A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling

L Lao, Z Li, S Hou, B **ao, S Guo, Y Yang - ACM Computing Surveys …, 2020 - dl.acm.org
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …

Multithreaded asynchronous graph traversal for in-memory and semi-external memory

R Pearce, M Gokhale, NM Amato - SC'10: Proceedings of the …, 2010 - ieeexplore.ieee.org
Processing large graphs is becoming increasingly important for many domains such as
social networks, bioinformatics, etc. Unfortunately, many algorithms and implementations do …

[BOK][B] Distributed hash table: Theory, platforms and applications

H Zhang, Y Wen, H **e, N Yu - 2013 - Springer
Distributed hash table (DHT) has been playing an important role in distributed systems and
applications, especially in large-scale distributed environments. DHT was introduced to …

Energy consumption model for mobile devices in 3G and WLAN networks

E Harjula, O Kassinen… - 2012 IEEE Consumer …, 2012 - ieeexplore.ieee.org
In this paper, we propose an advanced model, called e-Aware, for estimating how
application layer protocol properties affect the energy consumption of mobile devices …

R5n: Randomized recursive routing for restricted-route networks

NS Evans, C Grothoff - 2011 5th International Conference on …, 2011 - ieeexplore.ieee.org
This paper describes a new secure DHT routing algorithm for open, decentralized P2P
networks operating in a restricted-route environment with malicious participants. We have …

A multi-agent system for minimizing information indeterminacy within information fusion scenarios in peer-to-peer networks with limited resources

H Paggi, J Soriano, JA Lara - Information Sciences, 2018 - Elsevier
Abstract Information fusion (IF) has gained ground in recent years. It is increasingly used in
applications involving networks of heterogeneous elements that communicate with each …

Performance evaluation of structured peer-to-peer overlays for use on mobile networks

F Chowdhury, M Kolberg - 2013 Sixth International Conference …, 2013 - ieeexplore.ieee.org
Peer-to-Peer (P2P) overlay networks are typically deployed on fixed wired networks.
Distributed Hash Table (DHT) based structured P2P overlay networks offer scalability, fault …

[HTML][HTML] A distributed soft sensors model for managing vague and uncertain multimedia communications using information fusion techniques

H Paggi, J Soriano, V Ramperez, R Gutierrez… - Alexandria Engineering …, 2022 - Elsevier
In wireless sensor networks it may occur that values cannot be measured directly by sensors
or are costly. In those scenarios, the use of soft sensors is a promising solution, particularly …

The gnunet system

C Grothoff - 2017 - inria.hal.science
GNUnet is an alternative network stack for building secure, decentralized and privacy-
preserving distributed applications. Our goal is to replace the old insecure Internet protocol …

Evaluation of hierarchical DHTs to mitigate churn effects in mobile networks

JMB Rocamora, JRI Pedrasa - Computer Communications, 2016 - Elsevier
Existing flat peer-to-peer (P2P) systems based on distributed hash tables (DHTs) perform
unsatisfactorily under churn due to their non-hierarchical topology. These flat DHTs (FDHTs) …