Essays about: "distributed hash table"

Showing result 1 - 5 of 12 essays containing the words distributed hash table.

  1. 1. Scalable Streaming Graph Partitioning

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Seyed Mohammadreza Seyed Khamoushi; [2017]
    Keywords : streaming graph; vertex-cut partitioning; graph partitioning; distributed hash table;

    Abstract : Large-scale graph-structured datasets are growing at an increasing rate. Social network graphs are an example of these datasets. Processing large-scale graphstructured datasets are central to many applications ranging from telecommunication to biology and has led to the development of many parallel graph algorithms. READ MORE

  2. 2. Geo-process lookup management

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Andreas Hägglund; [2017]
    Keywords : DHT; Distributed hash table; Geohash; lookup; Geographical search;

    Abstract : This thesis presents a method to deploy and lookup applications and devices based on a geographical location. The proposed solution is a combination of two existing technologies, where the first one is a geocode system to encode latitude and longitude coordinates, and the second one is a Distributed Hash Table (DHT) where values are stored and accessed with a $<$key,value$>$ pair. READ MORE

  3. 3. Consistent authentication in disitrbuted networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Niklas Lindskog; [2016]
    Keywords : Authentication; Distributed Hash Table; Kademlia; Distributed Networking; Network Security; Calvin; Cryptography; Technology and Engineering;

    Abstract : In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in relevance, new storage solutions are needed. Storage can no longer rely on a single central entity but rather needs to depend on the resources of the entire network. READ MORE

  4. 4. Scalable Methods for Spam Protection in Decentralized Peer-to-Peer Networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Jonathan Wernberg; [2016]
    Keywords : Spam Protection; Decentralized Peer-to-Peer Networking; Scalability; Public Key Infrastructure; Trust Graph; Trust List; Distributed Hash Table; Kademlia; Technology and Engineering;

    Abstract : Decentralized peer-to-peer networks offer several benefits over the today more commonly employed centralized client-server networks. Peer-to-peer networks allow for seamless distribution of web content over all participating nodes. This makes the hosting and access of web content much more fault tolerant, secure, faster and cheaper. READ MORE

  5. 5. Reliable UDP and Circular DHT implementation for the MediaSense Open-Source Platform

    University essay from Mittuniversitetet/Institutionen för informationsteknologi och medier; Mittuniversitetet/Institutionen för informationsteknologi och medier

    Author : Timo Schröder; Florian Rüter; [2012]
    Keywords : Internet-of-Things; MediaSense; Peer-to-peer; Chord; Distribut Hash Table; Networking; Reliable UDP; Simulation;

    Abstract : MediaSense is an EU funded platform that is an implementation of an Internet-of-Things framework. This project adds two fundamental functions to it, namely, a new lookup service based on a peer-to-peer Distributed Hash Table (DHT) called Chord and a reliable communication protocol based on UDP (RUDP). READ MORE