咨询与建议

限定检索结果

文献类型

  • 153 篇 会议
  • 128 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 261 篇 工学
    • 219 篇 计算机科学与技术...
    • 92 篇 电气工程
    • 87 篇 信息与通信工程
    • 37 篇 软件工程
    • 13 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
  • 18 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 13 篇 理学
    • 7 篇 数学
    • 3 篇 系统科学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 285 篇 distributed hash...
  • 61 篇 peer-to-peer
  • 18 篇 p2p
  • 15 篇 security
  • 14 篇 chord
  • 13 篇 dht
  • 11 篇 load balancing
  • 11 篇 blockchain
  • 10 篇 overlay network
  • 10 篇 peer-to-peer net...
  • 7 篇 replication
  • 7 篇 routing
  • 7 篇 churn
  • 7 篇 peer-to-peer net...
  • 7 篇 file replication
  • 7 篇 peer-to-peer com...
  • 6 篇 scalability
  • 6 篇 resource discove...
  • 6 篇 load balance
  • 6 篇 cloud computing

机构

  • 7 篇 univ arkansas de...
  • 6 篇 nanjing univ sta...
  • 5 篇 koc univ dept co...
  • 5 篇 wayne state univ...
  • 4 篇 clemson univ dep...
  • 4 篇 univ bologna dep...
  • 3 篇 univ urbino carl...
  • 3 篇 dapperlabs vanco...
  • 3 篇 univ politecn ma...
  • 2 篇 hunan univ sch c...
  • 2 篇 univ stirling co...
  • 2 篇 univ so calif de...
  • 2 篇 univ bologna cir...
  • 2 篇 univ helsinki de...
  • 2 篇 univ lancaster d...
  • 2 篇 suny buffalo dep...
  • 2 篇 univ victoria de...
  • 2 篇 keio univ tokyo ...
  • 2 篇 univ texas dalla...
  • 2 篇 clemson univ hol...

作者

  • 13 篇 shen haiying
  • 5 篇 zichichi mirko
  • 5 篇 ferretti stefano
  • 5 篇 hassanzadeh-naza...
  • 4 篇 chen chyouhwa
  • 4 篇 steiner moritz
  • 4 篇 d'angelo gabriel...
  • 4 篇 ozkasap oznur
  • 4 篇 kolberg mario
  • 4 篇 xu cheng-zhong
  • 3 篇 ylianttila mika
  • 3 篇 tripathy somanat...
  • 3 篇 cholez thibault
  • 3 篇 kassinen otso
  • 3 篇 en-najjary taouf...
  • 3 篇 qiu tongqing
  • 3 篇 koskela timo
  • 3 篇 biersack ernst w...
  • 3 篇 chen guihai
  • 3 篇 rao weixiong

语言

  • 277 篇 英文
  • 4 篇 其他
  • 4 篇 中文
检索条件"主题词=distributed Hash table"
285 条 记 录,以下是11-20 订阅
排序:
Research on IPFS Image Copyright Protection Method Based on Blockchain
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 663-684页
作者: Xin Cong Lanjin Feng Lingling Zi College of Computer and Information Science Chongqing Normal UniversityChongqing401331China
In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media *** the advantages of decen... 详细信息
来源: 评论
Securing cloud access with enhanced attribute-based cryptography
收藏 引用
COMPUTING 2024年 第12期106卷 4193-4207页
作者: Kumar, Ashutosh Verma, Garima DIT Univ Sch Comp Comp Sci & Engn Dept Dehra Dun India DIT Univ Sch Comp Dehra Dun India
With technological advancements and increasing globalization, cloud computing has emerged as one of the most favoured environments for managing and maintaining data, information, and services worldwide. However, this ... 详细信息
来源: 评论
HIGH-PERFORMANCE COMPUTING WEB SEARCH SYSTEM BASED ON COMPUTER BIG DATA
收藏 引用
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE 2024年 第3期25卷 1932-1939页
作者: Kang, Yingxi Tang, Beiping Hu, Xiaodong Hunan Inst Engn Xiangtan 411104 Hunan Peoples R China
File sharing, streaming media, collaborative computing, and other P2P systems are all unicast to establish the corresponding overlapping network. The superimposed network is generally carried out based on the existing... 详细信息
来源: 评论
A collaborative ledger storing model for lightweight blockchains based on Chord Ring
收藏 引用
JOURNAL OF SUPERCOMPUTING 2024年 第4期80卷 5593-5615页
作者: Nie, ZiXiang Li, Jin Duan, FengHui Lu, Yueming Beijing Univ Posts & Telecommun Key Lab Trustworthy Distributed Comp & Serv BUPT Minist Educ Beijing 100876 Peoples R China
A blockchain is one distributed ledger system and keeps the high redundancy of ledger copies to make the assurance of network security. However, the continuously duplicated full copies also impose a tremendous amount ... 详细信息
来源: 评论
CCECGP: causal consistency model of edge-cloud collaborative based on grouping protocol
收藏 引用
JOURNAL OF SUPERCOMPUTING 2023年 第8期79卷 8401-8424页
作者: Tian, Junfeng Jia, Haoyi Bai, Wenqing Hebei Univ Sch Cyber Secur & Comp Baoding 071000 Peoples R China Hebei Univ Hebei Key Lab High Confidence Informat Syst Baoding 071000 Peoples R China
At present, most causal consistency models based on cloud storage can no longer meet the needs of delay-sensitive applications. Moreover, the overhead of data synchronization between replicas is too high. This paper p... 详细信息
来源: 评论
An effective approach for reducing data redundancy in multi-agent system communication
收藏 引用
MULTIAGENT AND GRID SYSTEMS 2024年 第1期20卷 69-88页
作者: Qasim, Awais Ghouri, Arslan Munawar, Adeel Govt Coll Univ Lahore Dept Comp Sci Lahore Pakistan Lahore Garrison Univ Dept Comp Sci Lahore Pakistan Thammasat Univ Sirindhorn Int Inst Technol Bangkok Thailand
The redundancy of the data is an active research topic. While an agent works in a multi-agent system, the number of messages between them increases. This is due to the fact that the functionalities data depends on oth... 详细信息
来源: 评论
Peer to peer sybil and eclipse attack detection via fuzzy kademlia
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2023年 第4期44卷 6925-6937页
作者: Geepthi, D. Columbus, C. Christopher Jeyanthi, C. PSN Coll Engn & Technol Dept Comp Sci & Engn Tirunelveli 627152 India PSN Coll Engn & Technol Dept Elect & Commun Engn Tirunelveli India
P2P networks are particularly vulnerable to Sybil and Eclipse attacks, especially those based on distributed hash tables (DHT). However, detecting Sybil and Eclipse attacks is a challenging task, and existing methods ... 详细信息
来源: 评论
Keyword-based multimedia data lookup in decentralized systems  8
Keyword-based multimedia data lookup in decentralized system...
收藏 引用
IEEE 8th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
作者: Fazzini, Emanuele Zichichi, Mirko Ferretti, Stefano D'Angelo, Gabriele Univ Bologna Dept Comp Sci & Engn Bologna Italy IOTA Fdn Rome Italy Univ Urbino Carlo Bo Dept Pure & Appl Sci Urbino PU Italy
The use of decentralized systems has the potential to offer secure and efficient collaboration without intermediaries, and in the absence or fault of a central server. However, searching for content in a decentralized... 详细信息
来源: 评论
Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer  24
Sybil Attack Strikes Again: Denying Content Access in IPFS w...
收藏 引用
19th International Conference on Availability, Reliability, and Security (ARES)
作者: Cholez, Thibault Ignat, Claudia-Lavinia Univ Lorraine CNRS Inria LORIA Nancy France
The distributed hash table (DHT) architecture is known to be a very efficient way to implement peer-to-peer (P2P) computer networks. However, the scientific literature also proved that DHT functioning in P2P networks ... 详细信息
来源: 评论
A Scalable State Sharing Protocol for Low-Resource Validator Nodes in Blockchain Networks  6
A Scalable State Sharing Protocol for Low-Resource Validator...
收藏 引用
6th Conference on Blockchain Research & Applications for Innovative Networks and Services
作者: Hias, Ruben Wang, Weihong Vanhoof, Jan Van Cutsem, Tom Katholieke Univ Leuven Leuven Belgium Katholieke Univ Leuven DistriNet Leuven Belgium
The perpetual growth of data stored on popular blockchains such as Ethereum leads to significant scalability challenges and substantial storage costs for operators of full nodes. Increasing costs may lead to fewer ind... 详细信息
来源: 评论