ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Embedding network coordinates into the heart of distributed hash tables
2009 IEEE Ninth International Conference on Peer-to-Peer Computing
◽
10.1109/p2p.2009.5284517
◽
2009
◽
Cited By ~ 5
Author(s):
Toshinori Kojima
◽
Masato Asahara
◽
Kenji Kono
◽
Ai Hayakawa
Keyword(s):
Distributed Hash Tables
◽
Hash Tables
◽
Network Coordinates
Download Full-text
Related Documents
Cited By
References
Practical Approach to Integrating Network Coordinates with Distributed Hash Tables
IPSJ Online Transactions
◽
10.2197/ipsjtrans.4.57
◽
2011
◽
Vol 4
◽
pp. 57-72
Author(s):
Toshinori Kojima
◽
Masato Asahara
◽
Kenji Kono
◽
Ai Hayakawa
Keyword(s):
Practical Approach
◽
Distributed Hash Tables
◽
Hash Tables
◽
Network Coordinates
Download Full-text
Topology Proximity and Property-Aware Distributed Hash Tables Based on Network Coordinates
INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences
◽
10.4156/aiss.vol4.issue7.36
◽
2012
◽
Vol 4
(7)
◽
pp. 308-316
Author(s):
Tao Ma
◽
Chunhong Zhang
Keyword(s):
Distributed Hash Tables
◽
Hash Tables
◽
Network Coordinates
Download Full-text
Authentication in Stealth Distributed Hash Tables
32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO'06)
◽
10.1109/euromicro.2006.23
◽
2006
◽
Author(s):
A. MacQuire
◽
A. Brampton
◽
I.A. Rai
◽
N.J.P. Race
◽
L. Mathy
Keyword(s):
Distributed Hash Tables
◽
Hash Tables
Download Full-text
A communication aware load balancing technique for cluster file systems based on distributed hash tables (DHTs)
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
◽
10.1109/icecds.2017.8390136
◽
2017
◽
Author(s):
G. Mounika
◽
G. Murali
Keyword(s):
Load Balancing
◽
File Systems
◽
Distributed Hash Tables
◽
Hash Tables
◽
Cluster File
Download Full-text
On routing in Distributed Hash Tables: Is reputation a shelter from malicious behavior and churn?
2009 IEEE Ninth International Conference on Peer-to-Peer Computing
◽
10.1109/p2p.2009.5284546
◽
2009
◽
Cited By ~ 4
Author(s):
Marc Sanchez-Artigas
◽
Pedro Garcia-Lopez
Keyword(s):
Distributed Hash Tables
◽
Hash Tables
◽
Malicious Behavior
Download Full-text
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007)
◽
10.1109/p2p.2007.4343461
◽
2007
◽
Author(s):
Souvik Ray
◽
Zhao Zhang
Keyword(s):
Distributed Hash Tables
◽
Hash Tables
◽
Information Theoretic
Download Full-text
9. Reliability and Load Balancing in Distributed Hash Tables
Peer-to-Peer Systems and Applications - Lecture Notes in Computer Science
◽
10.1007/11530657_9
◽
2005
◽
pp. 119-135
Author(s):
Simon Rieche
◽
Heiko Niedermayer
◽
Stefan Götz
◽
Klaus Wehrle
Keyword(s):
Load Balancing
◽
Distributed Hash Tables
◽
Hash Tables
Download Full-text
Simple Load Rebalancing For Distributed Hash Tables In Cloud
IOSR Journal of Computer Engineering
◽
10.9790/0661-1326065
◽
2013
◽
Vol 13
(2)
◽
pp. 60-65
Author(s):
Ch Mounika
◽
Keyword(s):
Distributed Hash Tables
◽
Hash Tables
Download Full-text
Towards Distributed Hash Tables (De)Composition in Ambient Networks
Lecture Notes in Computer Science - Large Scale Management of Distributed Systems
◽
10.1007/11907466_24
◽
2006
◽
pp. 258-268
◽
Cited By ~ 8
Author(s):
Lawrence Cheng
◽
Roel Ocampo
◽
Kerry Jean
◽
Alex Galis
◽
Casba Simon
◽
...
Keyword(s):
Distributed Hash Tables
◽
Hash Tables
◽
Ambient Networks
Download Full-text
Processing Top-k Queries in Distributed Hash Tables
Euro-Par 2007 Parallel Processing - Lecture Notes in Computer Science
◽
10.1007/978-3-540-74466-5_53
◽
2007
◽
pp. 489-502
◽
Cited By ~ 22
Author(s):
Reza Akbarinia
◽
Esther Pacitti
◽
Patrick Valduriez
Keyword(s):
Distributed Hash Tables
◽
Hash Tables
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close