Results 21 to 30 of about 55,204 (231)
FOCUSeR: A Fog Online Context-Aware Up-to-Date Sensor Ranking Method
Data obtained from sensors connected to wireless sensor networks must be stored and processed to enable environments such as smart cities. However, with the exponential growth in the number of devices at the edge of the network, it is necessary to ...
Felipe S. Costa +2 more
doaj +1 more source
Applying Pebble-Rotating Game to enhance the robustness of DHTs. [PDF]
Distributed hash tables (DHTs) are usually used in the open networking environment, where they are vulnerable to Sybil attacks. Pebble-Rotating Game (PRG) mixes the nodes of the honest and the adversarial randomly, and can resist the Sybil attack ...
Liyong Ren, Xiaowen Nie, Yuchi Dong
doaj +1 more source
Fast Exact Search in Hamming Space with Multi-Index Hashing [PDF]
There is growing interest in representing image data and feature descriptors using compact binary codes for fast near neighbor search. Although binary codes are motivated by their use as direct indices (addresses) into a hash table, codes longer than 32 ...
Fleet, David J. +2 more
core +1 more source
Decentralizing indexing and bootstrapping for online applications
Peer‐to‐peer (P2P) networks utilize centralized entities (trackers) to assist peers in finding and exchanging information. Although modern P2P protocols are now trackerless and their function relies on distributed hash tables (DHTs), centralized entities
Pierre Schutz +3 more
doaj +1 more source
Security Considerations for Peer-to-Peer Distributed Hash Tables [PDF]
Recent peer-to-peer research has focused on providing efficient hash lookup systems that can be used to build more complex systems. These systems have good properties when their algorithms are executed correctly but have not generally considered how to ...
Emil Sit, Robert Morris
core +4 more sources
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
d-SHAM: A Constant Degree-Scalable Homogeneous Addressing Mechanism for Structured P2P Networks
Minimizing the size of routing tables and reducing the lookup latency have established the ground rules for several structured peer-to-peer lookup algorithms.
Manaf Zghaibeh, Najam Ul Hassan
doaj +1 more source
Accurate querying of frequent subgraphs in power grid graph data
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou +3 more
doaj +1 more source
Distributed ATrie Group Join: Towards Zero Network Cost
The combination of powerful parallel frameworks and on-demand commodity hardware in distributed computing has made both analytics and decision support systems canonical to enterprises of all sizes.
Prajwol Sangat +2 more
doaj +1 more source
Efficient Processing of Continuous Join Queries using Distributed Hash Tables [PDF]
International audienceThis paper addresses the problem of computing approximate answers to continuous join queries. We present a new method, called DHTJoin, which combines hash-based placement of tuples in a Distributed Hash Table (DHT) and dissemination
Akbarinia, Reza +3 more
core +4 more sources

