A survey of DHT security techniques
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
[LIBRO][B] Distributed systems
AS Tanenbaum, M Van Steen - 2017 - academia.edu
Distributed Systems Page 1 DS 2006; Ch1 16-Jan-06 Timo Alanko, 2006 1 Distributed
Systems Spring 2006 Timo Alanko 16-Jan-06 2 Sources of material • Tanenbaum, van …
Systems Spring 2006 Timo Alanko 16-Jan-06 2 Sources of material • Tanenbaum, van …
Branch replication scheme: A new model for data replication in large scale data grids
Data replication is a practical and effective method to achieve efficient and fault-tolerant data
access in grids. Traditionally, data replication schemes maintain an entire replica in each …
access in grids. Traditionally, data replication schemes maintain an entire replica in each …
Analysis of a consensus protocol for extending consistent subchains on the bitcoin blockchain
Currently, an increasing number of third-party applications exploit the Bitcoin blockchain to
store tamper-proof records of their executions, immutably. For this purpose, they leverage …
store tamper-proof records of their executions, immutably. For this purpose, they leverage …
A subscribable peer-to-peer RDF repository for distributed metadata management
M Cai, M Frank, B Yan, R MacGregor - Journal of Web Semantics, 2004 - Elsevier
In this paper, we present a scalable peer-to-peer RDF repository, named RDFPeers, which
stores each triple in a multi-attribute addressable network by applying globally known hash …
stores each triple in a multi-attribute addressable network by applying globally known hash …
Accelerating large-scale data exploration through data diffusion
Data-intensive applications often require exploratory analysis of large datasets. If analysis is
performed on distributed resources, data locality can be crucial to high throughput and …
performed on distributed resources, data locality can be crucial to high throughput and …
Message fragmentation in opportunistic DTNs
Delay-tolerant networking is used for communication in challenged environments such as
MANETs, in which links are unstable and end-to-end paths between communicating nodes …
MANETs, in which links are unstable and end-to-end paths between communicating nodes …
A proof-of-stake protocol for consensus on bitcoin subchains
Although the transactions on the Bitcoin blockchain have the main purpose of recording
currency transfers, they can also carry a few bytes of metadata. A sequence of transaction …
currency transfers, they can also carry a few bytes of metadata. A sequence of transaction …
The globus replica location service: design and experience
Distributed computing systems employ replication to improve overall system robustness,
scalability, and performance. A replica location service (RLS) offers a mechanism to …
scalability, and performance. A replica location service (RLS) offers a mechanism to …
Replica selection strategies in data grid
Replication in Data Grids reduces access latency and bandwidth consumption. When
different sites hold replicas of datasets, there is a significant benefit realized by selecting the …
different sites hold replicas of datasets, there is a significant benefit realized by selecting the …