1 |
M. S. Divya and S. K. Goyal, "ElasticSearch: an advanced and quick search technique to handle voluminous data," Compusoft, vol. 2, no. 6, pp. 171-175, 2013.
|
2 |
M. T. Gonzalez-Aparicio, A. Ogunyadeka, M. Younas, J. Tuya, and R. Casado, "Transaction processing in consistency-aware user's applications deployed on NoSQL databases," Human-centric Computing and Information Sciences, vol. 7, article no. 7, 2017. https://doi.org/10.1186/s13673-017-0088-3
DOI
|
3 |
P. Gupta, S. K. Singh, D. Yadav, and A. K. Sharma, "An improved approach to ranking web documents," Journal of Information Processing Systems, vol. 9, no. 2, pp. 217-236, 2013.
DOI
|
4 |
Z. N. Peterson, M. Gondree, and R. Beverly, "A position paper on data sovereignty: the importance of geolocating data in the cloud," in Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), Portland, OR, 2011.
|
5 |
EOSIO Developer Portal [Online]. Available: https://developers.eos.io.
|
6 |
M. Zineddine, "Search engines crawling process optimization: a webserver approach," Internet Research, vol. 26, no. 1, pp. 311-331, 2016.
DOI
|
7 |
R. Khan, S. U. Khan, R. Zaheer, and S. Khan, "Future internet: The internet of things architecture, possible applications and key challenges," in Proceedings of 2012 10th International Conference on Frontiers of Information Technology, Islamabad, Pakistan, 2012, pp. 257-260.
|
8 |
H. W. Kim and Y. S. Jeong, "Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain," Human-centric Computing and Information Sciences, vol. 8, article no. 11, 2018. https://doi.org/10.1186/s13673-018-0136-7
DOI
|
9 |
Sematext Blog, Elastic Search: Distributed, Lucene-based Search Engine, May 2010. https://sematext.com/blog/solr-vs-elasticsearch-differences/
|
10 |
F. Idelberger, G. Governatori, R. Riveret, and G. Sartor, "Evaluation of logic-based smart contracts for blockchain systems," in Rules and Rule Markup Languages for the Semantic Web. Cham, Switzerland: Springer, 2016, pp. 167-183.
|
11 |
Distil Networks, "The 2018 Bad Bot Report," https://resources.distilnetworks.com/white-paper-reports/2018-bad-bot-report.
|
12 |
K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the Internet of Things," IEEE Access, vol. 4, pp. 2292-2303, 2016.
DOI
|
13 |
Y. Li, P. Han, C. Liu, and B. Fang, "Automatically crawling dynamic web applications via proxy-based JavaScript injection and runtime analysis," in Proceedings of 2018 IEEE 3rd International Conference on Data Science in Cyberspace (DSC), Guangzhou, China, 2018, pp. 242-249.
|
14 |
A. Rangaswamy, C. L. Giles, and S. Seres, "A strategic perspective on search engines: thought candies for practitioners and researchers," Journal of Interactive Marketing, vol. 23, no. 1, pp. 49-60, 2009.
DOI
|
15 |
T. Bouma, "Self-Sovereign Identity, Shifting the Locus of Control," 2019 [Online]. Available: https://trbouma.medium.com/self-sovereign-identity-shifting-the-locus-of-control-10da1c8757ad.
|
16 |
P. Owezarski, "On the impact of DoS attacks on Internet traffic characteristics and QoS," in Proceedings of the 14th International Conference on Computer Communications and Networks, San Diego, CA, 2005, pp. 269-274.
|
17 |
A. Tobin and D. Reed, "The inevitable rise of self-sovereign identity," The Sovrin Foundation, Provo, UT, 2017.
|
18 |
S. Nakamoto, "Bitcoin: a peer-to-peer electronic cash system," 2008 [Online]. Available: https://bitcoin.org/en/bitcoin-paper.
|
19 |
G. T. Nguyen and K. Kim, "A survey about consensus algorithms used in blockchain," Journal of Information Processing Systems, vol. 14, no. 1, pp. 101-128, 2018.
DOI
|
20 |
N. Szabo, "The idea of smart contracts," 1997 [Online]. Available: https://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/idea.html.
|