Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed hash tables
biblio
Access Control for Secure Distributed Data Structures in Distributed Hash Tables
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Resiliency
middleware
middle-ware scheme
P2P networks
P2P overlays
Peer-to-peer computing
peer-to-peer networks
pubcrawl
resilience
Metrics
reusable security architecture
secure distributed data structures
Secure File Sharing
security issues
social networking (online)
social networks
social projects
trusted third parties
data structures
authorisation
centralized servers
client-server model
client-server systems
communication protocols
composability
computer network security
Context
Access Control
DDS
DHT
Distributed databases
distributed data storage services
distributed hash tables
encryption
file sharing
Human behavior
biblio
High-Throughput and Memory-Efficient Multimatch Packet Classification Based on Distributed and Pipelined Hash Tables
Submitted by BrandonB on Wed, 05/06/2015 - 10:57am
single-dimensional searches
packet-level accounting
pipelined hash tables
Pipelines
Power demand
search engines
security of data
signal classification
signature tree
signature tree structure
packet classification
steep performance degradation
Table lookup
TCAM
ternary content addressable memory
ternary content addressable memory (TCAM)
Throughput
throughput via
traffic traces
tree data structures
high-throughput multimatch
bit rate 26.8 Gbit/s to 93.1 Gbit/s
complicated multidimensional search
content-addressable storage
Cryptography
distributed hash tables
edge-grouping
encoding
hash table
hash table lookup
asynchronous pipeline architecture
hybrid perfect hash table construction
IEEE transactions
intermediate data structure
interstage parallel access
Memory management
memory-efficient multimatch
multimatch packet classification problem
network intrusion detection
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 7:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet