User-priority guided Min-Min scheduling algorithm for load balancing in cloud computing

H Chen, F Wang, N Helian… - 2013 national conference …, 2013 - ieeexplore.ieee.org
Cloud computing is emerging as a new paradigm of large-scale distributed computing. In
order to utilize the power of cloud computing completely, we need an efficient task …

Stealth distributed hash table: a robust and flexible super-peered dht

A Brampton, A MacQuire, IA Rai, NJP Race… - Proceedings of the 2006 …, 2006 - dl.acm.org
Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes
on the same overlay. However, realistically nodes on a network are heterogeneous in terms …

Distributed ledgers in developing large-scale integrated systems

MF Marchini - 2021 IEEE International Systems Conference …, 2021 - ieeexplore.ieee.org
Large-scale development and maintenance projects involve numerous dependencies
across multiple disparate organizations, and these projects are subject to contractual …

k-rAC: A Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables

O Kieselmann, A Wacker, G Schiele - Proceedings of the 12th …, 2017 - dl.acm.org
Distributed Hash Tables (DHT) are a common architecture for decentralized data
management. However, currently existing DHTs allow every participant to access any index …

[图书][B] Data Revocation on the Internet

O Kieselmann - 2018 - books.google.com
After publishing data on the Internet, the data publisher loses control over it. However, there
are several situations where it is desirable to revoke published information. To support this …

Incorporating Robust Authentication Scheme in P2P E-Commerce Applications

CH Tsai, PC Su - 電子商務學報, 2012 - airitilibrary.com
Due to lack of effective trust management mechanism, heaps of deceptions exist in peer-to-
peer (P2P) e-commerce (EC) environments, which seriously damage authenticity and …

[图书][B] Towards an Efficient Indexing and Searching Model for Service Discovery in a Decentralised Environment

D Miao - 2018 - search.proquest.com
Given the growth and outreach of new information, communication, computing and
electronic technologies in various dimensions, the amount of data has explosively increased …

[PDF][PDF] ITeG Interdisciplinary Research on Information System Design

ITGWZ für InformationstechnikrGestaltung - uni-kassel.de
Zum anderen verfolgen die Forschungsprojekte das Ziel der technikadäquaten
Rechtsfortbildung. Um seine Aufgabe auch künftig noch erfüllen zu können, muss das Recht …

A Promotion Mechanism for Scalable Stealth DHT

IA Rai - 2010 Fifth International Conference on Internet and …, 2010 - ieeexplore.ieee.org
Most Distributed Hash Tables (DHTs) inherently assume interconnecting nodes with
homogeneous capabilities. Realistically however, capabilities of nodes on a network widely …

[引用][C] Uma arquitetura para prover autenticidade em comunicações Multicast

L Dias, TA Rizzetti, J Garcia - Anais da XVII Escola Regional de Redes de …, 2019 - SBC