Sciweavers

1080 search results - page 32 / 216
» Distributed Hash Tables
Sort
View
DIM
2005
ACM
15 years 4 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
ICALP
1994
Springer
15 years 6 months ago
Simple Fast Parallel Hashing
A hash table is a representation of a set in a linear size data structure that supports constanttime membership queries. We show how to construct a hash table for any given set of...
Joseph Gil, Yossi Matias
127
Voted
ISCA
2010
IEEE
214views Hardware» more  ISCA 2010»
15 years 4 months ago
Translation caching: skip, don't walk (the page table)
This paper explores the design space of MMU caches that accelerate virtual-to-physical address translation in processor architectures, such as x86-64, that use a radix tree page t...
Thomas W. Barr, Alan L. Cox, Scott Rixner
AINA
2004
IEEE
15 years 6 months ago
A Small IP Forwarding Table Using Hashing
As the demand for high bandwidth on the Internet increases, it is required to build next generation routers with the capability of forwarding multiple millions of packets per secon...
Yeim-Kuan Chang, Wen-Hsin Cheng
99
Voted
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 2 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg