Sciweavers

1744 search results - page 136 / 349
» The Steganographic File System
Sort
View
ICST
2008
IEEE
15 years 10 months ago
Empirical Software Change Impact Analysis using Singular Value Decomposition
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
Mark Sherriff, Laurie Williams
144
Voted
IWMMDBMS
1998
92views more  IWMMDBMS 1998»
15 years 5 months ago
Version Management and Recoverability for Large Object Data
Most applications that access large data objects do so through file systems, but file systems provide an incomplete solution, as they maintain insufficient metadata and do not pro...
Randal C. Burns, Inderpal Narang
107
Voted
JCM
2006
104views more  JCM 2006»
15 years 3 months ago
CLog: Low Cost Gigabit Full Packet Logging
Abstract-- Creating high quality network trace files is a difficult task to accomplish on a limited budget. High network speeds may overburden an individual system running packet l...
Chad D. Mano, Jeff Smith, Bill Bordogna, Andrew Ma...
130
Voted
USS
2010
15 years 1 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich
117
Voted
EUROSYS
2011
ACM
14 years 7 months ago
Scarlett: coping with skewed content popularity in mapreduce clusters
To improve data availability and resilience MapReduce frameworks use file systems that replicate data uniformly. However, analysis of job logs from a large production cluster show...
Ganesh Ananthanarayanan, Sameer Agarwal, Srikanth ...