Results 1 - 10
of
4,279
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications
- ACM SIGCOMM
, 2001
"... A fundamental problem that confronts peer-to-peer applications is the efficient location of the node that stores a desired data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto ..."
Abstract
-
Cited by 809 (15 self)
- Add to MetaCart
onto a node. Data location can be easily implemented on top of Chord by associating a key with each data item, and storing the key/data item pair at the node to which the key maps. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
- SIGCOMM'01
, 2001
"... A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto ..."
Abstract
-
Cited by 4469 (69 self)
- Add to MetaCart
a node. Data location can be easily implemented on top of Chord by associating a key with each data item, and storing the key/data item pair at the node to which the key maps. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously
Fibonacci Heaps and Their Uses in Improved Network optimization algorithms
, 1987
"... In this paper we develop a new data structure for implementing heaps (priority queues). Our structure, Fibonacci heaps (abbreviated F-heaps), extends the binomial queues proposed by Vuillemin and studied further by Brown. F-heaps support arbitrary deletion from an n-item heap in qlogn) amortized tim ..."
Abstract
-
Cited by 739 (18 self)
- Add to MetaCart
In this paper we develop a new data structure for implementing heaps (priority queues). Our structure, Fibonacci heaps (abbreviated F-heaps), extends the binomial queues proposed by Vuillemin and studied further by Brown. F-heaps support arbitrary deletion from an n-item heap in qlogn) amortized
Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh
, 2003
"... In recent years, overlay networks have become an effective alternative to IP multicast for efficient point to multipoint communication across the Internet. Typically, nodes self-organize with the goal of forming an efficient overlay tree, one that meets performance targets without placing undue burd ..."
Abstract
-
Cited by 424 (22 self)
- Add to MetaCart
should be distributed in a disjoint manner to strategic points in the network. Individual Bullet receivers are then responsible for locating and retrieving the data from multiple points in parallel. Key contributions of this work include: i) an algorithm that sends data to di#erent points in the overlay
An optimal class of symmetric key generation systems", Report LiTH-ISY-I
, 1984
"... I t is sometimes required t h a t user pairs in a network share secret information t o be used fo r mutual identification or as a key in a cipher system. I f the network is large i t becomes impractical or even impossible to store all keys securely at the users. A natural solution then is t o supply ..."
Abstract
-
Cited by 303 (0 self)
- Add to MetaCart
I t is sometimes required t h a t user pairs in a network share secret information t o be used fo r mutual identification or as a key in a cipher system. I f the network is large i t becomes impractical or even impossible to store all keys securely at the users. A natural solution then is t o
Pragmatics of measuring recognition memory: Applications to dementia and amnesia.
- Journal of Experimental Psychology: General,
, 1988
"... SUMMARY This article has two purposes. The first is to describe four theoretical models of yesno recognition memory and present their associated measures of discrimination and response bias. These models are then applied to a set of data from normal subjects to determine which pairs of discriminati ..."
Abstract
-
Cited by 326 (0 self)
- Add to MetaCart
SUMMARY This article has two purposes. The first is to describe four theoretical models of yesno recognition memory and present their associated measures of discrimination and response bias. These models are then applied to a set of data from normal subjects to determine which pairs
Short-Term Retention of Individual Verbal Items
- Journal of Experimental Psychology
, 1959
"... It is apparent that the acquisition of verbal habits depends on the effects of a given occasion being carried over into later repetitions of the situation. Nevertheless, textbooks separate acquisition and retention into distinct categories. The limitation of discussions of retention to long-term cha ..."
Abstract
-
Cited by 245 (0 self)
- Add to MetaCart
-term characteristics is necessary in large part by the scarcity of data on the course of retention over intervals of the order of magnitude of the time elapsing between successive repetitions in an acquisition study. The presence of a retentive function within the acquisition process was postulated by Hull (1940
Optimistic fair exchange of digital signatures
- IEEE Journal on Selected Areas in Communications
, 1998
"... Abstract. We present a new protocol that allows two players to ex-change digital signatures over the Internet in a fair way, so that either each player gets the other’s signature, or neither player does. The ob-vious application is where the signatures represent items of value, for example, an elect ..."
Abstract
-
Cited by 290 (10 self)
- Add to MetaCart
, an electronic check or airline ticket. The protocol can also be adapted to exchange encrypted data. The protocol relies on a trusted third party, but is “optimistic, ” in that the third party is only needed in cases where one player attempts to cheat or simply crashes. A key feature of our protocol is that a
Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem
- DATA MINING AND KNOWLEDGE DISCOVERY
, 1998
"... The problem of merging multiple databases of information about common entities is frequently encountered in KDD and decision support applications in large commercial and government organizations. The problem we study is often called the Merge/Purge problem and is difficult to solve both in scale and ..."
Abstract
-
Cited by 250 (0 self)
- Add to MetaCart
and accuracy. Large repositories of data typically have numerous duplicate information entries about the same entities that are difficult to cull together without an intelligent "equational theory" that identifies equivalent items by a complex, domain-dependent matching process. We have developed a
Interactive Deduplication using Active Learning
, 2002
"... Deduplication is a key operation in integrating data from multiple sources. The main challenge in this task is designing a function that can resolve when a pair of records refer to the same entity in spite of various data inconsistencies. Most existing systems use hand-coded functions. One way to ov ..."
Abstract
-
Cited by 242 (5 self)
- Add to MetaCart
Deduplication is a key operation in integrating data from multiple sources. The main challenge in this task is designing a function that can resolve when a pair of records refer to the same entity in spite of various data inconsistencies. Most existing systems use hand-coded functions. One way
Results 1 - 10
of
4,279