Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
This paper describes the design and implementation of an embedded-type XML storage and retrieval system which is built on top of relational databases. The proposed system stores ea...
The aim of this study is to design a controller based on model predictive control (MPC) theory to smooth wind power generation along with the controlled storage of the wind energy ...
Current trends in increasing storage capacity and virtualization of resources combined with the need for energy efficiency put a challenging task in front of system designers. Pre...
Lei Ye, Gen Lu, Sushanth Kumar, Chris Gniady, John...