Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
Multithreaded asynchronous graph traversal for in-memory and semi-external memory
Processing large graphs is becoming increasingly important for many domains such as
social networks, bioinformatics, etc. Unfortunately, many algorithms and implementations do …
social networks, bioinformatics, etc. Unfortunately, many algorithms and implementations do …
[BOK][B] Distributed hash table: Theory, platforms and applications
Distributed hash table (DHT) has been playing an important role in distributed systems and
applications, especially in large-scale distributed environments. DHT was introduced to …
applications, especially in large-scale distributed environments. DHT was introduced to …
Energy consumption model for mobile devices in 3G and WLAN networks
E Harjula, O Kassinen… - 2012 IEEE Consumer …, 2012 - ieeexplore.ieee.org
In this paper, we propose an advanced model, called e-Aware, for estimating how
application layer protocol properties affect the energy consumption of mobile devices …
application layer protocol properties affect the energy consumption of mobile devices …
R5n: Randomized recursive routing for restricted-route networks
This paper describes a new secure DHT routing algorithm for open, decentralized P2P
networks operating in a restricted-route environment with malicious participants. We have …
networks operating in a restricted-route environment with malicious participants. We have …
A multi-agent system for minimizing information indeterminacy within information fusion scenarios in peer-to-peer networks with limited resources
Abstract Information fusion (IF) has gained ground in recent years. It is increasingly used in
applications involving networks of heterogeneous elements that communicate with each …
applications involving networks of heterogeneous elements that communicate with each …
Performance evaluation of structured peer-to-peer overlays for use on mobile networks
Peer-to-Peer (P2P) overlay networks are typically deployed on fixed wired networks.
Distributed Hash Table (DHT) based structured P2P overlay networks offer scalability, fault …
Distributed Hash Table (DHT) based structured P2P overlay networks offer scalability, fault …
[HTML][HTML] A distributed soft sensors model for managing vague and uncertain multimedia communications using information fusion techniques
In wireless sensor networks it may occur that values cannot be measured directly by sensors
or are costly. In those scenarios, the use of soft sensors is a promising solution, particularly …
or are costly. In those scenarios, the use of soft sensors is a promising solution, particularly …
The gnunet system
C Grothoff - 2017 - inria.hal.science
GNUnet is an alternative network stack for building secure, decentralized and privacy-
preserving distributed applications. Our goal is to replace the old insecure Internet protocol …
preserving distributed applications. Our goal is to replace the old insecure Internet protocol …
Evaluation of hierarchical DHTs to mitigate churn effects in mobile networks
Existing flat peer-to-peer (P2P) systems based on distributed hash tables (DHTs) perform
unsatisfactorily under churn due to their non-hierarchical topology. These flat DHTs (FDHTs) …
unsatisfactorily under churn due to their non-hierarchical topology. These flat DHTs (FDHTs) …