A survey on content-centric technologies for the current Internet: CDN and P2P solutions

A Passarella - Computer Communications, 2012 - Elsevier
One of the most striking properties of the Internet is its flexibility to accommodate features it
was not conceived for. Among the most significant examples, in this survey we consider the …

Ordinal regression with multiple output cnn for age estimation

Z Niu, M Zhou, L Wang, X Gao… - Proceedings of the IEEE …, 2016 - openaccess.thecvf.com
To address the non-stationary property of aging patterns, age estimation can be cast as an
ordinal regression problem. However, the processes of extracting features and learning a …

Resource discovery for distributed computing systems: A comprehensive survey

J Zarrin, RL Aguiar, JP Barraca - Journal of parallel and distributed …, 2018 - Elsevier
Large-scale distributed computing environments provide a vast amount of heterogeneous
computing resources from different sources for resource sharing and distributed computing …

Peer-to-peer systems

R Rodrigues, P Druschel - Communications of the ACM, 2010 - dl.acm.org
Peer-to-peer systems Page 1 72 communicationS of the acm | OcTOber 2010 | VOL. 53 | nO.
10 review articles Peer-tO-Peer (P2P) cOMPUtinG has attracted significant interest in recent …

A global view of kad

M Steiner, T En-Najjary, EW Biersack - Proceedings of the 7th ACM …, 2007 - dl.acm.org
Distributed hash tables (DHTs) have been actively studied in literature and many different
proposals have been made on how to organize peers in a DHT. However, very few DHT …

Mapping the interplanetary filesystem

S Henningsen, M Florian, S Rust… - 2020 IFIP Networking …, 2020 - ieeexplore.ieee.org
The Interplanetary Filesystem (IPFS) is a distributed data storage service frequently used by
blockchain applications and for sharing content in a censorship-resistant manner. Data is …

Long Term Study of Peer Behavior in the kad DHT

M Steiner, T En-Najjary… - IEEE/ACM Transactions …, 2009 - ieeexplore.ieee.org
Distributed hash tables (DHTs) have been actively studied in literature and many different
proposals have been made on how to organize peers in a DHT. However, very few DHTs …

Profiling a million user DHT

J Falkner, M Piatek, JP John, A Krishnamurthy… - Proceedings of the 7th …, 2007 - dl.acm.org
Distributed hash tables (DHTs) provide scalable, key-based lookup of objects in dynamic
network environments. Although DHTs have been studied extensively from an analytical …

Measuring large-scale distributed systems: case of bittorrent mainline dht

L Wang, J Kangasharju - IEEE P2P 2013 Proceedings, 2013 - ieeexplore.ieee.org
Peer-to-peer networks have been quite thoroughly measured over the past years, however it
is interesting to note that the BitTorrent Mainline DHT has received very little attention even …

Exploiting KAD: possible uses and misuses

M Steiner, T En-Najjary, EW Biersack - ACM SIGCOMM Computer …, 2007 - dl.acm.org
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer
traffic makes a major fraction of the total traffic seen in the Internet. The dominating …