Hash table

Results: 1003



#Item
161Distributed data storage / Distributed hash table / Pastry / Kademlia / Tapestry / Chord / Peer-to-peer / Routing / Tulip Overlay / Koorde

Appears in Proceedings of the USENIX Annual Technical Conference, JuneHandling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz University of California, Berkeley and Intel Research, B

Add to Reading List

Source URL: www.oceanstore.org

Language: English - Date: 2004-05-05 14:04:24
162Distributed data storage / Distributed hash table / Pastry / Peer-to-peer / Distributed computing / Tapestry / Kademlia

F2F: reliable storage in open networks Jinyang Li Frank Dabek UC Berkeley/MIT MIT jinyang, fdabek @csail.mit.edu

Add to Reading List

Source URL: iptps06.cs.ucsb.edu

Language: English - Date: 2006-02-15 01:41:07
163

Ideal Hash Trees Phil Bagwell Hash Trees with nearly ideal characteristics are described. These Hash Trees require no initial root hash table yet are faster and use significantly less space than chained or double hash tr

Add to Reading List

Source URL: idea.popcount.org

Language: English
    164Distributed data storage / Computing / Computer programming / Concurrent computing / Tapestry / Distributed hash table / Chord / Pastry / Routing / Node / Tree / Freenet

    Distributed Object Location in a Dynamic Network Kirsten Hildrum, John D. Kubiatowicz, Satish Rao and Ben Y. Zhao Computer Science Division, University of California at Berkeley hildrum, kubitron, satishr, ravenben@cs

    Add to Reading List

    Source URL: www.oceanstore.org

    Language: English - Date: 2002-07-26 16:46:48
    165Routing / Computer networking / Forwarding plane / Trie / Radix tree / Forwarding information base / Named data networking / Packet forwarding / Forwarding / Hash table / Router / Routing table

    Scalable Name-Based Packet Forwarding: From Millions to Billions Tian Song Haowei Yuan

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:10:42
    166Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Hash function / Hash table / RSA / Crypt / Block cipher / Universal hashing / Scrypt

    STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

    Add to Reading List

    Source URL: www.daemonology.net

    Language: English - Date: 2009-06-11 07:29:01
    167Distributed data storage / Computing / Network architecture / Chord / Distributed computing / Link-state routing protocol / Pastry / Routing / Distributed hash table / Tapestry

    Group Therapy for Systems: Using link attestations to manage failures Michael J. Freedman, Ion Stoica, David Mazi`eres, and Scott Shenker New York University, U.C. Berkeley, and Stanford University Abstract

    Add to Reading List

    Source URL: iptps06.cs.ucsb.edu

    Language: English - Date: 2006-02-15 01:41:06
    168Concurrent computing / Computing / Distributed data storage / Computer programming / PlanetLab / Software testing / Distributed hash table / Distributed computing / Routing / Transmission Control Protocol / Distributed algorithms / Tapestry

    In Proceedings of 15th International World Wide Web Conference, Edinburgh, Scotland, May, WAP5: Black-box Performance Debugging for Wide-Area Systems

    Add to Reading List

    Source URL: piki.org

    Language: English - Date: 2007-05-31 12:01:24
    169Distributed data storage / File sharing / Peer-to-peer / Distributed hash table / Kademlia

    Noname manuscript No. (will be inserted by the editor) Asynchronous Privacy-preserving Iterative Computation on Peer-to-peer Networks J.A.M. Naranjo · L. G. Casado · Márk

    Add to Reading List

    Source URL: www.inf.u-szeged.hu

    Language: English - Date: 2012-08-28 04:30:12
    170

    Implementing a Verified On-Disk Hash Table Stephanie Wang Abstract As more and more software is written every day, so too are bugs. Software verification is a way of using formal

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2015-06-14 19:45:36
      UPDATE