Results 201 to 210 of about 55,204 (231)
Some of the next articles are maybe not open access.
Stochastic Load Rebalancing in Distributed Hash Tables
2011 IEEE 17th International Conference on Parallel and Distributed Systems, 2011With the notion of virtual servers, peers participating in a distributed hash table (DHT) may host different numbers of virtual servers and are enabled to balance their loads in the reallocation of virtual servers. While most decentralized load balance algorithms designed for the DHTs based on virtual servers offer no performance guarantees, we present
Che-Wei Chang, Hung-Chang Hsiao
openaire +1 more source
Routing networks for distributed hash tables
Proceedings of the twenty-second annual symposium on Principles of distributed computing, 2003Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing deterministic routing topologies is presented. Using this technique, classical parallel interconnection networks can be adapted to handle the dynamic nature of participants in peer-to-
openaire +1 more source
Distributed Hash Tables: Design and Applications
2009The tremendous growth of the Internet and large-scale applications such as file sharing and multimedia streaming require the support of efficient search on objects. Peer-to-peer approaches have been proposed to provide this search mechanism scalably.
Chan, Chi-Fai, Chan, Gary Shueng Han
openaire +1 more source
Fully Distributed Indexing over a Distributed Hash Table
2017Real-time communication, as well as simple data and file sharing motivates relevant research in network design nowadays. While centralized structures are generally favored over distributed ones for sake of simplicity, a considerable amount of literature has been devoted to the latter.
Simon Désaulniers +3 more
openaire +1 more source
Proceedings of 15th International Conference on Computer Communications and Networks, 2006
openaire +1 more source
openaire +1 more source
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables
IEEE Transactions on Information Forensics and Security, 2023Dan Tang, Yudong Yan, Gao Chenjun
exaly
A survey of DHT security techniques
ACM Computing Surveys, 2011Guillaume Pierre, Maarten van Steen
exaly

