Sciweavers

1744 search results - page 237 / 349
» The Steganographic File System
Sort
View
PASTE
2010
ACM
15 years 9 months ago
Expect the unexpected: error code mismatches between documentation and the real world
Inaccurate documentation can mislead programmers and cause software to fail in unexpected ways. We examine mismatches between documented and actual error codes returned by 42 Linu...
Cindy Rubio-González, Ben Liblit
SRDS
1998
IEEE
15 years 8 months ago
View Consistency for Optimistic Replication
Optimistically replicated systems provide highly available data even when communication between data replicas is unreliable or unavailable. The high availability comes at the cost...
Ashvin Goel, Calton Pu, Gerald J. Popek
JNW
2006
142views more  JNW 2006»
15 years 4 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
SAC
2008
ACM
15 years 3 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
IMC
2009
ACM
15 years 11 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...