Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of DHT security techniques
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
Hierarchical architectures in structured peer-to-peer overlay networks
D Korzun, A Gurtov - Peer-to-Peer Networking and Applications, 2014 - Springer
Abstract Distributed Hash Tables (DHT) are presently used in several large-scale systems in
the Internet and envisaged as a key mechanism to provide identifier-locator separation for …
the Internet and envisaged as a key mechanism to provide identifier-locator separation for …
Veracity: Practical Secure Network Coordinates via Vote-based Agreements.
Decentralized network coordinate systems promise efficient network distance estimates
across Internet end-hosts. These systems support a wide range of network services …
across Internet end-hosts. These systems support a wide range of network services …
A multipath routing algorithm based on traffic prediction in wireless mesh networks
L Zhi-yuan, W Ru-chuan… - 2009 Fifth International …, 2009 - ieeexplore.ieee.org
The technology of QoS routing has become a great challenge in wireless mesh networks
(WMNs). There exist a lot of literatures on QoS routing in WMNs, but the current algorithms …
(WMNs). There exist a lot of literatures on QoS routing in WMNs, but the current algorithms …
The effect of replica placement on routing robustness in distributed hash tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer
systems hold each node responsible for serving a specified set of keys and correctly routing …
systems hold each node responsible for serving a specified set of keys and correctly routing …
Generating policies for defense in depth
P Rubel, M Ihde, S Harp… - 21st Annual Computer …, 2005 - ieeexplore.ieee.org
Coordinating multiple overlap** defense mechanisms, at differing levels of abstraction, is
fraught with the potential for misconfiguration, so there is strong motivation to generate …
fraught with the potential for misconfiguration, so there is strong motivation to generate …
Loquendo-Politecnico di Torino's 2008 NIST speaker recognition evaluation system
E Dalmasso, F Castaldo, P Laface… - … on Acoustics, Speech …, 2009 - ieeexplore.ieee.org
This paper describes the improvements introduced in the Loquendo-Politecnico di Torino
(LPT) speaker recognition system submitted to the NIST SRE08 evaluation campaign. This …
(LPT) speaker recognition system submitted to the NIST SRE08 evaluation campaign. This …
Trade-offs in protecting storage: a meta-data comparison of cryptographic, backup/versioning, immutable/tamper-proof, and redundant storage solutions
Modern storage systems are responsible for increasing amounts of data and the value of the
data itself is growing in importance. Several primary storage system solutions have emerged …
data itself is growing in importance. Several primary storage system solutions have emerged …
Replica placement for route diversity in tree-based routing distributed hash tables
Distributed hash tables (DHTs) share storage and routing responsibility among all nodes in
a peer-to-peer network. These networks have bounded path length unlike unstructured …
a peer-to-peer network. These networks have bounded path length unlike unstructured …
Efficient secure message routing for structured peer-to-peer systems
X **ang, T ** - 2009 International Conference on Networks …, 2009 - ieeexplore.ieee.org
In structured P2P systems, peers and keys of content objects are identified using a set of
well defined IDs. Queries are routed towards the target with a certain ID. When one ore more …
well defined IDs. Queries are routed towards the target with a certain ID. When one ore more …