interest in distributed storage is fueled by demand for reliability and resilience combined with decreasing hardware costs. Peer-to-peer storage networks based on distributed hash tables are attractive for their efficient use of resources and result- ing performance.
Waldvogel, Marcel +2 more
openaire +2 more sources
SSDHT:social network-based secure DHT mechanism
P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external ...
Panpan LI +5 more
doaj +2 more sources
Secure and Fault-Tolerant Distributed Location Management for Intelligent 5G Wireless Networks
Distributed mobility management (DMM) requires a flattened cellular network architecture to meet ever-increasing traffic demands of mobile users. In order to get rid of centralized mobility entities, it is desirable to manage locations of mobile nodes ...
Kashif Munir +4 more
doaj +1 more source
Stealth distributed hash table [PDF]
Distributed Hash Tables (DHTs) have been shown to be a promising form of decentralised structured peer-to-peer networking, offering substantial scalability and resilience. Unsurprisingly, there exist numerous DHT systems [11][13][16]. Primarily, DHTs serve as an object location service that can be used as a substrate for multiple large-scale ...
Brampton, A. +4 more
openaire +2 more sources
OLB: A Nature Inspired Approach for Load Balancing in Cloud Computing
Load balancing is treated as one of the important mechanisms for efficient resource allocation in cloud computing. In future there will appear a necessity of fully autonomic distributed systems to address the load balancing issues. With reference to this,
Mallikarjuna B., Venkata Krishna P.
doaj +1 more source
Congestion Control for Distributed Hash Tables [PDF]
Distributed Hash Tables (DHTs) provide a scalable mechanism for mapping identifiers to socket addresses. As each peer in the network can initiate lookup requests, a DHT has to process concurrently a potentially very large number of requests. In this paper, we look at congestion control for DHTs.
openaire +1 more source
Distributed Partition Detection With Dynamic Replication Management in a DHT-Based MANET
Curtailing the information loss due to network partitioning is imperative for the reliable communication in a distributed hash table (DHT)-based routing protocol for mobile ad hoc networks (MANETs).
Saleem Zahid +4 more
doaj +1 more source

