Sciweavers

323 search results - page 15 / 65
» Range-capable Distributed Hash Tables
Sort
View
ICMCS
2010
IEEE
178views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Optimal configuration of hash table based multimedia fingerprint databases using weak bits
The increasingly large amount of digital multimedia content has created a need for technologies to search and identify multimedia files. Multimedia fingerprinting has been widely ...
Claus Bauer, Regunathan Radhakrishnan, Wenyu Jiang
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
13 years 10 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
IPTPS
2004
Springer
14 years 1 months ago
UsenetDHT: A Low Overhead Usenet Server
UsenetDHT is a system that reduces the storage and bandwidth resources required to run a Usenet server by spreading the burden of data storage across participants. UsenetDHT distr...
Emil Sit, Frank Dabek, James Robertson
SEMWEB
2004
Springer
14 years 1 months ago
Constructing and Querying Peer-to-Peer Warehouses of XML Resources
We present KADOP, a distributed infrastructure for warehousing XML resources in a peer-to-peer framework. KADOP allows users to build a shared, distributed repository of resources...
Serge Abiteboul, Ioana Manolescu, Nicoleta Preda
NOMS
2008
IEEE
115views Communications» more  NOMS 2008»
14 years 2 months ago
A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks
—We propose a distributed monitoring scheme for an ad-hoc/MESH network topology, and design a Distributed Hash Table based Peer-to-Peer system to log the topology information. A ...
Cristian Popi, Olivier Festor