Sciweavers

1744 search results - page 149 / 349
» The Steganographic File System
Sort
View
114
Voted
CN
1999
87views more  CN 1999»
15 years 3 months ago
The Gecko NFS Web Proxy
The World-Wide Web provides remote access to pages using its own naming scheme (URLs), transfer protocol (HTTP), and cache algorithms. Not only does using these special-purpose me...
Scott M. Baker, John H. Hartman
130
Voted
TCAD
2010
90views more  TCAD 2010»
14 years 10 months ago
Fast, Nearly Optimal ISE Identification With I/O Serialization Through Maximal Clique Enumeration
The last decade has witnessed the emergence of the application-specific instruction-set processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user ...
Ajay K. Verma, Philip Brisk, Paolo Ienne
112
Voted
LISA
2004
15 years 5 months ago
LifeBoat: An Autonomic Backup and Restore Solution
We present an innovative backup and restore solution, called LifeBoat, for Windows machines. Our solution provides for local and remote backups and ``bare metal'' restor...
Ted Bonkenburg, Dejan Diklic, Benjamin Reed, Mark ...
128
Voted
HICSS
2006
IEEE
142views Biometrics» more  HICSS 2006»
15 years 9 months ago
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Neil C. Rowe
161
Voted
SOSP
1997
ACM
15 years 5 months ago
Distributed Schedule Management in the Tiger Video Fileserver
Tiger is a scalable, fault-tolerant video file server constructed from a collection of computers connected by a switched network. All content files are striped across all of the c...
William J. Bolosky, Robert P. Fitzgerald, John R. ...