Sciweavers

1744 search results - page 163 / 349
» The Steganographic File System
Sort
View
145
Voted
CN
2008
85views more  CN 2008»
15 years 3 months ago
Pollution attacks and defenses for Internet caching systems
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network's resilience to denial-ofservice ...
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmano...
157
Voted
JCIT
2007
190views more  JCIT 2007»
15 years 3 months ago
A Two-layer Super-Peer based P2P Live Media Streaming System
Peer-to-peer (P2P) file sharing has become increasingly popular, accounting for as much as 70% of Internet traffic by some estimates. Recently, we have been witnessing the emergen...
Poo Kuan Hoong, Hiroshi Matsuo
OSDI
2006
ACM
16 years 4 months ago
EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors
Storage systems such as file systems, databases, and RAID systems have a simple, basic contract: you give them data, they do not lose or corrupt it. Often they store the only copy...
Junfeng Yang, Can Sar, Dawson R. Engler
126
Voted
WWW
2004
ACM
16 years 4 months ago
Managing versions of web documents in a transaction-time web server
This paper presents a transaction-time HTTP server, called ? Apache that supports document versioning. A document often consists of a main file formatted in HTML or XML and severa...
Curtis E. Dyreson, Hui-ling Lin, Yingxia Wang
93
Voted
WWW
2004
ACM
16 years 4 months ago
Lessons from a Gnutella-web gateway
We present a gateway between the WWW and the Gnutella peer-topeer network that permits searchers on one side to be able to search and retrieve files on the other side of the gatew...
Brian D. Davison, Wei Zhang, Baoning Wu