咨询与建议

限定检索结果

文献类型

  • 153 篇 会议
  • 128 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 261 篇 工学
    • 219 篇 计算机科学与技术...
    • 92 篇 电气工程
    • 87 篇 信息与通信工程
    • 37 篇 软件工程
    • 13 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
  • 18 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 13 篇 理学
    • 7 篇 数学
    • 3 篇 系统科学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 285 篇 distributed hash...
  • 61 篇 peer-to-peer
  • 18 篇 p2p
  • 15 篇 security
  • 14 篇 chord
  • 13 篇 dht
  • 11 篇 load balancing
  • 11 篇 blockchain
  • 10 篇 overlay network
  • 10 篇 peer-to-peer net...
  • 7 篇 replication
  • 7 篇 routing
  • 7 篇 churn
  • 7 篇 peer-to-peer net...
  • 7 篇 file replication
  • 7 篇 peer-to-peer com...
  • 6 篇 scalability
  • 6 篇 resource discove...
  • 6 篇 load balance
  • 6 篇 cloud computing

机构

  • 7 篇 univ arkansas de...
  • 6 篇 nanjing univ sta...
  • 5 篇 koc univ dept co...
  • 5 篇 wayne state univ...
  • 4 篇 clemson univ dep...
  • 4 篇 univ bologna dep...
  • 3 篇 univ urbino carl...
  • 3 篇 dapperlabs vanco...
  • 3 篇 univ politecn ma...
  • 2 篇 hunan univ sch c...
  • 2 篇 univ stirling co...
  • 2 篇 univ so calif de...
  • 2 篇 univ bologna cir...
  • 2 篇 univ helsinki de...
  • 2 篇 univ lancaster d...
  • 2 篇 suny buffalo dep...
  • 2 篇 univ victoria de...
  • 2 篇 keio univ tokyo ...
  • 2 篇 univ texas dalla...
  • 2 篇 clemson univ hol...

作者

  • 13 篇 shen haiying
  • 5 篇 zichichi mirko
  • 5 篇 ferretti stefano
  • 5 篇 hassanzadeh-naza...
  • 4 篇 chen chyouhwa
  • 4 篇 steiner moritz
  • 4 篇 d'angelo gabriel...
  • 4 篇 ozkasap oznur
  • 4 篇 kolberg mario
  • 4 篇 xu cheng-zhong
  • 3 篇 ylianttila mika
  • 3 篇 tripathy somanat...
  • 3 篇 cholez thibault
  • 3 篇 kassinen otso
  • 3 篇 en-najjary taouf...
  • 3 篇 qiu tongqing
  • 3 篇 koskela timo
  • 3 篇 biersack ernst w...
  • 3 篇 chen guihai
  • 3 篇 rao weixiong

语言

  • 277 篇 英文
  • 4 篇 其他
  • 4 篇 中文
检索条件"主题词=distributed Hash table"
285 条 记 录,以下是41-50 订阅
排序:
Applying Trust and Reputation Mechanisms to a Kademlia-Based distributed hash table
Applying Trust and Reputation Mechanisms to a Kademlia-Based...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Kohnen, Michael Univ Duisburg Essen Comp Networking Technol Grp Essen Germany
Trust and reputation management in peer-to-peer (P2P) networks is a current topic. Most of the works focus on unstructured networks. The existing work operating in structured networks concentrates on a "clean rou... 详细信息
来源: 评论
Decentralized Metadata Management Research Based On distributed hash table Technology
Decentralized Metadata Management Research Based On Distribu...
收藏 引用
International Conference on Industrial Control and Electronics Engineering (ICICEE)
作者: Wang Dandong Fang Yu SW Petr Univ Sch Comp Sci Chengdu Sichuan Peoples R China
A methodology of decentralized metadata management has been proposed within this paper that data and metadata from server-side can be distributed to the various network nodes. This methodology supports large capacity ... 详细信息
来源: 评论
Peer-to-peer Autonomous Agent Communication Network  21
Peer-to-peer Autonomous Agent Communication Network
收藏 引用
International Conference on Autonomous Agents and Multiagent Systems
作者: Lokman Rahmani David Minarsch Jonathan Ward Fetch.ai
Reliable and secure communication between heterogeneously resourced autonomous agents controlled by competing stakeholders in a decentralized environment is a challenge. Agents require a means to find each other and c... 详细信息
来源: 评论
A scalable multiagent architecture for monitoring IoT devices
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2019年 139卷 1-14页
作者: Rocha, Vladimir Franco Brandao, Anarosa Alves Fed Univ ABC Ctr Math Computat & Cognit Santo Andre Brazil Univ Sao Paulo Escola Politecn Sao Paulo Brazil
In recent years, the use of wireless devices has experienced huge grown, mainly due to the decrease in cost, size and energy consumption. Research in the Internet of Things have concentrated their efforts on how to mo... 详细信息
来源: 评论
Proposal of e-Learning System integrated P2P Model with Client-Server Model  18
Proposal of e-Learning System integrated P2P Model with Clie...
收藏 引用
18th Annual International Conference on Electronics, Information, and Communication (ICEIC)
作者: Kawato, Toshiya Higashino, Masayuki Takahashi, Kenichi Kawamura, Takao Tottori Univ Tottori Japan Yonago Coll Natl Inst Technol Yonago Tottori Japan
E-Learning systems that enable learners to study by themselves without a teacher have widely deployed in universities, high schools and companies. Almost their systems are implemented in a client-server model. The cli... 详细信息
来源: 评论
distributed Data Validation for a Key-value Store in a Decentralized Electric Vehicle Charging Network  11
Distributed Data Validation for a Key-value Store in a Decen...
收藏 引用
11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management / 11th International Conference on Knowledge Management and Information Systems (KMIS)
作者: Kirpes, Benedikt Roon, Micha Burgahn, Christopher Univ Mannheim Mannheim Germany Share & Charge Fdn Zug Switzerland
The mobility sector experiences a fundamental shift to more connected, autonomous, shared and electric means of transportation. For an electric mobility system to function, an efficient and reliable electric vehicle c... 详细信息
来源: 评论
Self-emerging Data Infrastructures  5
Self-emerging Data Infrastructures
收藏 引用
IEEE 5th International Conference on Collaboration and Internet Computing (CIC)
作者: Palanisamy, Balaji Li, Chao Univ Pittsburgh Sch Comp & Informat Pittsburgh PA 15260 USA Beijing Jiaotong Univ Beijing Key Lab Secur & Privacy Intelligent Trans Beijing Peoples R China
Timed release of data is an important security primitive for various applications. Such timed data release can be supported using a self-emerging data infrastructure that protects the data until a prescribed data rele... 详细信息
来源: 评论
STAKECUBE: Combining Sharding and Proof-of-Stake to Build Fork-Free Secure Permissionless distributed Ledgers  7th
STAKECUBE: Combining Sharding and Proof-of-Stake to Build Fo...
收藏 引用
7th International Conference on Networked Systems (NETYS)
作者: Durand, Antoine Anceaume, Emmanuelle Ludinard, Romaric Paris Saclay IRT Syst X Paris France Univ Rennes CNRS Inria IRISA Rennes France IMT Atlantique IRISA Nantes France
Our work focuses on the design of a scalable permission-less blockchain in the proof-of-stake setting. In particular, we use a distributed hash table as a building block to set up randomized shards, and then leverage ... 详细信息
来源: 评论
A Consistent Replica Selection Approach for distributed Key-Value Storage System
A Consistent Replica Selection Approach for Distributed Key-...
收藏 引用
International Conference on Advanced Information Technologies (ICAIT)
作者: Nwe, Thazin Yee, Tin Tin Htoon, Ei Chaw Nakamura, Junya Univ Informat Technol Yangon Myanmar Toyohashi Univ Technol Toyohashi Aichi Japan
When the amount of data is increasing, most of the distributed key-value storage systems use the quorum based consistent replica selection algorithms for fault-tolerance and load balancing. These algorithms allow high... 详细信息
来源: 评论
Decentralized and locality aware replication method for DHT-based P2P storage systems
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2018年 84卷 32-46页
作者: Hassanzadeh-Nazarabadi, Yahya Kupcu, Alptekin Ozkasap, Oznur Koc Univ Dept Comp Engn Istanbul Turkey
Skip Graph, a type of DHT, plays an important role in P2P cloud storage applications, where nodes publicly or privately store, share, and access data. Nowadays P2P storage systems are widely using replication to suppo... 详细信息
来源: 评论