Filters








5,286 Hits in 7.1 sec

Deep Self-Adaptive Hashing for Image Retrieval [article]

Qinghong Lin, Xiaojun Chen, Qin Zhang, Shangxuan Tian, Yudong Chen
2021 arXiv   pre-print
To solve the aforementioned problems, we propose a Deep Self-Adaptive Hashing (DSAH) model to adaptively capture the semantic information with two special designs: Adaptive Neighbor Discovery (AND) and  ...  Hashing technology has been widely used in image retrieval due to its computational and storage efficiency.  ...  These two techniques enable DSAH to fully explore the semantic information behind the data pairs and learn better hash codes in a self-adaptive manner.  ... 
arXiv:2108.07094v2 fatcat:nzwrowa6dbbgnmbta6v537inly

Floodless in seattle

Changhoon Kim, Matthew Caesar, Jennifer Rexford
2008 Computer communication review  
Quick Review of Ethernet 4 Ethernet  Dominant wired LAN technology  Covers the first IP-hop in most enterprises/campuses  First widely used LAN technology  Simpler, cheaper than token LANs, ATM, and  ...  discards frame  Type: indicates the higher layer protocol  Usually IP 6 Ethernet Bridging: Routing at L2  Routing determines paths to destinations through which traffic is forwarded  Routing takes  ...  Small  Flooding and self-learning lead to unnecessarily large forwarding tables  Large tables are not only inefficient, but also dangerous  Objective #3: Install hosts' location information  ... 
doi:10.1145/1402946.1402961 fatcat:w5qiinqugbdepc4i4dg2hfxdim

Hybrid Algorithm for Optimal Load Sharing in Grid Computing

Ramesh
2012 Journal of Computer Science  
Results: In this study a hybrid algorithm for optimization of load sharing is proposed. The hybrid algorithm contains two components which are Hash Table ( HT) and Distributed Hash Table ( DHT).  ...  Conclusion: The results of the proposed study show that the hybrid algorithm will optimize the task than existing systems.  ...  Hash Table (HT): The hash table is a fair and feasible way of resource optimization in the last few years.  ... 
doi:10.3844/jcssp.2012.175.180 fatcat:3tfcfec3une5piegqpryflgxdi

A survey on self‐organized semantic storage

Hannes Mühleisen, Tilman Walther, Robert Tolksdorf
2011 International Journal of Web Information Systems  
However, the distribution of a task onto a set of computers connected using a communication network is not trivial.  ...  A case is made for self-organization in a distributed storage system as the key to excellence in the relevant non-functional requirements: scalability, adaptability and robustness.  ...  Storage nodes store the triple indices as well as literal tables.  ... 
doi:10.1108/17440081111165866 fatcat:j6lwe3t6kndajdbsf26y264bdq

State-of-the-art survey on P2P overlay networks in pervasive computing environments

Apostolos Malatras
2015 Journal of Network and Computer Applications  
We also taxonomize P2P overlays using the well-established classification scheme in regard to their structure or lack of it.  ...  P2P overlay networks have attracted significant research interest due to their utility as virtualized abstractions of complex network infrastructures, optimized to satisfy specific criteria, e.g. minimum  ...  the notion of consistency in hashing by introducing distributed sloppy hash tables.  ... 
doi:10.1016/j.jnca.2015.04.014 fatcat:7uruzbtonnb2phxibpxpt2ez4e

PatchIndex: exploiting approximate constraints in distributed databases

Steffen Kläbe, Kai-Uwe Sattler, Stephan Baumann
2021 Distributed and parallel databases  
We apply the concept to the environment of distributed databases, providing parallel index creation approaches and optimization techniques for parallel queries using PatchIndexes.  ...  In this paper, we focus on constraint discovery as a subtask of schema optimization.  ...  Distributed and Parallel Databases  ... 
doi:10.1007/s10619-021-07326-1 fatcat:tdgfss7v3ngtbos42oanjr4n7m

Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks [chapter]

M. Baqer, A. I. Khan, Z. A. Baig
2005 Lecture Notes in Computer Science  
In this paper, using GN as a testbed application, we show that a simple virtual topology overlay would enable distributed applications requiring stable structured networks to be deployed over dynamic unstructured  ...  Graph Neuron (GN) is a network-centric algorithm which envisages a stable and structured network of tiny devices as the platform for parallel distributed pattern recognition.  ...  The overlay uses an in-network distributed hash table (DHT)-based mechanism to avoid relying on a centralised entity for content discovery and structure maintenance.  ... 
doi:10.1007/11596042_22 fatcat:gfsusv43rvclbdbpa7xjaucbje

Applying Peer-to-Peer Techniques to Grid Replica Location Services

Ann L. Chervenak, Min Cai
2006 Journal of Grid Computing  
P-RLS mappings adaptively.  ...  We describe the design and performance of a Peer-to-Peer Replica Location Service (P-RLS) that uses the Chord algorithm to self-organize P-RLS servers and exploits the Chord overlay network to replicate  ...  By contrast, in a structured peer-to-peer system using a distributed hash table, related mappings will tend to be distributed throughout the wide area network.  ... 
doi:10.1007/s10723-005-9009-1 fatcat:zvomvly26rbb5erbwegvtecwli

Towards Autonomic Service Discovery A Survey and Comparison

Michael Rambold, Holger Kasinger, Florian Lautenbacher, Bernhard Bauer
2009 2009 IEEE International Conference on Services Computing  
For these purposes, in this paper we define prime criteria that have to be fulfilled for an autonomic service discovery.  ...  To deal with these effects, an improvement of service composition and discovery becomes necessary, especially a higher degree of automation.  ...  AUTONOMIC SERVICE DISCOVERY CRITERIA A prerequisite for any service discovery approach enabling basic self-configuring and self-optimizing capabilities is the provisioning of expressive service descriptions  ... 
doi:10.1109/scc.2009.59 dblp:conf/IEEEscc/RamboldKLB09 fatcat:liehvrs2m5ahxnikgqaehwtr6m

MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments

M. Sharmin, S. Ahmed, S.I. Ahamed
2006 Third International Conference on Information Technology: New Generations (ITNG'06)  
There are still some unexplored but crucial attributes like Knowledge Usability, Resource Discovery, and Self-healing that deserve further attention.  ...  With the tremendous increase in the use of mobile handheld and wearable devices, the pervasive computing arena is becoming stronger and more powerful day by day.  ...  Populating the hash table with resource information follows "Match all" procedure.  ... 
doi:10.1109/itng.2006.88 dblp:conf/itng/SharminAA06 fatcat:pguzfbxqrrc6dc7vo6atxfakle

Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing [article]

Rajiv Ranjan, Liang Zhao, Xiaomin Wu, Anna Liu
2009 arXiv   pre-print
service discovery and load-balancing in Cloud computing environments.  ...  and implementation of novel, extensible software fabric (Cloud peer) that combines public/private clouds, overlay networking and structured peer-to-peer indexing techniques for supporting scalable and self-managing  ...  CLOUD SERVICE DISCOVERY AND LOAD-BALANCING USING DHT OVERLAY Distributed Hash Tables Structured systems such as DHTs offer deterministic query search results within logarithmic bounds on network message  ... 
arXiv:0912.1905v1 fatcat:3iwe7sganngtje47nhyelkw2me

Towards Robust Internet Applications: Self-Organizing Overlays

John Risson, Tim Moors
2005 TENCON 2005 - 2005 IEEE Region 10 Conference  
Self-organizing overlays based on distributed hash tables (DHTs) are set to make Internet applications more robust.  ...  Similarly, NinjaMail [20] was an email prototype that derived its robustness by using a distributed hash table over a single cluster of workstations ( Figure 4 ).  ...  Recent self-organizing overlays are likely to deliver both. As one example, the Intentional Naming System [36] uses distributed hash tables to handle large numbers of queries and resources.  ... 
doi:10.1109/tencon.2005.300996 fatcat:xqheiwidl5hqbm77xvxhnq2xay

Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing [chapter]

Rajiv Ranjan, Liang Zhao, Xiaomin Wu, Anna Liu, Andres Quiroz, Manish Parashar
2010 Computer Communications and Networks  
These limitations can be overcome by connecting Cloud system components using a structured peer-to-peer network model (such as distributed hash tables (DHTs)).  ...  DHTs offer deterministic information/query routing and discovery with close to logarithmic bounds as regards network message complexity.  ...  Cloud Service Discovery and Load-Balancing Using DHT Overlay Distributed Hash Tables Structured systems such as DHTs offer deterministic query search results within logarithmic bounds on network message  ... 
doi:10.1007/978-1-84996-241-4_12 dblp:series/ccn/RanjanZWLQP10 fatcat:qb4zvollsjdx3acx7pys5bz2am

Data-Centric Routing using Bloom Filters in Wireless Sensor Networks

Peter Hebden, Adrian R. Pearce
2006 2006 Fourth International Conference on Intelligent Sensing and Information Processing  
The first component is our Distributed Asynchronous Clustering protocol (DAC), which self-organises the network into an infrastructure that supports in-network processing, routing, and deployment.  ...  While other data-centric protocols use a flat topology and rely to some extent on flooding, our protocol exploits a two tier hierarchy to provide an adaptable, scalable, and intelligent routing service  ...  Self-Organisation and Data Discovery BGR reduces unproductive communication by disseminaiting information proactively.  ... 
doi:10.1109/icisip.2006.4286065 fatcat:xnhd4cvt25gink2zetgdrcdjdy

An Efficient Enhancement for the Security of A-SAODV Protocol

Hangzhou Li, Jianming Liu, Zhiyong Pang
2013 Research Journal of Applied Sciences Engineering and Technology  
Further optimization has also been imposed on the current SAODV to minimize the processing overhead and delays, while maximizing the routing throughputs.  ...  Besides using adaptive mechanism, the protocol has been optimized in other ways.  ...  optimizing of SAODV based on adaptive mechanism: A-SAODV (Adaptive-SAODV)protocol.  ... 
doi:10.19026/rjaset.5.4604 fatcat:sphjtr2q4ffyvfgee227xccodu
« Previous Showing results 1 — 15 out of 5,286 results