Sciweavers

1744 search results - page 190 / 349
» The Steganographic File System
Sort
View
120
Voted
FAST
2009
15 years 1 months ago
Transparently Gathering Provenance with Provenance Aware Condor
We observed that the Condor batch execution system exposes a lot of information about the jobs that run in the system. This observation led us to explore whether this system infor...
Christine F. Reilly, Jeffrey F. Naughton
CHI
2009
ACM
16 years 4 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
161
Voted
STOC
2007
ACM
169views Algorithms» more  STOC 2007»
16 years 4 months ago
Proportional response dynamics leads to market equilibrium
One of the main reasons of the recent success of peer to peer (P2P) file sharing systems such as BitTorrent is its built-in tit-for-tat mechanism. In this paper, we model the band...
Fang Wu, Li Zhang
ERCIMDL
2007
Springer
111views Education» more  ERCIMDL 2007»
15 years 10 months ago
Using Watermarks and Offline DRM to Protect Digital Images in DIAS
The Digital Image Archiving System (DIAS) is an image management system, the major functions of which are preserving valuable digital images and serving as an image provider for ex...
Hsin-Yu Chen, Hsiang-An Wang, Chin-Lung Lin
SKG
2006
IEEE
15 years 10 months ago
IAC: Interest-Aware Caching for Unstructured P2P
The simplicity and robustness of unstructured P2P system make it a preferable architecture for constructing real large scale file sharing system. Most of the existing paradigms re...
Xucheng Luo, Zhiguang Qin, Ji Geng, Jiaqing Luo