Results 31 to 40 of about 55,204 (231)
Atomic commitment in transactional DHTs [PDF]
We investigate the problem of atomic commit in transactional database systems built on top of Distributed Hash Tables. DHTs provide a decentralized way to store and look up data.
Haridi, Seif, Moser, Monika
core +4 more sources
Distributed Persistent Identifiers System Design
The need to identify both digital and physical objects is ubiquitous in our society. Past and present persistent identifier (PID) systems, of which there is a great variety in terms of technical and social implementation, have evolved with the advent of ...
Pavel Golodoniuc +2 more
doaj +1 more source
The American Commitment to Private International Political Communications: A View of Free Europe, Inc. [PDF]
The principal service of distributed hash tables (DHTs) is route(id, data), which sends data to a peer responsible for id, using typically O(log(# of peers)) overlay hops.
Aberer, Karl +3 more
core +4 more sources
Stealth distributed hash table [PDF]
Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment.
Brampton, Andrew +4 more
openaire +2 more sources
A real-time distributed hash table [PDF]
Currently, the North American power grid uses a centralized system to monitor and control wide-area power grid states. This centralized architecture is becoming a bottleneck as large numbers of wind and photo-voltaic (PV) generation sources require real-time monitoring and actuation to ensure sustained reliability.
null Tao Qian +2 more
openaire +1 more source
Extreme Scale De Novo Metagenome Assembly [PDF]
Metagenome assembly is the process of transforming a set of short, overlapping, and potentially erroneous DNA segments from environmental samples into the accurate representation of the underlying microbiomes's genomes. State-of-the-art tools require big
Arndt, Bill +8 more
core +3 more sources
Parallel Recursive State Compression for Free [PDF]
This paper focuses on reducing memory usage in enumerative model checking, while maintaining the multi-core scalability obtained in earlier work. We present a tree-based multi-core compression method, which works by leveraging sharing among sub-vectors ...
A. Laarman +14 more
core +6 more sources
On Routing in Distributed Hash Tables [PDF]
There have been many proposals for constructing routing tables for distributed hash tables (DHT). They can be classified into two groups: A) those that assume that the peers are uniformly randomly distributed in the identifier space, and B) those that allow order-preserving hash functions that lead to a skewed peer distribution in the identifier space.
Fabius Klemm +3 more
openaire +1 more source
Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP).
José María Pousada-Carballo +4 more
doaj +1 more source
Collaborative internet worm containment [PDF]
Large-scale worm outbrakes that leads to distributed denial-of-dervice attacks pose a major threat to internet infrastructure security. To prevent computers from such attacks deployment of fast, scalable security overlay networks based on distributed ...
Cai, M +4 more
core +1 more source

