Results 21 to 30 of about 55,204 (231)

FOCUSeR: A Fog Online Context-Aware Up-to-Date Sensor Ranking Method

open access: yesJournal of Sensor and Actuator Networks, 2022
Data obtained from sensors connected to wireless sensor networks must be stored and processed to enable environments such as smart cities. However, with the exponential growth in the number of devices at the edge of the network, it is necessary to ...
Felipe S. Costa   +2 more
doaj   +1 more source

Applying Pebble-Rotating Game to enhance the robustness of DHTs. [PDF]

open access: yesPLoS ONE, 2013
Distributed hash tables (DHTs) are usually used in the open networking environment, where they are vulnerable to Sybil attacks. Pebble-Rotating Game (PRG) mixes the nodes of the honest and the adversarial randomly, and can resist the Sybil attack ...
Liyong Ren, Xiaowen Nie, Yuchi Dong
doaj   +1 more source

Fast Exact Search in Hamming Space with Multi-Index Hashing [PDF]

open access: yes, 2014
There is growing interest in representing image data and feature descriptors using compact binary codes for fast near neighbor search. Although binary codes are motivated by their use as direct indices (addresses) into a hash table, codes longer than 32 ...
Fleet, David J.   +2 more
core   +1 more source

Decentralizing indexing and bootstrapping for online applications

open access: yesIET Blockchain, 2021
Peer‐to‐peer (P2P) networks utilize centralized entities (trackers) to assist peers in finding and exchanging information. Although modern P2P protocols are now trackerless and their function relies on distributed hash tables (DHTs), centralized entities
Pierre Schutz   +3 more
doaj   +1 more source

Security Considerations for Peer-to-Peer Distributed Hash Tables [PDF]

open access: yes, 2002
Recent peer-to-peer research has focused on providing efficient hash lookup systems that can be used to build more complex systems. These systems have good properties when their algorithms are executed correctly but have not generally considered how to ...
Emil Sit, Robert Morris
core   +4 more sources

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

d-SHAM: A Constant Degree-Scalable Homogeneous Addressing Mechanism for Structured P2P Networks

open access: yesIEEE Access, 2018
Minimizing the size of routing tables and reducing the lookup latency have established the ground rules for several structured peer-to-peer lookup algorithms.
Manaf Zghaibeh, Najam Ul Hassan
doaj   +1 more source

Accurate querying of frequent subgraphs in power grid graph data

open access: yesGlobal Energy Interconnection, 2019
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou   +3 more
doaj   +1 more source

Distributed ATrie Group Join: Towards Zero Network Cost

open access: yesIEEE Access, 2020
The combination of powerful parallel frameworks and on-demand commodity hardware in distributed computing has made both analytics and decision support systems canonical to enterprises of all sizes.
Prajwol Sangat   +2 more
doaj   +1 more source

Efficient Processing of Continuous Join Queries using Distributed Hash Tables [PDF]

open access: yes, 2008
International audienceThis paper addresses the problem of computing approximate answers to continuous join queries. We present a new method, called DHTJoin, which combines hash-based placement of tuples in a Distributed Hash Table (DHT) and dissemination
Akbarinia, Reza   +3 more
core   +4 more sources

Home - About - Disclaimer - Privacy