[BOOK][B] Microwaves and metals
M Gupta, EWW Leong - 2008 - books.google.com
Using microwaves to treat metal-based materials is rapidly emerging as an energy-efficient
tool to interact with metals for a number of processes such as sintering, melting, brazing …
tool to interact with metals for a number of processes such as sintering, melting, brazing …
[HTML][HTML] Survey of research towards robust peer-to-peer networks: Search methods
J Risson, T Moors - 2007 - rfc-editor.org
RFC 4981: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …
Novel architectures for P2P applications: the continuous-discrete approach
We propose a new approach for constructing P2P networks based on a dynamic
decomposition of a continuous space into cells corresponding to servers. We demonstrate …
decomposition of a continuous space into cells corresponding to servers. We demonstrate …
Load rebalancing for distributed file systems in clouds
HC Hsiao, HY Chung, H Shen… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Distributed file systems are key building blocks for cloud computing applications based on
the MapReduce programming paradigm. In such file systems, nodes simultaneously serve …
the MapReduce programming paradigm. In such file systems, nodes simultaneously serve …
[BOOK][B] Peer-to-peer computing: Principles and applications
Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a
potential technology for redesigning distributed architectures and, consequently, distributed …
potential technology for redesigning distributed architectures and, consequently, distributed …
Computational puzzles as sybil defenses
N Borisov - Sixth IEEE International Conference on Peer-to …, 2006 - ieeexplore.ieee.org
We consider the problem of defending against Sybil attacks using computational puzzles. A
fundamental difficulty in such defenses is enforcing that puzzle solutions not be reused by …
fundamental difficulty in such defenses is enforcing that puzzle solutions not be reused by …
Heterogeneity and load balance in distributed hash tables
Existing solutions to balance load in DHTs incur a high overhead either in terms of routing
state or in terms of load movement generated by nodes arriving or departing the system. In …
state or in terms of load movement generated by nodes arriving or departing the system. In …
Consistent hashing with bounded loads
In dynamic load balancing, we wish to allocate a set of clients (balls) to a set of servers
(bins) with the goal of minimizing the maximum load of any server and also minimizing the …
(bins) with the goal of minimizing the maximum load of any server and also minimizing the …
Establishing and protecting digital identity in federation systems
A Bhargav-Spantzel, AC Squicciarini… - Proceedings of the 2005 …, 2005 - dl.acm.org
We develop solutions for the security and privacy of user identity information in a federation.
By federation we mean a group of organizations or service providers which have built trust …
By federation we mean a group of organizations or service providers which have built trust …
Distributed, secure load balancing with skew, heterogeneity and churn
J Ledlie, M Seltzer - … IEEE 24th Annual Joint Conference of the …, 2005 - ieeexplore.ieee.org
Numerous proposals exist for load balancing in peer-to-peer (p2p) networks. Some focus on
namespace balancing, making the distance between nodes as uniform as possible. This …
namespace balancing, making the distance between nodes as uniform as possible. This …