A survey on content-centric technologies for the current Internet: CDN and P2P solutions
A Passarella - Computer Communications, 2012 - Elsevier
One of the most striking properties of the Internet is its flexibility to accommodate features it
was not conceived for. Among the most significant examples, in this survey we consider the …
was not conceived for. Among the most significant examples, in this survey we consider the …
Tapestry: A resilient global-scale overlay for service deployment
We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable,
location-independent routing of messages directly to nearby copies of an object or service …
location-independent routing of messages directly to nearby copies of an object or service …
Securing distributed storage: challenges, techniques, and systems
V Kher, Y Kim - Proceedings of the 2005 ACM workshop on Storage …, 2005 - dl.acm.org
The rapid increase of sensitive data and the growing number of government regulations that
require longterm data retention and protection have forced enterprises to pay serious …
require longterm data retention and protection have forced enterprises to pay serious …
[HTML][HTML] Handling churn in a DHT
This paper addresses the problem of churn--the continuous process of node arrival and
departure--in distributed hash tables (DHTs). We argue that DHTs should perform lookups …
departure--in distributed hash tables (DHTs). We argue that DHTs should perform lookups …
[BOOK][B] Distributed computing: principles, algorithms, and systems
AD Kshemkalyani, M Singhal - 2011 - books.google.com
Designing distributed computing systems is a complex process requiring a solid
understanding of the design problems and the theoretical and practical aspects of their …
understanding of the design problems and the theoretical and practical aspects of their …
Looking up data in P2P systems
The main challenge in P2P computing is to design and implement a robust and scalable
distributed system composed of inexpensive, individually unreliable computers in unrelated …
distributed system composed of inexpensive, individually unreliable computers in unrelated …
Internet indirection infrastructure
Attempts to generalize the Internet's point-to-point communication abstraction to provide
services like multicast, anycast, and mobility have faced challenging technical problems and …
services like multicast, anycast, and mobility have faced challenging technical problems and …
Koorde: A simple degree-optimal distributed hash table
Koorde is a new distributed hash table (DHT) based on Chord 15 and the de Bruijn graphs
2. While inheriting the simplicity of Chord, Koorde meets various lower bounds, such as O …
2. While inheriting the simplicity of Chord, Koorde meets various lower bounds, such as O …
[BOOK][B] Handbook of approximation algorithms and metaheuristics
TF Gonzalez - 2007 - taylorfrancis.com
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …
Pond: The {OceanStore} Prototype
S Rhea, P Eaton, D Geels, H Weatherspoon… - … USENIX Conference on …, 2003 - usenix.org
OceanStore is an Internet-scale, persistent data store designed for incremental scalability,
secure sharing, and long-term durability. Pond is the OceanStore prototype; it contains many …
secure sharing, and long-term durability. Pond is the OceanStore prototype; it contains many …