Hash table

Results: 1003



#Item
51RESEARCH REPORT N° 7812 November 2011 Project-Team Leo

RESEARCH REPORT N° 7812 November 2011 Project-Team Leo

Add to Reading List

Source URL: www.user.tu-berlin.de

Language: English - Date: 2016-07-21 07:25:51
52SILT: A Memory-Efficient, High-Performance Key-Value Store

SILT: A Memory-Efficient, High-Performance Key-Value Store

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-11 16:39:03
53Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols Nathan S. Evans Technische Universit¨at M¨unchen, Munich, Germany Email:  Christian Grothoff Technische Universit¨at M¨unchen,

Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols Nathan S. Evans Technische Universit¨at M¨unchen, Munich, Germany Email: Christian Grothoff Technische Universit¨at M¨unchen,

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:24
54Lock-Free Decentralized Storage for Transactional Upgrade Rollback∗ Boris Mej´ıas, Gustavo Guti´errez, Peter Van Roy Universit´e catholique de Louvain   Abstract

Lock-Free Decentralized Storage for Transactional Upgrade Rollback∗ Boris Mej´ıas, Gustavo Guti´errez, Peter Van Roy Universit´e catholique de Louvain Abstract

Add to Reading List

Source URL: www.mancoosi.org

Language: English - Date: 2012-12-16 04:54:55
55The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D. Kamvar Mario T. Schlosser

The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D. Kamvar Mario T. Schlosser

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-11-08 11:14:15
561242  IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,

1242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,

Add to Reading List

Source URL: www.cs.uoi.gr

Language: English - Date: 2006-09-30 04:49:19
57itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-05-17 12:18:49
58One Ring to Rule them All: Service Discovery and Binding in Structured Peer-to-Peer Overlay Networks Miguel Castro Microsoft Research, 7 J J Thomson Close, Cambridge,

One Ring to Rule them All: Service Discovery and Binding in Structured Peer-to-Peer Overlay Networks Miguel Castro Microsoft Research, 7 J J Thomson Close, Cambridge,

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2002-07-13 14:30:05
59Speedy : a Sybil-resistant DHT implementation* anquan Liu, Qian Long, Pratiksha aker, Wenting Zheng May 12, Introduction Distributed hash tables (DHTs) are common services that leverage peer-to-peer (P2P)

Speedy : a Sybil-resistant DHT implementation* anquan Liu, Qian Long, Pratiksha aker, Wenting Zheng May 12, Introduction Distributed hash tables (DHTs) are common services that leverage peer-to-peer (P2P)

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-12-08 14:33:02
60Microsoft Word - NLA-monographdoc

Microsoft Word - NLA-monographdoc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-06-14 11:47:34