Sciweavers

3451 search results - page 8 / 691
» Security of Backup Data
Sort
View
MM
2005
ACM
371views Multimedia» more  MM 2005»
14 years 29 days ago
Data grid for large-scale medical image archive and analysis
Storage and retrieval technology for large-scale medical image systems has matured significantly during the past ten years but many implementations still lack cost-effective backu...
H. K. Huang, Aifeng Zhang, Brent J. Liu, Zheng Zho...
COMCOM
2006
120views more  COMCOM 2006»
13 years 7 months ago
Explicit routing in multicast overlay networks
Application Level Multicast is a promising approach to overcome the deployment problems of IP level multicast by establishing delivery trees using overlay links among end systems....
Torsten Braun, Vijay Arya, Thierry Turletti
CCS
2007
ACM
14 years 1 months ago
Pors: proofs of retrievability for large files
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier...
Ari Juels, Burton S. Kaliski Jr.
IPPS
2005
IEEE
14 years 1 months ago
Fault-Tolerant Parallel Applications with Dynamic Parallel Schedules
Commodity computer clusters are often composed of hundreds of computing nodes. These generally off-the-shelf systems are not designed for high reliability. Node failures therefore...
Sebastian Gerlach, Roger D. Hersch
LISA
2008
13 years 9 months ago
IZO: Applications of Large-Window Compression to Virtual Machine Management
The increased use of virtual machines in the enterprise environment presents an interesting new set of challenges for the administrators of today's information systems. In ad...
Mark A. Smith, Jan Pieper, Daniel Gruhl, Lucas Vil...