25 Hits in 12.7 sec

A formal framework for the performance analysis of P2P networks protocols

A. Spognardi, R. Di Pietro
2006 Proceedings 20th IEEE International Parallel & Distributed Processing Symposium  
In this paper we introduce a versatile model for the analysis of P2P protocols. We employ this model to formally prove which is the average lookup length for two sample protocols: BaRT and Koorde.  ...  Despite the proposal of several protocols for P2P networks, sometimes there is a lack of a formal demonstration of their performance: experimental simulations are the most used method to evaluate their  ...  The authors are grateful to professor Luigi V. Mancini and the anonymous reviewers for providing useful suggestions and comments.  ... 
doi:10.1109/ipdps.2006.1639714 dblp:conf/ipps/SpognardiP06 fatcat:43yej5357jc35kjboodkv42uya

Analysis of an anycast based overlay system for scalable service discovery and execution

Tim Stevens, Tim Wauters, Chris Develder, Filip De Turck, Bart Dhoedt, Piet Demeester
2010 Computer Networks  
Support for anycast in the IP network layer allows one source node to contact a single member out of a group of destination nodes configured with the same IP address.  ...  ., Analysis of an anycast based overlay system for scalable service discovery and execution,  ...  Acknowledgments The work presented in this paper is supported by the EU through the IST Project Phosphorus (  ... 
doi:10.1016/j.comnet.2009.08.008 fatcat:ttzpmrjkxvgw7nzexmmigs77ym

Cooperative caching versus proactive replication for location dependent request patterns

Niels Sluijs, Frédéric Iterbeke, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester
2011 Journal of Network and Computer Applications  
structured peer-topeer network, and more in particular a Distributed Hash Table (DHT), providing a logarithmic lookup performance (i.e. logarithmic in the number of network nodes).  ...  In this contribution we present the caching layer and introduce the cooperative Request Times Distance (RTD) caching algorithm and protocol, which uses popularity and distance metrics to increase the lookup  ...  The cache size for (a and b) is set to 10 items per node and the network size of (b and c) is set to 256 peers.  ... 
doi:10.1016/j.jnca.2010.12.007 fatcat:vzrbzles3rgnnfya6zdzut3iqi

ALVIC versus the Internet: Redesigning a Networked Virtual Environment Architecture

Peter Quax, Jeroen Dierckx, Bart Cornelissen, Wim Lamotte
2008 International Journal of Computer Games Technology  
The Architecture for Large-Scale Virtual Interactive Communities (ALVICs) was originally developed to serve as a generic framework to deploy networked virtual environment applications on the Internet.  ...  While it has been shown to effectively scale to the numbers originally put forward, our findings have shown that, on a real-life network, such as the Internet, several drawbacks will not be overcome in  ...  The authors are grateful to the partners involved in the IBBT Teleon project, as well as the members of the NVE research group at EDM.  ... 
doi:10.1155/2008/594313 fatcat:xzyn4b727bghbjxha3yz2fcswm

SoK: Understanding BFT Consensus in the Age of Blockchains [article]

Gang Wang
2021 IACR Cryptology ePrint Archive  
Blockchain as an enabler to current Internet infrastructure has provided many unique features and revolutionized current distributed systems into a new era.  ...  For each representative protocol, we conduct an in-depth discussion of its most important architectural building blocks as well as the key techniques they used.  ...  Thus, it is difficult to be adopted into large-scale consensus protocols, and current popular blockchain systems prefer peer-to-peer diffusion. b) Peer-to-Peer Diffusion: P2P networks are distributed systems  ... 
dblp:journals/iacr/Wang21c fatcat:wggbkbi25fg43fieebp4qzlk3m

Management of customizable Software-as-a-Service in cloud and network environments

Hendrik Moens, Bart Dhoedt, Filip De Turck
2016 NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium  
Vooraleerst wil ik mijn promotoren, Filip De Turck en Bart Dhoedt bedanken voor al hun hulp, begeleiding en het vertrouwen dat ze in mij gesteld hebben tijdens mijn doctoraat.  ...  IBCN heeft een zeer sterke aanwezigheid binnen de network management community, waardoor we dus vaak met velen op conferentie gingen.  ...  Acknowledgments Hendrik Moens is funded by the Institute for the Promotion of Innovation by Science and Technology in Flanders (IWT).  ... 
doi:10.1109/noms.2016.7502932 dblp:conf/noms/MoensDT16 fatcat:zjxqxcrzovgpbkamv4w2svctzq

Models, Algorithms, and Architectures for Scalable Packet Classification

David Edward Taylor
The major contributions of this work include the design and anal-ysis of a scalable hardware implementation of a Longest Prefix Matching (LPM) search engine for route lookup, a survey and taxonomy of packet  ...  The major contributions of this work include the design and analysis of a scalable hardware implementation of a Longest Prefix Matching (LPM) search engine for route lookup, a survey and taxonomy of packet  ...  In Figure 4 .21 we employ a range tree for the port ranges, a direct lookup table for the protocol fields, and a binary trie for the address prefixes.  ... 
doi:10.7936/k7fq9tzd fatcat:tb5dig4btzckxmd6veqdqi3vx4

Privacy engineering for social networks

Jonathan Anderson, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository
In this dissertation, I enumerate several privacy problems in online social networks (OSNs) and describe a system called Footlights that addresses them.  ...  It is the foundation for a practical shared filesystem, a perfectly unobservable communications channel and a distributed application platform.  ...  Section 3.3 discussed numerous proposals to either encrypt content within an existing OSN or to distribute data in a peer-to-peer network.  ... 
doi:10.17863/cam.16377 fatcat:g3dkqo7ugrc7fcnpz4d6mc2l6m

Middleware Solutions for Effective Cloud-CPS Integration in Pervasive Environment

Alessandro Zanni
meetings together, and to Ulf and Stefan, from STC, for the support during my staying in Sweden.  ...  Among all the nice and talented people I met during the experiences abroad, in particular, thanks to Se-young, from LIP6-Phare, for the kindness and the knowledge shown during the valuable work and long  ...  [65] proposes an architecture based on the base protocol that provides a generic self-organized Peer-to-Peer (P2P) overlay network service, by using CoAP as the transfer protocol to access RESTful services  ... 
doi:10.48676/unibo/amsdottorato/8527 fatcat:tfkg7lo4rfepznap2klfypqffm

Dagstuhl Reports, Volume 7, Issue 5, May 2017, Complete Issue [article]

First, we propose an alternative image based representation for the 3D content, generated by peers and collected in a sprite tree.  ...  In this talk, we present how to adapt the 3D representation of large Networked Virtual Environments (NVE) to usage and navigation.  ...  In addition, echoFS a a pseudo-randomized striping strategy that aims at distributing data across nodes for elastic load balance, and scalable aggregated I/O, within the same job or across different jobs  ... 
doi:10.4230/dagrep.7.5 fatcat:ipv6ltpp6ngejao35zzoqko2ry

Special Issue: E-Service Intelligence

Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto, Argentina, Costin Badica, Romania, Vladimir Batagelj (+19 others)
2010 unpublished
assessment of people expertise in a social network.  ...  The article "BREM: A Distributed Blogger Reputation Evaluation Model Based on Opinion Analysis" by Yu Weng, Changjun Hu, and Xuechun Zhang proposes a new model for blogger reputation evaluation in distributed  ...  The work reported in this paper was supported by the Key Science- Technology Acknowledgement The author would like to thank the anonymous reviewers for their valuable comments and suggestions that  ... 

Special Issue: Ant Colonies and Multi-Agent Systems Guest Editors: Nadia Nedjah Luiza de Macedo Mourelle

Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Tomaž Banovec, Ciril Baškovič, Andrej Jerman-Blažič, Jožkočuk Jožkočuk, Vladislav Rajkovič, Ivan Bratko, Marko Jagodič (+14 others)
We show the capabilities of this combination and derive destinations and goals for self-organization in communication networks showing a more efficient and scalable behavior.  ...  In this work we extending our investigations for a general neural network model that resembles the interactions between glucose concentration levels and amount of insulin injected in the bodies of diabetics  ...  Acknowledgements The authors would like to thank C.C. Loy for his help in generating the contour graphs.  ... 

REVISTA ECONOMICĂ Journal of economic-financial theory and practice CNCSIS reference: B+, Code 478 Frequency: 6 issues/year Editor Deputy Editor Scientific Committee Editorial Board THE IMPACT OF SEMANTIC WEB TO BUSINESS INTELLIGENCE

Dan Popescu, Liviu Mihăescu, Dan Popescu, H Lucian, Liviu Mihăescu, Lucian, Acad Văcărel, -Romanian Academy, Prof Lucian-Liviu, Albu, Ciumara, Francesco D'esposito (+37 others)
The purpose of this research is to identify, describe and analyse if there is the impact on the Semantic Web solutions for Business Intelligence and how it manifests.  ...  Business Intelligence are high-level decisions support applications, their role being to provide to management, based on information from the company, a picture of its situation at some time but also on  ...  There are mobile services infrastructures which can provide a generic view for mobile users to lookup, access and execute web services over wireless broadcast networks.  ... 

Principled Approach to Natural Language Generation

Yevgeniy Puzikov
The number of the proposed approaches constantly grows, but the methodology lags behind and sometimes fails to solicit a better understanding of which approaches work, and the reasons for it.  ...  We further conduct a range of experiments to test this framework in several text generation tasks.  ...  neural models is non-deterministic in many aspects and depends on random weight initialization, random shuffling of the training data for each epoch, applying random dropout masks (Reimers and Gurevych  ... 
doi:10.26083/tuprints-00019115 fatcat:nymcjpnsmjcgtmvmdbyhjgo6ce


Witold Abramowicz, David Abramson, Adel Adi, Kenneth Aizavva, Suad Alagič, Mohamad Alam, Dia Ali, Alan Aliu, Richard Amoroso, John Anderson, Hans-Jurgen Appelrath, Ivsn Araujo (+275 others)
The authors vvant to acknovvledge the anonymous revievvers for their constructive remarks and suggestions. References Acknovfledgments The authors wish to thank Daniel A.  ...  We would like to acknowledge Binto George for taking part in the initial discussions on this work, while he was at Rutgers.  ...  In Bart De Decker, Frank Piessens, Jan Smits, and Els Van Herreweghen, editors, Advances in Network and Distributed Systems Security -Proceedings of IFIP I-NetSec'0}, pages 153-171.  ... 
« Previous Showing results 1 — 15 out of 25 results