咨询与建议

限定检索结果

文献类型

  • 153 篇 会议
  • 128 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 261 篇 工学
    • 219 篇 计算机科学与技术...
    • 92 篇 电气工程
    • 87 篇 信息与通信工程
    • 37 篇 软件工程
    • 13 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
  • 18 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 13 篇 理学
    • 7 篇 数学
    • 3 篇 系统科学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 285 篇 distributed hash...
  • 61 篇 peer-to-peer
  • 18 篇 p2p
  • 15 篇 security
  • 14 篇 chord
  • 13 篇 dht
  • 11 篇 load balancing
  • 11 篇 blockchain
  • 10 篇 overlay network
  • 10 篇 peer-to-peer net...
  • 7 篇 replication
  • 7 篇 routing
  • 7 篇 churn
  • 7 篇 peer-to-peer net...
  • 7 篇 file replication
  • 7 篇 peer-to-peer com...
  • 6 篇 scalability
  • 6 篇 resource discove...
  • 6 篇 load balance
  • 6 篇 cloud computing

机构

  • 7 篇 univ arkansas de...
  • 6 篇 nanjing univ sta...
  • 5 篇 koc univ dept co...
  • 5 篇 wayne state univ...
  • 4 篇 clemson univ dep...
  • 4 篇 univ bologna dep...
  • 3 篇 univ urbino carl...
  • 3 篇 dapperlabs vanco...
  • 3 篇 univ politecn ma...
  • 2 篇 hunan univ sch c...
  • 2 篇 univ stirling co...
  • 2 篇 univ so calif de...
  • 2 篇 univ bologna cir...
  • 2 篇 univ helsinki de...
  • 2 篇 univ lancaster d...
  • 2 篇 suny buffalo dep...
  • 2 篇 univ victoria de...
  • 2 篇 keio univ tokyo ...
  • 2 篇 univ texas dalla...
  • 2 篇 clemson univ hol...

作者

  • 13 篇 shen haiying
  • 5 篇 zichichi mirko
  • 5 篇 ferretti stefano
  • 5 篇 hassanzadeh-naza...
  • 4 篇 chen chyouhwa
  • 4 篇 steiner moritz
  • 4 篇 d'angelo gabriel...
  • 4 篇 ozkasap oznur
  • 4 篇 kolberg mario
  • 4 篇 xu cheng-zhong
  • 3 篇 ylianttila mika
  • 3 篇 tripathy somanat...
  • 3 篇 cholez thibault
  • 3 篇 kassinen otso
  • 3 篇 en-najjary taouf...
  • 3 篇 qiu tongqing
  • 3 篇 koskela timo
  • 3 篇 biersack ernst w...
  • 3 篇 chen guihai
  • 3 篇 rao weixiong

语言

  • 277 篇 英文
  • 4 篇 其他
  • 4 篇 中文
检索条件"主题词=distributed Hash table"
285 条 记 录,以下是191-200 订阅
排序:
SDN: A Service Delivery Network over end-to-end DHT
SDN: A Service Delivery Network over end-to-end DHT
收藏 引用
IEEE Symposium on Web Society, SWS
作者: Pi, Renjie Tong, Junjie Xu, Ke Beijing University of Posts and Telecommunications Beijing China
The CDN (Content Delivery Network) provide access acceleration through nearly static data caching and delivery, but cannot serve non-URL located dynamic data and have HTTP transport limits. We propose a SDN (Service D... 详细信息
来源: 评论
hash-Based distributed Public Key Infrastructure for Ubiquitous Environments
Hash-Based Distributed Public Key Infrastructure for Ubiquit...
收藏 引用
4th International Conference on Complex, Intelligent and Software Intensive Systems (CICIS)
作者: Takeda, Atushi Nakayama, Seiya Kitagata, Gen Chakraborty, Debasish hashimoto, Kazuo Shiratori, Norio Tohoku Bunka Gakuen Univ Dept Intelligent Informat Syst Sendai Miyagi Japan Tohoku Univ Grad Sch Comp Sci Sendai Miyagi Japan Tohoku Univ Res Inst Elect Commun Sendai Miyagi Japan
In ubiquitous environments, there are a huge number of computer nodes which provide a lot of information services via the Internet. Therefore, a secure communication system is required for ubiquitous environments. In ... 详细信息
来源: 评论
DHTrust: A Robust and distributed Reputation System for Trusted Peer-to-Peer Networks
DHTrust: A Robust and Distributed Reputation System for Trus...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM 2010)
作者: Liu, Yaqiong Xue, Weilian Li, Keqiu Chi, Zhongxian Min, Geyong Qu, Wenyu Dalian Univ Technol Sch Comp Sci & Technol Dalian 116024 Peoples R China Liaoning Normal Univ Sch Management Dalian 116029 Peoples R China Univ Bradford Dept Comp Bradford BD7 1DP W Yorkshire England Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China
The anonymity and dynamic characters of Peer-to-Peer (P2P) system makes it an ideal medium for selfish and vicious action. In order to solve this problem, P2P reputation systems are proposed to evaluate the trustworth... 详细信息
来源: 评论
DHT-Based Detection of Node Clone in Wireless Sensor Networks
DHT-Based Detection of Node Clone in Wireless Sensor Network...
收藏 引用
1st International Conference on Ad Hoc Networks (AdHocNets 2009)
作者: Li, Zhijun Gong, Guang Univ Waterloo Waterloo ON N2L 3G1 Canada
Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left unattended. Several distributed protocols have... 详细信息
来源: 评论
A Proposal of P2P Content Retrieval System Using Access-Based Grouping Technique
A Proposal of P2P Content Retrieval System Using Access-Base...
收藏 引用
14th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems
作者: Sasaki, Takuya Sawamoto, Jun Katoh, Takashi Wada, Yuji Segawa, Norihisa Sugino, Eiji Iwate Prefectural Univ Fac Software & Informat Sci Iwate Japan Tokyo Denki Univ Dept Informat Environm Tokyo Japan
In recent years, the diversification and ubiquitousness of information is rapidly advancing due to the development of the information and comm cation technology. As for the usage of the information, the attention of s... 详细信息
来源: 评论
Secure and Robust Overlay Content Distribution
Secure and Robust Overlay Content Distribution
收藏 引用
作者: Kang, Hun Jeong University of Minnesota
学位级别:Ph.D.
With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity... 详细信息
来源: 评论
Resilient and efficient load balancing in distributed hash tables
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2009年 第1期32卷 45-60页
作者: Wu, Di Tian, Ye Ng, Kam-Wing Chinese Univ Hong Kong Dept Comp Sci & Engn Sha Tin Hong Kong Peoples R China
As a fundamental problem in distributed hash table (DHT)-based systems, load balancing is important to avoid performance degradation and guarantee system fairness. Among existing migration-based load balancing strateg... 详细信息
来源: 评论
Improving Community Management Performance with Two-Level Hierarchical DHT Overlays
收藏 引用
JOURNAL OF INTERNET TECHNOLOGY 2010年 第2期11卷 167-179页
作者: Koskela, Timo Kassinen, Otso Ou, Zhonghong Ylianttila, Mika Univ Oulu Elect & Informat Engn Dept Oulu Finland
In this paper, we evaluate a P2P community management system that works on top of a DHT-based P2PSIP protocol implementation. The key idea in our system is to establish a separate DHT overlay network for each communit... 详细信息
来源: 评论
A Network Locality Aware Algorithm Based on Identity Mapping
A Network Locality Aware Algorithm Based on Identity Mapping
收藏 引用
2010 2nd International Conference on Signal Processing System(2010年信号处理系统国际会议 ICSPS 2010)
作者: Jianwei Zhang Xiaosu Zhan Dongyao Zou Si Liu Yunfei Guo National Digital Switching System Engineering and Technology Research Center Zhengzhou Henan. P. R. The Institute of Military Operations Research Chinese Academy of Military Science Beijing P. R. Ch School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou. H National Digital Switching System Engineering and Technology Research Center Zhengzhou Henan. P. R.
Separation of identifier and locator provides good conditions of routing scalability and mobility for Internet routing and lP addressing. Based on the idea of identifier and locator separation, in this paper we i... 详细信息
来源: 评论
Range Queries Based on a Structured Segment Tree in P2P Systems
Range Queries Based on a Structured Segment Tree in P2P Syst...
收藏 引用
Annual IEEE International Conference on Engineering of Computer Based Systems
作者: Ye-In Chang Chen-Chang Wu Jun-Hong Shen Tzu-Lun Huang Dept. of Computer Science and Engineering National Sun Yat-Sen University Dept. of Information Communication Asia University
Range queries will find any data item whose value within the range. The distributed Segment Tree method (DST) is a famous method for range queries in P2P systems. It uses a segment tree to preserve the local continuit... 详细信息
来源: 评论