Sciweavers

96 search results - page 11 / 20
» Establishing Trust in Distributed Storage Providers
Sort
View
MOBISYS
2008
ACM
14 years 6 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
P2P
2006
IEEE
153views Communications» more  P2P 2006»
14 years 1 months ago
Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models
Content storage in a distributed collaborative environment uses redundancy for better resilience and thus provides good availability and durability. In a peer-to-peer environment,...
Anwitaman Datta, Karl Aberer
SIGMETRICS
2008
ACM
121views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Disk scrubbing versus intra-disk redundancy for high-reliability raid storage systems
Two schemes proposed to cope with unrecoverable or latent media errors and enhance the reliability of RAID systems are examined. The first scheme is the established, widely used d...
Ilias Iliadis, Robert Haas, Xiao-Yu Hu, Evangelos ...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 1 months ago
Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...
CISIS
2009
IEEE
14 years 2 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...