Sciweavers

1945 search results - page 106 / 389
» Survivable Information Storage Systems
Sort
View
IH
1998
Springer
14 years 2 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
SIGIR
2010
ACM
14 years 1 months ago
Query quality: user ratings and system predictions
Numerous studies have examined the ability of query performance prediction methods to estimate a query’s quality for system effectiveness measures (such as average precision). ...
Claudia Hauff, Franciska de Jong, Diane Kelly, Lei...
SIGIR
2009
ACM
14 years 4 months ago
SUSHI: scoring scaled samples for server selection
Modern techniques for distributed information retrieval use a set of documents sampled from each server, but these samples have been underutilised in server selection. We describe...
Paul Thomas, Milad Shokouhi
WWW
2008
ACM
14 years 10 months ago
The locative web
The concept of location has become very popular in many applications on the Web, in particular for those which aim at connecting the real world with resources on the Web. However,...
Erik Wilde, Martin Kofahl
DSN
2009
IEEE
14 years 1 months ago
An efficient XOR-scheduling algorithm for erasure codes encoding
In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data w...
Jianqiang Luo, Lihao Xu, James S. Plank