Distributed hash table

Results: 521



#Item
171Data management / File sharing networks / Peer-to-peer / Distributed hash table / Query flooding / Scalability / Wireless sensor network / Network topology / Database / Computing / Database management systems / Concurrent computing

DOC Document

Add to Reading List

Source URL: infolab.usc.edu

Language: English - Date: 2009-11-05 01:09:04
172Information technology management / Query optimizer / Distributed hash table / Peer-to-peer / Database / Relational model / Scalability / Query language / Relational database / Data management / Computing / Database management systems

PDF Document

Add to Reading List

Source URL: hannes.muehleisen.org

Language: English - Date: 2011-06-07 05:44:12
173Distributed computing / File sharing networks / File sharing / Information retrieval / Peer-to-peer computing / Peer-to-peer / JXTA / Distributed hash table / Cluster analysis / Computing / Concurrent computing / Distributed data storage

PDF Document

Add to Reading List

Source URL: www.dcs.gla.ac.uk

Language: English - Date: 2008-01-05 07:30:25
174Concurrent computing / Internet privacy / Cross-platform software / Cryptographic software / Distributed hash table / File sharing / Chord / Peer-to-peer / Anonymity / Software / Computing / Distributed data storage

Improving Sender Anonymity in a Structured Overlay with Imprecise Routing ? Giuseppe Ciaccio DISI, Universit` a di Genova via Dodecaneso 35, 16146 Genova, Italy

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2006-08-11 05:24:46
175Distributed hash table / Chord / Peer-to-peer / Hash table / Prefix hash tree / Lookup table / PlanetLab / Trie / Kademlia / Distributed data storage / Computing / Computer programming

OpenDHT: A Public DHT Service and Its Uses Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu UC Berkeley and Intel Research

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2005-06-20 16:13:06
176Distributed computing / Distributed hash table / Peer-to-peer / Tapestry / Chord / Koorde / Kademlia / Social peer-to-peer processes / Pastry / Distributed data storage / Concurrent computing / Computing

152 Chapter 14 Peer-to-Peer Computing “Indeed, I believe that virtually every important aspect of

Add to Reading List

Source URL: dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:47
177Distributed computing / Peer-to-peer / Chord / Distributed hash table / P-Grid / Pastry / Scalability / Gnutella / Hash list / Distributed data storage / Concurrent computing / Computing

The MINERVA∗ Project: Database Selection in the Context of P2P Search Matthias Bender, Sebastian Michel, Gerhard Weikum, Christian Zimmer {mbender, smichel, weikum, czimmer}@mpi-sb.mpg.de Max-Planck-Institut f¨ur Info

Add to Reading List

Source URL: subs.emis.de

Language: English - Date: 2013-10-04 10:30:31
178Kademlia / Pastry / Peer-to-peer / Tapestry / Chord / Coral Content Distribution Network / Gnutella / Tulip Overlay / Koorde / Distributed data storage / Computing / Distributed hash table

Sloppy hashing and self-organizing clusters Michael J. Freedman and David Mazi`eres NYU Dept of Computer Science {mfreed,dm}@cs.nyu.edu http://www.scs.cs.nyu.edu/coral/ Abstract

Add to Reading List

Source URL: coralcdn.org

Language: English - Date: 2003-02-09 22:19:00
179Fault-tolerant computer systems / Distributed data storage / Distributed computing architecture / PlanetLab / Software testing / Peer-to-peer / Amazon Elastic Compute Cloud / Replication / Distributed hash table / Cloud computing / Computing / Centralized computing

Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs Amre Shakimov Alexander Varshavsky

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2009-07-22 15:10:52
180Peer-to-peer / Computer security / Distributed hash table / Johann Jakob Heckel / Malware / Kademlia / Blacklist / Mannheim / Hash table / Distributed data storage / File sharing networks / Computing

Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia Philipp C. Heckel, University of Mannheim,

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:52:55
UPDATE