Sciweavers

329 search results - page 12 / 66
» The Dangers of Replication and a Solution
Sort
View
IEEEARES
2006
IEEE
15 years 5 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
ICNP
2002
IEEE
15 years 4 months ago
Optimal Stream Replication for Video Simulcasting
Abstract—Video simulcasting enables a sender to generate replicated streams of different rates, serving receivers of diverse access bandwidths. As replication introduces noticeab...
Jiangchuan Liu, Bo Li
JNW
2006
145views more  JNW 2006»
14 years 11 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
SSS
2009
Springer
144views Control Systems» more  SSS 2009»
15 years 6 months ago
Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-Tables
Abstract. DHT-based P2P systems provide a fault-tolerant and scalable mean to store data blocks in a fully distributed way. Unfortunately, recent studies have shown that if connect...
Sergey Legtchenko, Sébastien Monnet, Pierre...
IEEEARES
2006
IEEE
15 years 5 months ago
Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks
Mobile ad-hoc networks with their arbitrary topologies are a difficult domain for providing highly available Web services. Since hosts can move unpredictably, finding services a...
Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustd...