A survey of DHT security techniques

G Urdaneta, G Pierre, MV Steen - ACM Computing Surveys (CSUR), 2011 - dl.acm.org
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …

[LIBRO][B] Distributed systems

AS Tanenbaum, M Van Steen - 2017 - academia.edu
Distributed Systems Page 1 DS 2006; Ch1 16-Jan-06 Timo Alanko, 2006 1 Distributed
Systems Spring 2006 Timo Alanko 16-Jan-06 2 Sources of material • Tanenbaum, van …

Branch replication scheme: A new model for data replication in large scale data grids

JM Pérez, F García-Carballeira, J Carretero… - Future Generation …, 2010 - Elsevier
Data replication is a practical and effective method to achieve efficient and fault-tolerant data
access in grids. Traditionally, data replication schemes maintain an entire replica in each …

Analysis of a consensus protocol for extending consistent subchains on the bitcoin blockchain

R Longo, AS Podda, R Saia - Computation, 2020 - mdpi.com
Currently, an increasing number of third-party applications exploit the Bitcoin blockchain to
store tamper-proof records of their executions, immutably. For this purpose, they leverage …

A subscribable peer-to-peer RDF repository for distributed metadata management

M Cai, M Frank, B Yan, R MacGregor - Journal of Web Semantics, 2004 - Elsevier
In this paper, we present a scalable peer-to-peer RDF repository, named RDFPeers, which
stores each triple in a multi-attribute addressable network by applying globally known hash …

Accelerating large-scale data exploration through data diffusion

I Raicu, Y Zhao, IT Foster, A Szalay - Proceedings of the 2008 …, 2008 - dl.acm.org
Data-intensive applications often require exploratory analysis of large datasets. If analysis is
performed on distributed resources, data locality can be crucial to high throughput and …

Message fragmentation in opportunistic DTNs

M Pitkanen, A Keranen, J Ott - … on a World of Wireless, Mobile …, 2008 - ieeexplore.ieee.org
Delay-tolerant networking is used for communication in challenged environments such as
MANETs, in which links are unstable and end-to-end paths between communicating nodes …

A proof-of-stake protocol for consensus on bitcoin subchains

M Bartoletti, S Lande, AS Podda - … , VOTING, WTSC, and TA, Sliema, Malta …, 2017 - Springer
Although the transactions on the Bitcoin blockchain have the main purpose of recording
currency transfers, they can also carry a few bytes of metadata. A sequence of transaction …

The globus replica location service: design and experience

AL Chervenak, R Schuler, M Ripeanu… - … on Parallel and …, 2008 - ieeexplore.ieee.org
Distributed computing systems employ replication to improve overall system robustness,
scalability, and performance. A replica location service (RLS) offers a mechanism to …

Replica selection strategies in data grid

RM Rahman, R Alhajj, K Barker - Journal of parallel and distributed …, 2008 - Elsevier
Replication in Data Grids reduces access latency and bandwidth consumption. When
different sites hold replicas of datasets, there is a significant benefit realized by selecting the …