Proceedings of the 2006 ACM CoNEXT Conference on - CoNEXT '06 2006
DOI: 10.1145/1368436.1368462
|View full text |Cite
|
Sign up to set email alerts
|

Stealth distributed hash table

Abstract: Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment. Additionally, we believe that it is this approach that contributes to a limited exploitation of peer-to-peer technologies. Previous work on super-peers in DHTs was proposed to address these performance issues,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
references
References 24 publications
0
0
0
Order By: Relevance