Sciweavers

319 search results - page 27 / 64
» Maintaining Consistency of Client-Cached Data
Sort
View
EUROSYS
2008
ACM
14 years 7 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
CCS
2009
ACM
14 years 4 months ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...
FAST
2011
13 years 1 months ago
FastScale: Accelerate RAID Scaling by Minimizing Data Migration
Previous approaches to RAID scaling either require a very large amount of data to be migrated, or cannot tolerate multiple disk additions without resulting in disk imbalance. In t...
Weimin Zheng, Guangyan Zhang
DELOS
2007
13 years 11 months ago
Integration of Reliable Sensor Data Stream Management into Digital Libraries
Data Stream Management (DSM) addresses the continuous processing of sensor data. DSM requires the combination of stream operators, which may run on different distributed devices, ...
Gert Brettlecker, Heiko Schuldt, Peter M. Fischer,...
BROADNETS
2005
IEEE
14 years 3 months ago
A Lightweight framework for source-to-sink data transfer in wireless sensor networks
— Lightweight protocols that are both bandwidth and power thrifty are desirable for sensor networks. In addition, for many sensor network applications, timeliness of data deliver...
James Jobin, Zhenqiang Ye, Honomount Rawat, Srikan...