Results 41 to 50 of about 55,204 (231)

Simple Load Balancing for Distributed Hash Tables [PDF]

open access: yes, 1997
Distributed hash tables have recently become a useful building block for a variety of distributed applications. However, current schemes based upon consistent hashing require both considerable implementation complexity and substantial storage overhead to
Byers, John   +2 more
core  

Socially-Aware Distributed Hash Tables for Decentralized Online Social Networks

open access: yes, 2015
Many decentralized online social networks (DOSNs) have been proposed due to an increase in awareness related to privacy and scalability issues in centralized social networks.
Girdzijauskas, Sarunas   +2 more
core   +1 more source

Efficient Batch Update of Unique Identifiers in a Distributed Hash Table for Resources in a Mobile Host [PDF]

open access: yes, 2010
Resources in a distributed system can be identified using identifiers based on random numbers. When using a distributed hash table to resolve such identifiers to network locations, the straightforward approach is to store the network location directly in
Chung, Yoo
core   +1 more source

A Read-Only Distributed Hash Table [PDF]

open access: yesJournal of Grid Computing, 2011
A distributed hash table (DHT) is an infrastructure to support resource discovery in large distributed systems. In a DHT, data items such as resources, indexes of resources or resource metadata, are distributed across an overlay network based on a hash function.
March, V., Teo, Y.M.
openaire   +1 more source

Quantum Decoherence of Nitrogen‐Vacancy Spin Ensembles in a Nitrogen Spin Bath in Diamond Under Dynamical Decoupling

open access: yesAdvanced Optical Materials, EarlyView.
Combining high‐order cluster‐correlation expansion with experiment, it is revealed that P1‐driven NV decoherence under dynamical decoupling deviates from semi‐classical scaling laws. The coherence‐time exponent depends on pulse number and bath conditions, demonstrating the necessity of a full quantum bath description.
Huijin Park   +8 more
wiley   +1 more source

Self-Correcting Broadcast in Distributed Hash Tables [PDF]

open access: yes, 2003
We present two broadcast algorithms that can be used on top of distributed hash tables (DHTs) to perform group communication and arbitrary queries. Unlike other P2P group communication mechanisms, which either embed extra information in the DHTs or use ...
Brand, Per   +4 more
core   +3 more sources

Neuroprotective Effects of Time‐Restricted Feeding Combined With Different Protein Sources in MPTP‐Induced Parkinson's Disease Mice Model and Its Modulatory Impact on Gut Microbiota Metabolism

open access: yesAdvanced Science, EarlyView.
Time‐restricted feeding (TRF) exerts protein‐dependent neuroprotective effects in an MPTP‐induced Parkinson's disease model. In casein‐fed mice, TRF improves gut barrier integrity and reduces neuroinflammation, possibly via modulation of Allobaculum and BCAAs.
Ting Li   +12 more
wiley   +1 more source

DiBELLA: Distributed long read to long read alignment [PDF]

open access: yes, 2019
We present a parallel algorithm and scalable implementation for genome analysis, specifically the problem of finding overlaps and alignments for data from "third generation" long read sequencers [29]. While long sequences of DNA offer enormous advantages
Buluç, A   +4 more
core   +2 more sources

Machine Learning for Green Solvents: Assessment, Selection and Substitution

open access: yesAdvanced Science, EarlyView.
Environmental regulations have intensified demand for green solvents, but discovery is limited by Solvent Selection Guides (SSGs) that quantify solvent sustainability. Training a machine learning model on GlaxoSmithKline SSG, a database of sustainability metrics for 10,189 solvents, GreenSolventDB is developed. Integrated with Hansen solubility metrics,
Rohan Datta   +4 more
wiley   +1 more source

Whanaungatanga: Sybil-proof routing with social networks [PDF]

open access: yes, 2009
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence.
Kaashoek, M. Frans   +1 more
core  

Home - About - Disclaimer - Privacy