Results 31 to 40 of about 55,204 (231)

Atomic commitment in transactional DHTs [PDF]

open access: yes, 2007
We investigate the problem of atomic commit in transactional database systems built on top of Distributed Hash Tables. DHTs provide a decentralized way to store and look up data.
Haridi, Seif, Moser, Monika
core   +4 more sources

Distributed Persistent Identifiers System Design

open access: yesData Science Journal, 2017
The need to identify both digital and physical objects is ubiquitous in our society. Past and present persistent identifier (PID) systems, of which there is a great variety in terms of technical and social implementation, have evolved with the advent of ...
Pavel Golodoniuc   +2 more
doaj   +1 more source

The American Commitment to Private International Political Communications: A View of Free Europe, Inc. [PDF]

open access: yes, 1966
The principal service of distributed hash tables (DHTs) is route(id, data), which sends data to a peer responsible for id, using typically O(log(# of peers)) overlay hops.
Aberer, Karl   +3 more
core   +4 more sources

Stealth distributed hash table [PDF]

open access: yesProceedings of the 2006 ACM CoNEXT conference on - CoNEXT '06, 2006
Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment.
Brampton, Andrew   +4 more
openaire   +2 more sources

A real-time distributed hash table [PDF]

open access: yes2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications, 2014
Currently, the North American power grid uses a centralized system to monitor and control wide-area power grid states. This centralized architecture is becoming a bottleneck as large numbers of wind and photo-voltaic (PV) generation sources require real-time monitoring and actuation to ensure sustained reliability.
null Tao Qian   +2 more
openaire   +1 more source

Extreme Scale De Novo Metagenome Assembly [PDF]

open access: yes, 2018
Metagenome assembly is the process of transforming a set of short, overlapping, and potentially erroneous DNA segments from environmental samples into the accurate representation of the underlying microbiomes's genomes. State-of-the-art tools require big
Arndt, Bill   +8 more
core   +3 more sources

Parallel Recursive State Compression for Free [PDF]

open access: yes, 2011
This paper focuses on reducing memory usage in enumerative model checking, while maintaining the multi-core scalability obtained in earlier work. We present a tree-based multi-core compression method, which works by leveraging sharing among sub-vectors ...
A. Laarman   +14 more
core   +6 more sources

On Routing in Distributed Hash Tables [PDF]

open access: yesSeventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007
There have been many proposals for constructing routing tables for distributed hash tables (DHT). They can be classified into two groups: A) those that assume that the peers are uniformly randomly distributed in the identifier space, and B) those that allow order-preserving hash functions that lead to a skewed peer distribution in the identifier space.
Fabius Klemm   +3 more
openaire   +1 more source

Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

open access: yesSensors, 2013
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP).
José María Pousada-Carballo   +4 more
doaj   +1 more source

Collaborative internet worm containment [PDF]

open access: yes, 2005
Large-scale worm outbrakes that leads to distributed denial-of-dervice attacks pose a major threat to internet infrastructure security. To prevent computers from such attacks deployment of fast, scalable security overlay networks based on distributed ...
Cai, M   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy