Sciweavers

1733 search results - page 149 / 347
» Self-Similarity in File Systems
Sort
View
SIGOPS
2008
116views more  SIGOPS 2008»
15 years 4 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
MASCOTS
2008
15 years 6 months ago
Multi-Torrent: A Performance Study
BitTorrent (BT) has become an extremely popular and successful peer-to-peer (P2P) file sharing system. Although empirical evidence suggests that most nodes participate in multiple...
Yan Yang, Alix L. H. Chow, Leana Golubchik
ACSAC
1999
IEEE
15 years 8 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
USENIX
2001
15 years 5 months ago
Sandboxing Applications
Users frequently have to choose between functionality and security. When running popular Web browsers or email clients, they frequently find themselves turning off features such a...
Vassilis Prevelakis, Diomidis Spinellis
PE
2006
Springer
91views Optimization» more  PE 2006»
15 years 4 months ago
Performance of peer-to-peer networks: Service capacity and role of resource sharing policies
In this paper we model and study the performance of peer-to-peer (P2P) file sharing systems in terms of their `service capacity'. We identify two regimes of interest: the tra...
Xiangying Yang, Gustavo de Veciana