咨询与建议

限定检索结果

文献类型

  • 153 篇 会议
  • 128 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 261 篇 工学
    • 219 篇 计算机科学与技术...
    • 92 篇 电气工程
    • 87 篇 信息与通信工程
    • 37 篇 软件工程
    • 13 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
  • 18 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 13 篇 理学
    • 7 篇 数学
    • 3 篇 系统科学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 285 篇 distributed hash...
  • 61 篇 peer-to-peer
  • 18 篇 p2p
  • 15 篇 security
  • 14 篇 chord
  • 13 篇 dht
  • 11 篇 load balancing
  • 11 篇 blockchain
  • 10 篇 overlay network
  • 10 篇 peer-to-peer net...
  • 7 篇 replication
  • 7 篇 routing
  • 7 篇 churn
  • 7 篇 peer-to-peer net...
  • 7 篇 file replication
  • 7 篇 peer-to-peer com...
  • 6 篇 scalability
  • 6 篇 resource discove...
  • 6 篇 load balance
  • 6 篇 cloud computing

机构

  • 7 篇 univ arkansas de...
  • 6 篇 nanjing univ sta...
  • 5 篇 koc univ dept co...
  • 5 篇 wayne state univ...
  • 4 篇 clemson univ dep...
  • 4 篇 univ bologna dep...
  • 3 篇 univ urbino carl...
  • 3 篇 dapperlabs vanco...
  • 3 篇 univ politecn ma...
  • 2 篇 hunan univ sch c...
  • 2 篇 univ stirling co...
  • 2 篇 univ so calif de...
  • 2 篇 univ bologna cir...
  • 2 篇 univ helsinki de...
  • 2 篇 univ lancaster d...
  • 2 篇 suny buffalo dep...
  • 2 篇 univ victoria de...
  • 2 篇 keio univ tokyo ...
  • 2 篇 univ texas dalla...
  • 2 篇 clemson univ hol...

作者

  • 13 篇 shen haiying
  • 5 篇 zichichi mirko
  • 5 篇 ferretti stefano
  • 5 篇 hassanzadeh-naza...
  • 4 篇 chen chyouhwa
  • 4 篇 steiner moritz
  • 4 篇 d'angelo gabriel...
  • 4 篇 ozkasap oznur
  • 4 篇 kolberg mario
  • 4 篇 xu cheng-zhong
  • 3 篇 ylianttila mika
  • 3 篇 tripathy somanat...
  • 3 篇 cholez thibault
  • 3 篇 kassinen otso
  • 3 篇 en-najjary taouf...
  • 3 篇 qiu tongqing
  • 3 篇 koskela timo
  • 3 篇 biersack ernst w...
  • 3 篇 chen guihai
  • 3 篇 rao weixiong

语言

  • 277 篇 英文
  • 4 篇 其他
  • 4 篇 中文
检索条件"主题词=distributed Hash table"
285 条 记 录,以下是81-90 订阅
排序:
Motion-MiX DHT for Wireless Mobile Networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2016年 第12期15卷 3100-3113页
作者: Shin, Seungjae Lee, Uichin Dressler, Falko Yoon, Hyunsoo Korea Adv Inst Sci & Technol Sch Comp Daejeon 305338 South Korea Korea Adv Inst Sci & Technol Dept Knowledge Serv Engn Daejeon 305338 South Korea Univ Paderborn Dept Comp Sci Paderborn Germany
Last encounter routing (LER) is an excellent routing paradigm that exploits distributed mobility diffusion to achieve both moving object tracking and packet networking services in dynamic mobile networks. From our obs... 详细信息
来源: 评论
A survey of DHT solutions in fixed and mobile networks
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND distributed SYSTEMS 2016年 第1期17卷 14-42页
作者: Cherbal, Sarra Boukerram, Abdellah Boubetra, Abdelhak Bordj Bou Arrerij Univ Dept Comp Sci Bordj Bou Arrerij 34000 Algeria Bejaia Univ Dept Comp Sci Bejaia 06000 Algeria
Peer-to-peer (P2P) networks had experienced a great acceptance in recent years in the area of distributed computing, mainly attributed to their inherent management of some interests such as scaling, dynamic nature and... 详细信息
来源: 评论
Template-Based Migration Between Data Centers Using distributed hash tables  12
Template-Based Migration Between Data Centers Using Distribu...
收藏 引用
12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Zheng, Mian Hu, Xiaohui Chinese Acad Sci Inst Software Sci & Tech Integrated Info Syst Lab Beijing 100190 Peoples R China
Template-based migration between data centers (TM) refers to the inter-data center virtual machines (VMs) live migration with the template-based memory deduplication method. TM achieves significant migration performan... 详细信息
来源: 评论
Bringing secure Bitcoin transactions to your smartphone  15
Bringing secure Bitcoin transactions to your smartphone
收藏 引用
15th Workshop on Adaptive and Reflective Middleware (ARM)
作者: Frey, Davide Makkes, Marc X. Roman, Pierre-Louis Taiani, Francois Voulgaris, Spyros Inria Rennes Rennes France Vrije Univ Amsterdam Amsterdam Netherlands Univ Rennes 1 IRISA ESIR Rennes France
To preserve the Bitcoin ledger's integrity, a node that joins the system must download a full copy of the entire Bitcoin blockchain if it wants to verify newly created blocks. At the time of writing, the blockchai... 详细信息
来源: 评论
Latency and Routing Efficiency Based Metric for Performance Comparison of DHT Overlay Networks  30
Latency and Routing Efficiency Based Metric for Performance ...
收藏 引用
30th IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA)
作者: Varyani, Nitin Nikhil, S. Shekhawat, Virendra S. BITS Pilani Comp Sci & Informat Syst Pilani Rajasthan India
The general method available for comparison between the distributed hash table (DHT) based structured overlay networks are average latency per successful lookup and percentage of successful lookups. For a DHT based lo... 详细信息
来源: 评论
Surveying Indexing Methods for the Internet of Things  2nd
Surveying Indexing Methods for the Internet of Things
收藏 引用
2nd International Summit on Internet of Things - IoT Infrastructures( IoT 360)
作者: Kardeby, Victor Jennehag, Ulf Gidlund, Mikael Mid Sweden Univ Dept Informat & Commun Syst S-85170 Sundsvall Sweden
The Internet of Things is expected to expand several magnitudes in the coming decade surpassing over 50 billion devices. In the Internet of Things there is a need to support complex queries on the massive amount of in... 详细信息
来源: 评论
An Innovative Performance Analysis of Multi Attribute DHT Queries in Resource Discovery by H-LORM Techniques  1
An Innovative Performance Analysis of Multi Attribute DHT Qu...
收藏 引用
1st International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS)
作者: Sathyalakshmi, K. Fernandez, M. George Kings Coll Engn Dept Informat Technol Pudukkottai Tamil Nadu India St Josephs Coll Engn & Technol Dept Comp Sci Engn Thanjavur Tamil Nadu India
Resource discovery is critical to the usability and accessibility of grid computing systems. distributed hash table (DHT) has been applied to grid systems as a distributed mechanism for providing scalable range-query ... 详细信息
来源: 评论
BPPGD: Budgeted Parallel Primal grAdient desCent Kernel SVM on Spark  1
BPPGD: Budgeted Parallel Primal grAdient desCent Kernel SVM ...
收藏 引用
1st IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Sai, Jinchen Wang, Bai Wu, Bin Beijing Univ Posts & Telecommun Beijing Key Lab Intelligent Telecommun Software & Beijing Peoples R China
Stochastic Gradient Descent (SGD) is the best known method to optimize the primal objective for linear support vector machines (SVM) to dispose large data. However, when equipped with kernel functions, SGD performance... 详细信息
来源: 评论
Building Robust distributed Infrastructure Networks
Building Robust Distributed Infrastructure Networks
收藏 引用
作者: Brendan Benshoof Georgia State University
学位级别:博士
Many competing designs for distributed hash tables exist exploring multiple models of addressing, routing and network maintenance. Designing a general theoretical model and implementation of a distributed hash table a... 详细信息
来源: 评论
LDEPTH: A Low Diameter Hierarchical P2P Network Architecture  14
LDEPTH: A Low Diameter Hierarchical P2P Network Architecture
收藏 引用
14th IEEE International Conference on Industrial Informatics (INDIN)
作者: Rahimi, Nick Sinha, Koushik Gupta, Bidyut Rahimi, Shahram Debnath, Narayan C. Southern Illinois Univ Dept Comp Sci Carbondale IL 62901 USA Winona State Univ Dept Comp Sci Winona MN USA
In this paper, we present a new approach to designing a scalable, hierarchical overlay P2P system which provides highly efficient data lookup operations as well fault tolerance. Instead of using a distributed hash tab... 详细信息
来源: 评论