Sciweavers

648 search results - page 21 / 130
» Authenticated hash tables
Sort
View
CONEXT
2005
ACM
13 years 10 months ago
Stealth distributed hash table: unleashing the real potential of peer-to-peer
Andrew Brampton, Andrew MacQuire, Idris A. Rai, Ni...
ICMCS
2010
IEEE
178views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Optimal configuration of hash table based multimedia fingerprint databases using weak bits
The increasingly large amount of digital multimedia content has created a need for technologies to search and identify multimedia files. Multimedia fingerprinting has been widely ...
Claus Bauer, Regunathan Radhakrishnan, Wenyu Jiang
COMCOM
2008
81views more  COMCOM 2008»
13 years 8 months ago
Scalable blind search and broadcasting over Distributed Hash Tables
Vladimir Vishnevsky, Alexander Safonov, Mikhail Ya...
SIGOPS
2010
71views more  SIGOPS 2010»
13 years 7 months ago
Scalable concurrent hash tables via relativistic programming
Josh Triplett, Paul E. McKenney, Jonathan Walpole