Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Key-Nodes'
Key-Nodes published presentations and documents on DocSlides.
Network Topologies Topology – how nodes are connected – where there is a wire between 2 nodes.
by danika-pritchard
Routing – the path a message takes to get from ...
Scaling Out Key-Value Storage: Dynamo
by deborah
CS 240: Computing Systems and Concurrency. Lecture...
Dynamo: Amazon’s Highly Available Key-value Store
by pasty-toler
COSC7388 – Advanced Distributed Computing. Pres...
Lymph nodes examination of food animals
by sophie
The Lymphatic System. . Lymph is a medium: . Supp...
Central Nodes (Python and
by pasty-toler
Gephi). Python code . Use . Metrics.py . from . t...
Evaluation of lymph nodes
by ellena-manuel
& pathologic examination. for breast cases. T...
In the Know About Lymph Nodes Fields
by lindy-dunigan
April Fritz, RHIT, CTR. Lymph Nodes Fields . 2...
Nodes, Ties and Influence
by debby-jeon
Chapter 2. 1. Chapter 2, Community Detection and ...
AMCTD: Adaptive Mobility of Courier nodes in
by phoebe-click
Threshold-optimized DBR Protocol for Underwater. ...
RPL Routing Pathology In a Network With a Mix of Nodes Oper
by danika-pritchard
in . Storing and Non-Storing . Modes. draft-. ko....
Detecting Phantom Nodes in Wireless Sensor Networks
by phoebe-click
J. Hwang, T. He, Y. Kim. Presented by Shan . Gao....
THE NUMBER OF RESECTED NON METASTATIC LYMPH NODES PREDICTS
by conchita-marotz
Georgia Doulami, . Zoi. . Vrakopoulou. , . Nikol...
Scaling Services: Partitioning, Hashing, Key-Value Storage
by vicente461
COS 418: . Distributed Systems. Lecture 12. Kyle J...
FAWN: A FAST ARRAY OF WIMPY NODES
by sophia
. D. G. Andersen. 1. , J. Franklin. 1. , M. Kami...
Chapter 21: Parallel and Distributed Storage
by brooke
Introduction. Parallel machines have become quite ...
Scaling Out Key-Value Storage
by reimbursevolkswagon
COS 418: . Distributed Systems. Logan Stafman. [Ad...
Dynamo: Amazon’s Highly Available Key-value Store
by alexa-scheidler
Giuseppe DeCandia, Deniz Hastorun,. Madan Jampan...
Dynamo: Amazon’s Highly Available Key-value Store
by kittie-lecroy
Giuseppe DeCandia, Deniz Hastorun,. Madan Jampan...
Amazon’s Dynamo
by phoebe-click
Entony. Lekhtman. About Amazon. . e-commerce. A...
Distributed Hash Tables
by yoshiko-marsland
Chord and Dynamo. Costin Raiciu,. Advanced Topics...
Structured P2P Network
by liane-varnes
Group14: . Qiwei. Zhang; Shi Yan; . Dawei. . Ou...
Amazon’s Key-Value Store: Dynamo
by phoebe-click
DeCandia,Hastorun,Jampani. , . Kakulapati. , . La...
PlanetLab
by sherrill-nordquist
www.planet-lab.org. What is . PlanetLab. ?. A gro...
Topic 1: Sensor Networks
by briana-ranney
(Long Lecture). Jorge J. Gómez. Trickle: A Self-...
EECS 262a Advanced Topics in Computer Systems Lecture 22 P2P Storage: Dynamo November 14th, 2012
by zayn222
Lecture . 22. P2P Storage: Dynamo. November . 14. ...
EECS 262a Advanced Topics in Computer Systems Lecture 22 P2P Storage: Dynamo November 17th, 2014
by peyton408
Lecture 22. P2P Storage: Dynamo. November . 17. th...
Etcetera! CMSC 491 Hadoop-Based Distributed Computing
by okelly
Spring . 2016. Adam Shook. Agenda. Advanced HDFS ....
DHT Routing Geometries and Chord
by candy
Dietrich Geisler. Initial Attempts. Freenet, Gnute...
Overview of this week Debugging tips for ML algorithms
by bitechmu
Graph algorithms . A prototypical graph algorithm:...
CC5212-1 Procesamiento
by loaiatdog
Masivo. de . Datos. Otoño. . 2018. Lecture . 8....
D* Lite and Dynamic pathfinding
by yoshiko-marsland
Adrian Sotelo. CS582. Spring 2009 Digipen Institu...
SECURITY IN SENSOR NETWORKS
by min-jolicoeur
BY. SASIKIRAN V.L. REDDY. STUDENT NO....
Kaleidoscope – Adding Colors to Kademlia
by pamella-moone
Gil Einziger, Roy . Friedman, . Eyal. . Kibbar. ...
Dynamo:
by jane-oiler
Amazon’s Highly Available Key-Value Store. Pres...
FAWN: Fast Array of Wimpy Nodes
by lindy-dunigan
A technical paper presentation in fulfillment of ...
EECS 262a
by trish-goza
Advanced Topics in Computer Systems. Lecture . 22...
Harikrishnan Karunakaran
by celsa-spraggs
Sulabha Balan. Keyword Searching and Browsing in...
Varnish: Increasing Data Privacy with Self-Destructing Data
by kittie-lecroy
Written By. Roxana . Geambasu. ; . Tadayoshi. Ko...
Cassandra Training
by alida-meadow
Introduction & Data . Modeling. Aims. Introdu...
Link Layer Key Revocation and Rekeying for the
by warlikebikers
Adaptive Key Establishment Scheme. Benedikt Bock. ...
Load More...