Results 271 to 280 of about 167,829 (332)
Design of a Blockchain-Enabled Traceability System for <i>Pleurotus ostreatus</i> Supply Chains. [PDF]
Guo H, Xu W, Lin M, Zhang X, Liu P.
europepmc +1 more source
Expressive Attribute-Based Proxy Signature Scheme for UAV Networks. [PDF]
He L, Gan Y, Jin S.
europepmc +1 more source
Edge-Enabled Hybrid Encryption Framework for Secure Health Information Exchange in IoT-Based Smart Healthcare Systems. [PDF]
Ghani NA +4 more
europepmc +1 more source
High-Efficiency Traceability Mechanism for Multimedia Data in Consumer Internet of Things Combined with Blockchain. [PDF]
Yan T, Chen J, Zhang X, Hu G.
europepmc +1 more source
Distributed storage database system for motion data based on blockchain technology. [PDF]
Wang P, Zhao Z.
europepmc +1 more source
Defining an approach to empower clinical geneticists to do genomic reanalysis. [PDF]
Segal MM +12 more
europepmc +1 more source
The problem of coherence of a distributed hash table
D.Paulraj K.Balachander +2 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Load Balancing Hashing in Geographic Hash Tables
IEEE Transactions on Parallel and Distributed Systems, 2012In this paper, we address the problem of balancing the network traffic load when the data generated in a wireless sensor network is stored on the sensor node themselves, and accessed through querying a geographic hash table. Existing approaches allow balancing network load by changing the georouting protocol used to forward queries in the geographic ...
Renda Elena, Resta Giovanni, Santi Paolo
openaire +2 more sources
Proceedings of the 2015 International Symposium on Memory Systems, 2015
Hash tables are a commonly used data structure used in many algorithms and applications. As applications and data scale, the efficient implementation of hash tables becomes increasingly important and challenging. In particular, memory capacity becomes increasingly important and entries can become asymmetrically chained across hash buckets.
Zhaoxia Deng +3 more
openaire +1 more source
Hash tables are a commonly used data structure used in many algorithms and applications. As applications and data scale, the efficient implementation of hash tables becomes increasingly important and challenging. In particular, memory capacity becomes increasingly important and entries can become asymmetrically chained across hash buckets.
Zhaoxia Deng +3 more
openaire +1 more source

