Sciweavers

648 search results - page 15 / 130
» Authenticated hash tables
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
An adaptive stabilization framework for distributed hash tables
Distributed Hash Tables (DHT) algorithms obtain good lookup performance bounds by using deterministic rules to organize peer nodes into an overlay network. To preserve the invaria...
Gabriel Ghinita, Yong Meng Teo
ISLPED
2006
ACM
73views Hardware» more  ISLPED 2006»
14 years 2 months ago
Substituting associative load queue with simple hash tables in out-of-order microprocessors
Buffering more in-flight instructions in an out-of-order microprocessor is a straightforward and effective method to help tolerate the long latencies generally associated with ...
Alok Garg, Fernando Castro, Michael C. Huang, Dani...
EUC
2005
Springer
14 years 2 months ago
Distributed Contextual Information Storage Using Content-Centric Hash Tables
We analyze the problem of storing contextual information across a set of distributed heterogeneous mobile devices. These devices form a Mobile Ad Hoc Network (MANET) interconnected...
Ignacio Nieto-Carvajal, Juan A. Botía, Pedr...
EDBTW
2004
Springer
14 years 2 months ago
A Query-Adaptive Partial Distributed Hash Table for Peer-to-Peer Systems
The two main approaches to find data in peer-to-peer (P2P) systems are unstructured networks using flooding and structured networks using a distributed index. A distributed index i...
Fabius Klemm, Anwitaman Datta, Karl Aberer
PODC
2003
ACM
14 years 2 months ago
Split-ordered lists: lock-free extensible hash tables
We present the first lock-free implementation of an extensible hash table running on current architectures. Our algorithm provides concurrent insert, delete, and find operations ...
Ori Shalev, Nir Shavit