Results 41 to 50 of about 8,512 (160)

Bringing efficient advanced queries to distributed hash tables [PDF]

open access: yes29th Annual IEEE International Conference on Local Computer Networks, 2004
Interest in distributed storage is fueled by demand for reliability and resilience combined with ubiquitous availability. Peer-to-peer (P2P) storage networks are known for their decentralized control, self-organization, and adaptation. Advanced searching for documents and resources remains an open problem.
Bauer, Daniel   +3 more
openaire   +2 more sources

Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD Systems

open access: yesIEEE Access, 2023
The emerging combination of Internet of Things (IoT) and aerospace integration aided by satellite and 6G communication techniques has stimulated the Internet of Unmanned Aerial Vehicles (UAVs), i.e., Internet of Drones (IoD). To accommodate and share the
Zhuo Ma, Jiawei Zhang
doaj   +1 more source

UnoHop: Efficient Distributed Hash Table with O(1) Lookup Performance

open access: yesJournal of ICT Research and Applications, 2013
Distributed Hash Tables (DHTs) with O(1) lookup performance strive to minimize the maintenance traffic required for disseminating membership changes information (events).
Herry Sitepu   +3 more
doaj  

Replica Placement and Location using Distributed Hash Tables [PDF]

open access: yes32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007
Interest in distributed storage is fueled by demand for reliability and resilience combined with decreasing hardware costs. Peer-to-peer storage networks based on distributed hash tables are attractive for their efficient use of resources and result- ing performance.
Waldvogel, Marcel   +2 more
openaire   +2 more sources

SSDHT:social network-based secure DHT mechanism

open access: yesDianxin kexue, 2018
P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external ...
Panpan LI   +5 more
doaj   +2 more sources

Secure and Fault-Tolerant Distributed Location Management for Intelligent 5G Wireless Networks

open access: yesIEEE Access, 2018
Distributed mobility management (DMM) requires a flattened cellular network architecture to meet ever-increasing traffic demands of mobile users. In order to get rid of centralized mobility entities, it is desirable to manage locations of mobile nodes ...
Kashif Munir   +4 more
doaj   +1 more source

Stealth distributed hash table [PDF]

open access: yesProceedings of the 2005 ACM conference on Emerging network experiment and technology - CoNEXT'05, 2005
Distributed Hash Tables (DHTs) have been shown to be a promising form of decentralised structured peer-to-peer networking, offering substantial scalability and resilience. Unsurprisingly, there exist numerous DHT systems [11][13][16]. Primarily, DHTs serve as an object location service that can be used as a substrate for multiple large-scale ...
Brampton, A.   +4 more
openaire   +2 more sources

OLB: A Nature Inspired Approach for Load Balancing in Cloud Computing

open access: yesCybernetics and Information Technologies, 2015
Load balancing is treated as one of the important mechanisms for efficient resource allocation in cloud computing. In future there will appear a necessity of fully autonomic distributed systems to address the load balancing issues. With reference to this,
Mallikarjuna B., Venkata Krishna P.
doaj   +1 more source

Congestion Control for Distributed Hash Tables [PDF]

open access: yesFifth IEEE International Symposium on Network Computing and Applications (NCA'06), 2006
Distributed Hash Tables (DHTs) provide a scalable mechanism for mapping identifiers to socket addresses. As each peer in the network can initiate lookup requests, a DHT has to process concurrently a potentially very large number of requests. In this paper, we look at congestion control for DHTs.
openaire   +1 more source

Distributed Partition Detection With Dynamic Replication Management in a DHT-Based MANET

open access: yesIEEE Access, 2018
Curtailing the information loss due to network partitioning is imperative for the reliable communication in a distributed hash table (DHT)-based routing protocol for mobile ad hoc networks (MANETs).
Saleem Zahid   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy