Sciweavers

1733 search results - page 315 / 347
» Self-Similarity in File Systems
Sort
View
CASES
2006
ACM
14 years 1 months ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
USENIX
2008
14 years 3 days ago
Fast, Inexpensive Content-Addressed Storage in Foundation
Foundation is a preservation system for users' personal, digital artifacts. Foundation preserves all of a user's data and its dependencies--fonts, programs, plugins, ker...
Sean C. Rhea, Russ Cox, Alex Pesterev
USENIX
2008
14 years 3 days ago
Idle Read After Write - IRAW
Despite a low occurrence rate, silent data corruption represents a growing concern for storage systems designers. Throughout the storage hierarchy, from the file system down to th...
Alma Riska, Erik Riedel
USS
2008
14 years 3 days ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
CONEXT
2008
ACM
13 years 11 months ago
Peer-assisted content distribution with prices
Peer-assisted content distribution matches user demand for content with available supply at other peers in the network. Inspired by this supply-and-demand interpretation of the na...
Christina Aperjis, Michael J. Freedman, Ramesh Joh...