Sciweavers

10 search results - page 1 / 2
» Authentication in Stealth Distributed Hash Tables
Sort
View
EUROMICRO
2006
IEEE
13 years 9 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
CONEXT
2006
ACM
13 years 9 months ago
Stealth distributed hash table: a robust and flexible super-peered DHT
Andrew Brampton, Andrew MacQuire, Idris A. Rai, Ni...
CONEXT
2005
ACM
13 years 5 months ago
Stealth distributed hash table: unleashing the real potential of peer-to-peer
Andrew Brampton, Andrew MacQuire, Idris A. Rai, Ni...
IPPS
2007
IEEE
13 years 10 months ago
Performance Modelling of Peer-to-Peer Routing
We propose several models based on discrete-time Markov chains for the analysis of Distributed Hash Tables (DHTs). Specifically, we examine the Pastry routing protocol, as well a...
Idris A. Rai, Andrew Brampton, Andrew MacQuire, La...
PERCOM
2006
ACM
14 years 3 months ago
Performance Analysis of Stealth DHT with Mobile Nodes
The advances in wireless networking and the consequent emergence of new applications that wireless networks increasingly support inevitably leads to low capability mobile nodes co...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, La...