DHT

Results: 84



#Item
41Oral communication / Teaching / Final examination / Education / Educational psychology / Lecture

HIST 1493: : U.S., 1865-Present (SProfessor: David Wrobel Office: DHT 419, (PH: Hours: T: 11-12 & 1-2; R: 9-11 & 1-2, or by appt. Section Instructor

Add to Reading List

Source URL: explorehistory.ou.edu

Language: English - Date: 2015-01-12 11:42:38
42MacFadyen / Medical specialties / Swedish Institute of Computer Science / Intensive-care medicine

Scottish Intensive Care Society - Annual General Meeting Tom Morris Suite – Old Course Hotel, St Andrews Thursday 19th January:37 hours Present: W Peel, C Wallis, S Moultrie, DHT Scott, F McIntyre, C Hawthorne,

Add to Reading List

Source URL: www.scottishintensivecare.org.uk

Language: English - Date: 2014-03-03 18:09:16
43

DATABASE SYSTEMS (DBS) Database Systems •  Class meets Mondays and Thursdays 9-9:50 in DHT LG. •  Professor: Leonid Libkin

Add to Reading List

Source URL: homepages.inf.ed.ac.uk

Language: English - Date: 2014-09-14 11:37:09
    44

    The GNUnet DHT Christian Grothoff The GNUnet DHT Christian Grothoff

    Add to Reading List

    Source URL: grothoff.org

    Language: English - Date: 2011-06-21 07:45:48
      45Distributed hash table / Chord / Peer-to-peer / Hash table / Prefix hash tree / Lookup table / PlanetLab / Trie / Kademlia / Distributed data storage / Computing / Computer programming

      OpenDHT: A Public DHT Service and Its Uses Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu UC Berkeley and Intel Research

      Add to Reading List

      Source URL: www.eecs.berkeley.edu

      Language: English - Date: 2005-06-20 16:13:06
      46Peer-to-peer / Computer security / Distributed hash table / Johann Jakob Heckel / Malware / Kademlia / Blacklist / Mannheim / Hash table / Distributed data storage / File sharing networks / Computing

      Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia Philipp C. Heckel, University of Mannheim,

      Add to Reading List

      Source URL: www.philippheckel.com

      Language: English - Date: 2009-11-25 08:52:55
      47

      Verteilte Anfrageverarbeitung in DHT-basierten P2P-Systemen Philipp Rösch1 1 Christian von der Weth2

      Add to Reading List

      Source URL: subs.emis.de

      Language: German - Date: 2013-10-04 10:30:34
        48File sharing networks / Cryptographic protocols / Secure communication / Cross-platform software / Kademlia / Peer-to-peer / Distributed hash table / Kad network / Transport Layer Security / Software / Computing / Distributed data storage

        UNIVERSITY OF MANNHEIM Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia

        Add to Reading List

        Source URL: www.philippheckel.com

        Language: English - Date: 2009-11-25 08:49:15
        49Distributed hash table / Prefix hash tree / Peer-to-peer / Chord / Trie / P-Grid / B-tree / Binary search tree / Hash table / Distributed data storage / Computing / Computer programming

        A Case Study in Building Layered DHT Applications Paper #318 Abstract Recent research has convincingly demonstrated that one can use Distributed Hash Tables (DHTs) to build scalable, robust and efficient applications. On

        Add to Reading List

        Source URL: www.eecs.berkeley.edu

        Language: English - Date: 2005-09-01 19:45:26
        50Distributed hash table / Routing / Tapestry / Pastry / Kademlia / Chord / Geographic routing / Network topology / Koorde / Distributed data storage / Computing / Network architecture

        The Impact of DHT Routing Geometry on Resilience and Proximity K. Gummadi∗, R. Gummadi†, S. Gribble‡, S. Ratnasamy§, S. Shenker¶, I. Stoicak, ∗

        Add to Reading List

        Source URL: www.eecs.berkeley.edu

        Language: English - Date: 2004-08-20 14:52:12
        UPDATE