Cost-effective resources for computing approximation queries in mobile cloud computing infrastructure

AK Sangaiah, A Javadpour, P Pinto, H Chiroma… - Sensors, 2023 - mdpi.com
Answering a query through a peer-to-peer database presents one of the greatest challenges
due to the high cost and time required to obtain a comprehensive response. Consequently …

Privacy-protected blockchain system

P Zhong, Q Zhong, H Mi, S Zhang… - 2019 20th IEEE …, 2019 - ieeexplore.ieee.org
The blockchain uses a decentralized consensus mechanism to maintain the books in an
immutable way, which ensures the blockchain smart contract system highly secure. In …

{MAPX}: Controlled data migration in the expansion of decentralized {Object-Based} storage systems

L Wang, Y Zhang, J Xu, G Xue - 18th USENIX Conference on File and …, 2020 - usenix.org
Data placement is critical for the scalability of decentralized object-based storage systems.
The state-of-the-art CRUSH placement method is a decentralized algorithm that …

Flimm: Foreground traffic aware data migration manager for distributed storage system

B Li, X Dong, J Mi, Y Wang, L Wang, W Chen - Future Generation …, 2024 - Elsevier
Currently, decentralized distributed storage system is widely used in various scenarios,
because decentralized data placement algorithms observably improve scalability and …

{CubicRing}: Enabling {One-Hop} Failure Detection and Recovery for Distributed {In-Memory} Storage Systems

Y Zhang, C Guo, D Li, R Chu, H Wu… - 12th USENIX Symposium …, 2015 - usenix.org
In-memory storage has the benefits of low I/O latency and high I/O throughput. Fast failure
recovery is cru-cial for large-scale in-memory storage systems, bringing network-related …

Oasis: Controlling Data Migration in Expansion of Object-based Storage Systems

Y Zhang, L Wang, S Gai, Q Ke, W Li, Z Song… - ACM Transactions on …, 2023 - dl.acm.org
Object-based storage systems have been widely used for various scenarios such as file
storage, block storage, blob (eg, large videos) storage, and so on, where the data is placed …

CSR: Classified source routing in distributed networks

Y Zhang, D Li, Z Sun, F Zhao, J Su… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In recent years cloud computing provides a new way to address the constraints of limited
energy, capabilities, and resources. Distributed hash table (DHT) based distributed networks …

Hash-based RFID tag mutual authentication scheme with retrieval efficiency

JS Cho, SC Kim, SK Kim - 2011 IEEE Ninth International …, 2011 - ieeexplore.ieee.org
RFID (Radio Frequency Identification) system is a promising automatic identification
technology that use communication via radio waves to identify and track moving objects …

Graph theoretical analysis on distributed line graphs for peer-to-peer networks

A Manada, H Morita - IEEE Transactions on Network Science …, 2018 - ieeexplore.ieee.org
Distributed line graphs were introduced by Zhang and Liu as an overlay for Peer-to-Peer
networks. Distributed line graphs have some useful properties as a network topology, such …

{RAMCube}: Exploiting Network Proximity for {RAM-Based}{Key-Value} Store

Y Zhang, C Guo, R Chu, G Lu, Y Xiong… - 4th USENIX Workshop on …, 2012 - usenix.org
Disk-based storage is becoming increasingly problematic in meeting the needs of large-
scale cloud applications. Recently RAM-based storage is proposed by aggregating the RAM …