Sciweavers

648 search results - page 102 / 130
» Authenticated hash tables
Sort
View
146
Voted
WETICE
2005
IEEE
15 years 11 months ago
GRACE: Enabling collaborations in wide-area distributed systems
The globalization of businesses and the cooperation between organizations have brought on an ever increased need for providing support for distributed collaborations. In this pape...
Anne-Marie Bosneag, Monica Brockmeyer
SPAA
2005
ACM
15 years 11 months ago
Decentralized algorithms using both local and random probes for P2P load balancing
We study randomized algorithms for placing a sequence of n nodes on a circle with unit perimeter. Nodes divide the circle into disjoint arcs. We desire that a newly-arrived node (...
Krishnaram Kenthapadi, Gurmeet Singh Manku
AP2PC
2005
Springer
15 years 11 months ago
Highly Available DHTs: Keeping Data Consistency After Updates
Abstract. The research in the paper is motivated by building a decentralized/P2P XML storage on top of a DHT (Distributed Hash Table). The storage must provide high data availabili...
Predrag Knezevic, Andreas Wombacher, Thomas Risse
IPTPS
2005
Springer
15 years 11 months ago
OverCite: A Cooperative Digital Research Library
CiteSeer is a well-known online resource for the computer science research community, allowing users to search and browse a large archive of research papers. Unfortunately, its cu...
Jeremy Stribling, Isaac G. Councill, Jinyang Li, M...
MATES
2005
Springer
15 years 10 months ago
Semantic Methods for P2P Query Routing
Knowledge sharing in a virtual organization requires a knowledge life cycle including knowledge provisioning, terminology alignment, determination of resource location, query routi...
Alexander Löser, Steffen Staab, Christoph Tem...