Ndnizing existing applications: Research issues and experiences
A major challenge to potential ICN/NDN deployment is the requirement of application
support, namely, applications need to be rewritten or modified in order to run on NDN …
support, namely, applications need to be rewritten or modified in order to run on NDN …
OrderlessChain: A CRDT-based BFT Coordination-free Blockchain Without Global Order of Transactions
Existing permissioned blockchains often rely on coordination-based consensus protocols to
ensure the safe execution of applications in a Byzantine environment. Furthermore, the …
ensure the safe execution of applications in a Byzantine environment. Furthermore, the …
Making crdts byzantine fault tolerant
M Kleppmann - Proceedings of the 9th Workshop on Principles and …, 2022 - dl.acm.org
It is often claimed that Conflict-free Replicated Data Types (CRDTs) ensure consistency of
replicated data in peer-to-peer systems. However, peer-to-peer systems usually consist of …
replicated data in peer-to-peer systems. However, peer-to-peer systems usually consist of …
Online brand community and consumer brand trust: Analysis from Czech millennials
To ensure effective and efficient relationship marketing, brand management has become an
asset (pre-requisite) for quality service marketing to thrive. Brands have gone viral to …
asset (pre-requisite) for quality service marketing to thrive. Brands have gone viral to …
Beaufort: Robust byzantine fault tolerance for client-centric mobile web applications
In recent years, part of the web is shifting to a client-centric, decentralized model where web
clients become the leading execution environment for application logic and data storage …
clients become the leading execution environment for application logic and data storage …
Byzantine eventual consistency and the fundamental limits of peer-to-peer databases
Sybil attacks, in which a large number of adversary-controlled nodes join a network, are a
concern for many peer-to-peer database systems, necessitating expensive …
concern for many peer-to-peer database systems, necessitating expensive …
Practical client-side replication: Weak consistency semantics for insecure settings
Client-side replication and direct client-to-client synchronization can be used to create highly
available, low-latency interactive applications. Causal consistency, the strongest available …
available, low-latency interactive applications. Causal consistency, the strongest available …
PushPin: Towards production-quality peer-to-peer collaboration
Fully peer-to-peer application software promises many benefits over cloud software, in
particular, being able to function indefinitely without requiring servers. Research on …
particular, being able to function indefinitely without requiring servers. Research on …
OWebSync: Seamless synchronization of distributed web clients
Many enterprise software services are adopting a fully web-based architecture for both
internal line-of-business applications and for online customer-facing applications. Although …
internal line-of-business applications and for online customer-facing applications. Although …
Personal volunteer computing
E Lavoie, L Hendren - Proceedings of the 16th ACM International …, 2019 - dl.acm.org
We propose personal volunteer computing, a novel paradigm to encourage technical
solutions that leverage personal devices, such as smartphones and laptops, for personal …
solutions that leverage personal devices, such as smartphones and laptops, for personal …