Sciweavers

1744 search results - page 98 / 349
» The Steganographic File System
Sort
View
USS
2008
13 years 12 months ago
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice
We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We desc...
Michael Piatek, Tadayoshi Kohno, Arvind Krishnamur...
SIGMETRICS
2008
ACM
132views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Durability of replicated distributed storage systems
We study the problem of guaranteeing data durability [2] in distributed storage systems based on replication. Our work is motivated by several several recent efforts [3, 5, 1] to ...
Sriram Ramabhadran, Joseph Pasquale
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
14 years 1 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
TMM
2008
121views more  TMM 2008»
13 years 9 months ago
Performance Analysis of Resource Selection Schemes for a Large Scale Video-on-Demand System
The designers of a large scale video-on-demand system face an optimization problem of deciding how to assign movies to multiple disks (servers) such that the request blocking proba...
Jun Guo, Eric Wing Ming Wong, Sammy Chan, Peter Ta...
ASMTA
2008
Springer
113views Mathematics» more  ASMTA 2008»
13 years 11 months ago
Exact Sojourn Time Distribution in an Online IPTV Recording System
In this paper we analytically derive the sojourn time of a user accessing an online IPTV recording service. Basically, the system consists of a server (or server farm) and the band...
Tobias Hoßfeld, Kenji Leibnitz, Marie-Ange R...