Sciweavers

447 search results - page 78 / 90
» On the Distribution of Nodes in Distributed Hash Tables
Sort
View
86
Voted
ISPA
2005
Springer
15 years 3 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
67
Voted
PDCAT
2007
Springer
15 years 3 months ago
Optimal Routing in Binomial Graph Networks
A circulant graph with n nodes and jumps j1, j2, ..., jm is a graph in which each node i, 0 ≤ i ≤ n−1, is adjacent to all the vertices i±jk mod n, where 1 ≤ k ≤ m. A bi...
Thara Angskun, George Bosilca, Bradley T. Vander Z...
INFOCOM
2008
IEEE
15 years 3 months ago
Link Lifetimes and Randomized Neighbor Selection in DHTs
—Several models of user churn, resilience, and link lifetime have recently appeared in the literature [12], [13], [34], [35]; however, these results do not directly apply to clas...
Zhongmei Yao, Dmitri Loguinov
ICDCS
2010
IEEE
14 years 8 months ago
'Ethernet on AIR': Scalable Routing in very Large Ethernet-Based Networks
—Networks based on Ethernet bridging scale poorly as bridges flood the entire network repeatedly, and several schemes have been proposed to mitigate this flooding problem; howe...
Dhananjay Sampath, Suchit Agarwal, J. J. Garcia-Lu...
110
Voted
NSDI
2008
14 years 12 months ago
UsenetDHT: A Low-Overhead Design for Usenet
Usenet is a popular distributed messaging and file sharing service: servers in Usenet flood articles over an overlay network to fully replicate articles across all servers. Howeve...
Emil Sit, Robert Morris, M. Frans Kaashoek