Sciweavers

1744 search results - page 121 / 349
» The Steganographic File System
Sort
View
237
Voted
SPIRE
2001
Springer
15 years 8 months ago
Distributed Query Processing Using Partitioned Inverted Files
In this paper, we study query processing in a distributed text database. The novelty is a real distributed architecture implementation that offers concurrent query service. The di...
Claudine Santos Badue, Ricardo A. Baeza-Yates, Ber...
119
Voted
IMF
2007
15 years 5 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
125
Voted
CN
2007
100views more  CN 2007»
15 years 3 months ago
Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases
Peer-to-peer networks have been commonly used for tasks such as file sharing or file distribution. We study a class of cooperative file distribution systems where a file is br...
Ernst W. Biersack, Damiano Carra, Renato Lo Cigno,...
116
Voted
MASCOTS
2004
15 years 5 months ago
Causal Multicast in Mobile Networks
Distributed applications using file sharing and file replication, conferencing, and delivery in multimedia systems often need to use the semantics of causal multicast. Causal mult...
Punit Chandra, Ajay D. Kshemkalyani
CMG
2000
15 years 5 months ago
Configuring the Windows 2000 I/O Subsystem
The Windows 2000 operating system brought considerable changes to the capabilities and configuration options of the I/O subsystem over those available with the Windows NT operatin...
Odysseas I. Pentakalos