Sciweavers

1080 search results - page 168 / 216
» Distributed Hash Tables
Sort
View
141
Voted
NCA
2005
IEEE
15 years 10 months ago
Decentralized Schemes for Size Estimation in Large and Dynamic Groups
Large-scale and dynamically changing distributed systems such as the Grid, peer-to-peer overlays, etc., need to collect several kinds of global statistics in a decentralized manne...
Dionysios Kostoulas, Dimitrios Psaltoulis, Indrani...
DBISP2P
2005
Springer
131views Database» more  DBISP2P 2005»
15 years 10 months ago
Symmetric Replication for Structured Peer-to-Peer Systems
Structured peer-to-peer systems rely on replication as a basic means to provide fault-tolerance in presence of high churn. Most select replicas using either multiple hash functions...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
ICCSA
2005
Springer
15 years 10 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
SC
2004
ACM
15 years 10 months ago
A Self-Organizing Storage Cluster for Parallel Data-Intensive Applications
Cluster-based storage systems are popular for data-intensive applications and it is desirable yet challenging to provide incremental expansion and high availability while achievin...
Hong Tang, Aziz Gulbeden, Jingyu Zhou, William Str...
ARCS
2004
Springer
15 years 10 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva