Sciweavers

648 search results - page 96 / 130
» Authenticated hash tables
Sort
View
ICN
2009
Springer
14 years 2 months ago
Distributed Information Object Resolution
The established host-centric networking paradigm is challenged due to handicaps related with disconnected operation, mobility, and broken locator/identifier semantics. This paper...
Kostas Pentikousis
IPSN
2010
Springer
14 years 2 months ago
Covering space for in-network sensor data storage
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...
Rik Sarkar, Wei Zeng, Jie Gao, Xianfeng David Gu
AINA
2008
IEEE
14 years 2 months ago
An Architecture for Mobility Support in a Next-Generation Internet
—The current internetworking architecture presents some limitations to naturally support mobility, security and multihoming. Among the limitations, the IP semantic overload seems...
Walter Wong, Rodolfo Villaca, Luciano Paula, Rafae...
CCGRID
2008
IEEE
14 years 2 months ago
An Autonomic Peer-to-Peer Architecture for Hosting Stateful Web Services
—In this paper we present an autonomic web services architecture that manages both the performance of service containers and the interconnection of those containers into a servic...
Christoph Reich, Kris Bubendorfer, Rajkumar Buyya
P2P
2008
IEEE
14 years 2 months ago
Faster Content Access in KAD
Many different Distributed Hash Tables (DHTs) have been designed, but only few have been successfully deployed. The implementation of a DHT needs to deal with practical aspects (e...
Moritz Steiner, Damiano Carra, Ernst W. Biersack