Sciweavers

1733 search results - page 148 / 347
» Self-Similarity in File Systems
Sort
View
HICSS
2006
IEEE
142views Biometrics» more  HICSS 2006»
15 years 10 months ago
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Neil C. Rowe
SOSP
1997
ACM
15 years 5 months ago
Distributed Schedule Management in the Tiger Video Fileserver
Tiger is a scalable, fault-tolerant video file server constructed from a collection of computers connected by a switched network. All content files are striped across all of the c...
William J. Bolosky, Robert P. Fitzgerald, John R. ...
MSS
2005
IEEE
136views Hardware» more  MSS 2005»
15 years 10 months ago
OpenSMS
Systems Managed Storage is a proven concept in traditional mainframe computing. Client-Server operating systems have traditionally lacked the tape I/O subsystem, file system intel...
Stephen Cranage
JOT
2008
142views more  JOT 2008»
15 years 4 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon
141
Voted
LISA
2007
15 years 6 months ago
Application Buffer-Cache Management for Performance: Running the World's Largest MRTG
An operating system’s readahead and buffer-cache behaviors can significantly impact application performance; most often these better performance, but occasionally they worsen it...
David Plonka, Archit Gupta, Dale Carder