Distributed data storage

Results: 2648



#Item
41Gossip-Based Computation of Aggregate Information David Kempe∗, Alin Dobra, and Johannes Gehrke† Department of Computer Science, Cornell University Ithaca, NY 14853, USA {kempe,dobra,johannes}@cs.cornell.edu Abstract

Gossip-Based Computation of Aggregate Information David Kempe∗, Alin Dobra, and Johannes Gehrke† Department of Computer Science, Cornell University Ithaca, NY 14853, USA {kempe,dobra,johannes}@cs.cornell.edu Abstract

Add to Reading List

Source URL: www-bcf.usc.edu

Language: English - Date: 2007-10-12 00:29:55
42Office of Technology Services Network Management Systems Section/Enterprise Network Branch Statewide Telecommunications and Network Division Data Processing Manager III / $7,442 - $8,872 Permanent/Fulltime Final File Dat

Office of Technology Services Network Management Systems Section/Enterprise Network Branch Statewide Telecommunications and Network Division Data Processing Manager III / $7,442 - $8,872 Permanent/Fulltime Final File Dat

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2016-08-03 16:34:57
43Introduction  QUALITY GOL!P2P

Introduction QUALITY GOL!P2P

Add to Reading List

Source URL: goalbit-solutions.com

Language: English - Date: 2016-02-19 12:52:36
44Mysteries of Dropbox Property-Based Testing of a Distributed Synchronization Service John Hughes∗† , Benjamin C. Pierce‡ , Thomas Arts∗ , Ulf Norell∗† , ∗  †

Mysteries of Dropbox Property-Based Testing of a Distributed Synchronization Service John Hughes∗† , Benjamin C. Pierce‡ , Thomas Arts∗ , Ulf Norell∗† , ∗ †

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2016-04-13 12:13:19
45BAR Gossip  Harry C. Li, Allen Clement, Edmund L. Wong, Jeff Napper, Indrajit Roy, Lorenzo Alvisi, Michael Dahlin Dept. of Computer Sciences, The University of Texas at Austin

BAR Gossip Harry C. Li, Allen Clement, Edmund L. Wong, Jeff Napper, Indrajit Roy, Lorenzo Alvisi, Michael Dahlin Dept. of Computer Sciences, The University of Texas at Austin

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2006-05-12 13:37:19
46IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. Y, MONTHScribe: A large-scale and decentralized application-level multicast infrastructure

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. Y, MONTHScribe: A large-scale and decentralized application-level multicast infrastructure

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2002-05-10 11:56:54
47SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: randombits.io

Language: English - Date: 2015-06-29 10:17:00
48Flexible Routing Tables: Designing Routing Algorithms for Overlays Based on a Total Order on a Routing Table Set Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology, Tokyo, Japan Email: {hiroya.nagao, shudo}@is.ti

Flexible Routing Tables: Designing Routing Algorithms for Overlays Based on a Total Order on a Routing Table Set Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology, Tokyo, Japan Email: {hiroya.nagao, shudo}@is.ti

Add to Reading List

Source URL: www.shudo.net

Language: English - Date: 2014-02-11 13:33:22
49Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave∗ Keno Albrecht, Ruedi Arnold, Michael G¨ahwiler, Roger Wattenhofer Swiss Federal Institute of Technology Department of Computer Science 8092

Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave∗ Keno Albrecht, Ruedi Arnold, Michael G¨ahwiler, Roger Wattenhofer Swiss Federal Institute of Technology Department of Computer Science 8092

Add to Reading List

Source URL: ruedi-arnold.com

Language: English - Date: 2011-12-23 03:13:44
50SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40