期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Hash Table Assisted Efficient File Level De-Duplication Scheme in SD-IoV Assisted Sensing Devices
1
作者 Ghawar Said Ata Ullah +4 位作者 Anwar Ghani Muhammad Azeem Khalid Yahya Muhammad Bilal Sayed Chhattan Shah 《Intelligent Automation & Soft Computing》 2023年第10期83-99,共17页
The Internet of Things(IoT)and cloud technologies have encouraged massive data storage at central repositories.Software-defined networks(SDN)support the processing of data and restrict the transmission of duplicate va... The Internet of Things(IoT)and cloud technologies have encouraged massive data storage at central repositories.Software-defined networks(SDN)support the processing of data and restrict the transmission of duplicate values.It is necessary to use a data de-duplication mechanism to reduce communication costs and storage overhead.Existing State of the art schemes suffer from computational overhead due to deterministic or random tree-based tags generation which further increases as the file size grows.This paper presents an efficient file-level de-duplication scheme(EFDS)where the cost of creating tags is reduced by employing a hash table with key-value pair for each block of the file.Further,an algorithm for hash table-based duplicate block identification and storage(HDBIS)is presented based on fingerprints that maintain a linked list of similar duplicate blocks on the same index.Hash tables normally have a consistent time complexity for lookup,generating,and deleting stored data regardless of the input size.The experiential results show that the proposed EFDS scheme performs better compared to its counterparts. 展开更多
关键词 hash table de-duplication linked list IoT sensing devices
下载PDF
Dense Mapping From an Accurate Tracking SLAM 被引量:3
2
作者 Weijie Huang Guoshan Zhang Xiaowei Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第6期1565-1574,共10页
In recent years, reconstructing a sparse map from a simultaneous localization and mapping(SLAM) system on a conventional CPU has undergone remarkable progress. However,obtaining a dense map from the system often requi... In recent years, reconstructing a sparse map from a simultaneous localization and mapping(SLAM) system on a conventional CPU has undergone remarkable progress. However,obtaining a dense map from the system often requires a highperformance GPU to accelerate computation. This paper proposes a dense mapping approach which can remove outliers and obtain a clean 3D model using a CPU in real-time. The dense mapping approach processes keyframes and establishes data association by using multi-threading technology. The outliers are removed by changing detections of associated vertices between keyframes. The implicit surface data of inliers is represented by a truncated signed distance function and fused with an adaptive weight. A global hash table and a local hash table are used to store and retrieve surface data for data-reuse. Experiment results show that the proposed approach can precisely remove the outliers in scene and obtain a dense 3D map with a better visual effect in real-time. 展开更多
关键词 Adaptive weights data association dense mapping hash table simultaneous localization and mapping(SLAM)
下载PDF
Novel load balancing DHT scheme for the heterogeneous system
3
作者 Li Yujun Lu Xianliang Hou Mengshu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期835-842,共8页
The capacities of the nodes in the peer-to-peer system are strongly heterogeneous, hence one can benefit from distributing the load, based on the capacity of the nodes. At first a model is discussed to evaluate the lo... The capacities of the nodes in the peer-to-peer system are strongly heterogeneous, hence one can benefit from distributing the load, based on the capacity of the nodes. At first a model is discussed to evaluate the load balancing of the heterogeneous system, and then a novel load balancing scheme is proposed based on the concept of logical servers and the randomized binary tree, and theoretical guarantees are given. Finally, the feasibility of the scheme using extensive simulations is proven. 展开更多
关键词 distributed hash table HETEROGENEITY randomized binary tree load balancing
下载PDF
Outsourced Privacy-Preserving Anomaly Detection in Time Series of Multi-Party
4
作者 Chunkai Zhang Wei Zuo +2 位作者 Peng Yang Ye Li Xuan Wang 《China Communications》 SCIE CSCD 2022年第2期201-213,共13页
Anomaly detection has practical significance for finding unusual patterns in time series.However,most existing algorithms may lose some important information in time series presentation and have high time complexity.A... Anomaly detection has practical significance for finding unusual patterns in time series.However,most existing algorithms may lose some important information in time series presentation and have high time complexity.Another problem is that privacy-preserving was not taken into account in these algorithms.In this paper,we propose a new data structure named Interval Hash Table(IHTable)to capture more original information of time series and design a fast anomaly detection algorithm based on Interval Hash Table(ADIHT).The key insight of ADIHT is distributions of normal subsequences are always similar while distributions of anomaly subsequences are different and random by contrast.Furthermore,to make our proposed algorithm fit for anomaly detection under multiple participation,we propose a privacy-preserving anomaly detection scheme named OP-ADIHT based on ADIHT and homomorphic encryption.Compared with existing anomaly detection schemes with privacy-preserving,OP-ADIHT needs less communication cost and calculation cost.Security analysis of different circumstances also shows that OP-ADIHT will not leak the privacy information of participants.Extensive experiments results show that ADIHT can outperform most anomaly detection algorithms and perform close to the best results in terms of AUC-ROC,and ADIHT needs the least time. 展开更多
关键词 anomaly detection interval hash table PRIVACY-PRESERVING multiple participants
下载PDF
Load distributions of some classic DHTs
5
作者 Nie Xiaowen Lu Xianliang +2 位作者 Zhou Xu Tang Hui Li Lin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期400-404,共5页
The load balance is a critical issue of distributed Hash table (DHT), and the previous work shows that there exists O(logn) imbalance of load in Chord. The load distribution of Chord, Pastry, and the virtual serve... The load balance is a critical issue of distributed Hash table (DHT), and the previous work shows that there exists O(logn) imbalance of load in Chord. The load distribution of Chord, Pastry, and the virtual servers (VS) balancing scheme and deduces the closed form expressions of the probability density function (PDF) and cumulative distribution function (CDF) of the load in these DHTs is analyzes. The analysis and simulation show that the load of all these DHTs obeys the gamma distribution with similar formed parameters. 展开更多
关键词 distributed hash table load balance probability density function cumulative distribution function
下载PDF
PChord:a distributed hash table for P2P network
6
作者 Haiping HUANG Yan ZHENG +1 位作者 Hongwei CHEN Ruchuan WANG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2010年第1期49-58,共10页
As a solution for data storage and information sharing for peer-to-peer(P2P)networks,a novel distributed hash table(DHT)structure called PChord is presented in this paper.PChord adopts a bi-directional searching mecha... As a solution for data storage and information sharing for peer-to-peer(P2P)networks,a novel distributed hash table(DHT)structure called PChord is presented in this paper.PChord adopts a bi-directional searching mechanism superior to Chord and enhances the structure of the finger table.Based on Hilbert space filling curve,PChord realizes the mapping mechanism for multikeyword approximate searching.Compared with the Chord and Kademlia protocols,PChord evidently increases speed on resource searching and message spreading via theoretic proof and simulation results,while maintaining satisfactory load balance. 展开更多
关键词 distributed hash table(DHT) peer-to-peer(P2P) bi-directional searching
原文传递
A P2P Load Balancing-Supported ID Management Algorithm
7
作者 WANG Bin SHEN Qingguo 《Wuhan University Journal of Natural Sciences》 CAS 2011年第4期293-300,共8页
Load balancing is a critical issue in peer-to-peer networks. DHT (distributed hash tables) do not evenly partition the hash-function range, and some nodes get a larger portion of it. The loads of some nodes are as m... Load balancing is a critical issue in peer-to-peer networks. DHT (distributed hash tables) do not evenly partition the hash-function range, and some nodes get a larger portion of it. The loads of some nodes are as much as O(log n) times the average. In this paper, a low-cost, decentralized algorithm for ID allocation with complete knowledge in DHT-based system is proposed. It can adjust system load on nodes’ departure. It is proved that the ratio of longest arc to shortest arc is no more than 4 with high probability when network scale increases non-strictly. When network scale decreases from one stable state to another, algorithm can repair the unevenness of nodes distribution. The performance is analyzed in simulation. Simulating results show that updating messages only occupy a little of network bandwidth. 展开更多
关键词 P2P load balance ID allocation DHT (distributed hash tables
原文传递
HAPS:Supporting Effective and Effcient Full-Text P2P Search with Peer Dynamics 被引量:1
8
作者 任祖杰 陈珂 +3 位作者 寿黎但 陈刚 贝毅君 李晓燕 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第3期482-498,共17页
Recently, peer-to-peer (P2P) search technique has become popular in the Web as an alternative to centralized search due to its high scalability and low deployment-cost. However, P2P search systems are known to suffe... Recently, peer-to-peer (P2P) search technique has become popular in the Web as an alternative to centralized search due to its high scalability and low deployment-cost. However, P2P search systems are known to suffer from the problem of peer dynamics, such as frequent node join/leave and document changes, which cause serious performance degradation. This paper presents the architecture of a P2P search system that supports full-text search in an overlay network with peer dynamics. This architecture, namely HAPS, consists of two layers of peers. The upper layer is a DHT (distributed hash table) network interconnected by some super peers (which we refer to as hubs). Each hub maintains distributed data structures called search directories, which could be used to guide the query and to control the search cost. The bottom layer consists of clusters of ordinary peers (called providers), which can receive queries and return relevant results. Extensive experimental results indicate that HAPS can perform searches effectively and efficiently. In addition, the performance comparison illustrates that HAPS outperforms a fiat structured system and a hierarchical unstructured system in the environment with peer dynamics. 展开更多
关键词 P2P network DHT (distributed hash table) CHURN keyword search
原文传递
Modeling structured peer-to-peer systems 被引量:1
9
作者 HAN Li LEI Zhen-ming 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第3期76-80,共5页
Distributed network architecture and dynamic change of nodes makes the operation of structured peer-to-peer networks unpredictable. This article aims to present a research on the running rule of structured peer-to-pee... Distributed network architecture and dynamic change of nodes makes the operation of structured peer-to-peer networks unpredictable. This article aims to present a research on the running rule of structured peer-to-peer networks through a mathematical model. The proposed model provides a low-complexity means to estimate the performance of a structured peer-to-peer network from two aspects: the average existent time of a node and probability of returning to a temporarily steady state of network. On the basis of the results, it can be concluded that the proposed structured peer-to-peer network is suitable for those conditions where the frequency of node change is under limited value, and this value mainly depends on the initializing time of the node. Otherwise, structured peer-to-peer network can be abstracted as a network queuing system, which is composed of many node queuing systems in a meshy way and the relation between the throughput of the node system and network system is analyzed. 展开更多
关键词 peer-to-peer network distributed hash table bith and death Markov model average existent time temporarily steady state
原文传递
Publish/subscribe based information dissemination over VANET utilizing DHT
10
作者 Tulika PANDEY Deepak GARG Manoj Madhav GORE 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第6期713-724,共12页
A vehicular ad-hoc network (VANET) can be visualized as a network of moving vehicles communicating in an asynchronous and autonomous fashion. Efficient and scalable information dissemination in VANET applications is... A vehicular ad-hoc network (VANET) can be visualized as a network of moving vehicles communicating in an asynchronous and autonomous fashion. Efficient and scalable information dissemination in VANET applications is a major challenge due to the movement of vehicles which causes unpredictable changes in network topology. The publish/subscribe communication paradigm provides decoupling in time, space, and synchronization between communicating entities, and presents itself as an elegant solution for information dissemination for VANET like environments. In this paper, we propose our approach for information dissemination which utilizes publish/subscribe and distributed hash table (DHT) based overlay networks. In our approach, we assume a hybrid VANET consisting of stationary info-stations and moving vehicles. These info-stations are installed at every major intersection of the city and vehicles can take the role of publisher, subscriber, or broker depending upon the context. The info-stations form a DHT based broker overlay among themselves and act as rendezvous points for related publications and subscriptions. Further, info-stations also assist in locating vehicles that have subscribed to information items. We consider different possible deployments of this hybrid VANET with respect to the number of info-stations and their physical connectivity with each other. We perform simulations to assess the performance of our approach in these different deployment scenarios and discuss their applicability in urban and semi-urban areas. 展开更多
关键词 vehicular ad-hoc network (VANET) peer-to- peer overlay network publish/subscribe communication paradigm distributed hash table (DHT)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部