Back to Results
First PageMeta Content
Chord / Distributed hash table / Internet / Peer-to-peer / Sybil attack / Routing table / Routing / Tree / Kademlia / Distributed data storage / Computing / Network architecture


Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 24, 2009
Add to Reading List

Document Date: 2009-09-29 02:01:46


Open Document

File Size: 484,50 KB

Share Result on Facebook

Company

LiveJournal / YouTube / /

Facility

store O / /

IndustryTerm

collective support network / unstructured search using random walks / Internet services / decentralized systems / distributed protocol / social networks / above algorithm / social network / unstructured protocol / existing social networks / /

Organization

MIT / /

Person

M. Frans Kaashoek / Chris Lesniewski-Laas / /

Product

Pentax K-x Digital Camera / /

ProgrammingLanguage

L / /

Technology

above algorithm / routing protocol / Sybil-resistant protocols / unstructured protocol / public key / artificial intelligence / DHT routing protocol / DHT protocol / peer-to-peer / 4.1 Strawman protocol / structured Wh¯anaungatanga protocol / social network Any Sybil-proof protocol / mobile phones / distributed protocol / Simulation / Whanaungatanga protocol / /

SocialTag