Sciweavers

648 search results - page 95 / 130
» Authenticated hash tables
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Performance Analysis of Stealth DHT with Mobile Nodes
The advances in wireless networking and the consequent emergence of new applications that wireless networks increasingly support inevitably leads to low capability mobile nodes co...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, La...
ICDCS
2009
IEEE
14 years 4 months ago
m-LIGHT: Indexing Multi-Dimensional Data over DHTs
In this paper, we study the problem of indexing multidimensional data in the P2P networks based on distributed hash tables (DHTs). We identify several design issues and propose a ...
Yuzhe Tang, Jianliang Xu, Shuigeng Zhou, Wang-Chie...
SOSP
2001
ACM
14 years 4 months ago
Wide-Area Cooperative Storage with CFS
The Cooperative File System (CFS) is a new peer-to-peer readonly storage system that provides provable guarantees for the efficiency, robustness, and load-balance of file storag...
Frank Dabek, M. Frans Kaashoek, David R. Karger, R...
ICDCN
2010
Springer
14 years 2 months ago
Poisoning the Kad Network
Abstract. Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed has...
Thomas Locher, David Mysicka, Stefan Schmid, Roger...
TACAS
2009
Springer
89views Algorithms» more  TACAS 2009»
14 years 2 months ago
Hierarchical Adaptive State Space Caching Based on Level Sampling
In the past, several attempts have been made to deal with the state space explosion problem by equipping a depth-first search (DFS) algorithm with a state cache, or by avoiding co...
Radu Mateescu, Anton Wijs