Skip to main content
    • by 
    •   5  
      Distributed Hash TablePerformance ImprovementPeer to PeerATC
Domus is an architecture for Distributed Hash Tables (DHTs) tailored to a shared-all cluster environment. Domus DHTs build on a (dynamic) set of cluster nodes; each node may perform routing and/or storage tasks, for one or more DHTs, as a... more
    • by  and +1
    •   4  
      EvaluationCluster ComputingDistributed Hash TableFigure of Merit
Over the last decade, storage systems have experienced a 10fold increase between their capacity and bandwidth. This gap is predicted to grow faster with exponentially growing concurrency levels, with future exascales delivering millions... more
    • by 
    •   14  
      MathematicsComputer ScienceDistributed ComputingDistributed Systems
    • by 
    •   13  
      Computer ScienceResilienceProtocolsMathematical Analysis
Elastic distributed storage systems have been increasingly studied in recent years because power consumption has become a major problem in data centers. Much progress has been made in improving the agility of resizing small-and... more
    • by 
    •   8  
      Energy efficiencyCloud ComputingDistributed Hash TableData Center
In the growing trend of globalization, the logistics and transportation play the key role in many industries. Products are shipped from one country to another. The heart of this transportation is the port, where large quantities of goods... more
    • by 
    •   5  
      Fault ToleranceDistributed Hash TableBloom FilterInternet of Things (IoT)
    • by 
    •   9  
      Routing algorithmCollaborative FilteringMathematical SciencesDistributed Hash Table
    • by 
    •   6  
      Hash TableDistributed Hash TableData StructuresHash-Based Algorithm
One of the crucial building blocks for Information Centric Networking (ICN) is a name based routing scheme that can route directly on content names instead of IP addresses. However, moving the address space from IP addresses to content... more
    • by 
    •   3  
      Internet Routing ProtocolDistributed Hash TableInformation Centric Networks
    • by 
    •   5  
      Computer ScienceDistributed ComputingDistributed SystemsDistributed Hash Table
    • by 
    •   5  
      Information SystemsDistributed ComputingVirtual EnvironmentDistributed Hash Table
    • by 
    •   9  
      Distributed ComputingComputer NetworksRouting algorithmProtocols
with the advancement in data storage technology, the cost per gigabyte has reduced significantly, causing users to negligently store redundant files on their system. These may be created while taking manual backups or by improperly... more
    • by  and +2
    •   10  
      Hash FunctionsHash TableDistributed Hash TableSoild waste management, disposal and land filed design
    • by 
    •   8  
      Grid ComputingDistributed Hash TableResource DiscoveryPeer to Peer
systems; it is used in web caching, P2P systems, distributed file systems etc.
First step in understanding DHT is Hash Tables. Hash tables need key, value and a hash function, where hash function maps the
    • by 
    • Distributed Hash Table
    • by 
    •   4  
      Distributed Hash TablePeer-to-Peer SystemsLower BoundDe Bruijn Graph
We are experiencing a revolution in the wireless technology and mobile phone networks as they are becoming increasingly ubiquitous. On the other hand, there is another trend, gaining extreme popularity over the traditional wired Internet:... more
    • by 
    •   20  
      Mobile Ad Hoc NetworksNetwork SecurityPeer-to-PeerWireless networks
    • by 
    •   7  
      Distributed Hash TableRouting ProtocolPeer to PeerSelf Organization
    • by 
    •   7  
      Distributed Hash TableWorld Wide WebPeer to PeerClient Server
    • by 
    •   12  
      Access ControlComputer SecuritySecurity and PrivacyIdentity management
    • by 
    •   8  
      Computer ScienceData StructureDistributed ProcessingDistributed Hash Table
    • by 
    •   6  
      Operating SystemsDistributed Hash TablePeer to PeerStorage system
The evolution of peer-to-peer (P2P) systems triggered the building of large scale distributed applications. The main application domain is data sharing across a very large number of highly autonomous participants. Building such data... more
    • by 
    •   7  
      Data ManagementDistributed SystemQuery OptimizationData Privacy
    • by 
    •   5  
      AnonymityDistributed Hash TableAnonymous CommunicationPeer to Peer
    • by 
    •   4  
      Computer NetworksDistributed Hash TablePeer to PeerPeer-to-Peer Systems
    • by 
    •   34  
      MetadataWireless SystemsData ManagementResource sharing
    • by 
    •   10  
      Applied MathematicsDistributed ComputingNetworkingDistributed Hash Table
Nowadays, the structure of cloud uses the data processing of simple key value, which cannot adapted in search of closeness effectively because of the lack of structures of effective indexes, and with the increase of dimension, the... more
    • by 
    •   6  
      Cloud ComputingVirusHyperbolic GeometryDistributed Hash Table
    • by 
    •   20  
      EngineeringComputer ScienceAlgorithmsInformation Retrieval
    • by 
    •   14  
      Information SecurityPrivacyNetwork SecurityInternet of Things
    • by 
    •   12  
      Computer ScienceInformation RetrievalRoutingFile Systems
    • by 
    •   6  
      Performance AnalysisDistributed Hash TableCost effectivenessPeer to Peer
Information sharing among vehicles is one of the emergent issues in Vehicular Ad Hoc Networks (VANETs). Considering the mobility and limited connectivity of the nodes, designing a secure scalable architecture for information sharing is a... more
    • by 
    •   7  
      Computer ScienceTechnology ManagementMobile ComputingAd Hoc Networks
    • by 
    •   5  
      Routing protocolsPerformance AnalysisDistributed Hash TableHybrid Architecture
    • by 
    •   7  
      Security and PrivacyDistributed Hash TableHot SpotDenial of Service
    • by 
    •   8  
      Trusted ComputingSoftwareDistributed Hash TableApplication Sharing
    • by 
    •   3  
      Mobile Peer-to-Peer NetworkDistributed Hash TableSybil Attack
    • by 
    •   8  
      Information RetrievalCase StudyDistributed Hash TableReal Time
    • by 
    •   12  
      Computer ArchitectureDistributed ComputingRoutingTemporal Data Mining
    • by  and +1
    •   10  
      Mobile Peer-to-Peer NetworkDistributed Hash TableComparative AnalysisPeer to Peer
We introduce a hybrid High Performance Computing (HPC) infrastructure architecture that provides predictable execution of scientific applications, and scales from a single resource to multiple resources, with different ownership, policy,... more
    • by 
    •   11  
      Information SystemsDistributed ComputingGrid ComputingRelational Database
    • by 
    •   15  
      BiosensorsWireless Sensor NetworksRouting protocolsProtocols
We developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. Our approach is scalable, works with local information, and does not rely on address... more
    • by 
    •   13  
      RoutingRouting and SwitchingRouting protocolsVehicle Routing Problems
    • by 
    •   11  
      Structural DynamicsTemporal Data MiningCryptographyIntelligent Transport System
    • by 
    •   11  
      File SharingMobile Peer-to-Peer NetworkDistributed Hash TableSimilarity Search
    • by 
    •   10  
      Distributed ComputingComputer SoftwareDistributed Hash TableLoad Balancing
    • by 
    •   6  
      Data EngineeringStructured dataDistributed Hash TableQuery processing
    • by 
    •   4  
      Distributed Hash TablePerforationPeer-to-Peer SystemsCommunication Cost
    • by 
    •   10  
      Distributed ComputingDistributed SystemFile SharingDistributed Hash Table