Sciweavers

12 search results - page 2 / 3
» A File Naming Scheme Using Hierarchical-Keywords
Sort
View
JSAC
2007
157views more  JSAC 2007»
13 years 5 months ago
Network-aware P2P file sharing over the wireless mobile networks
— With the coming wireless mobile networks era and the popular use of P2P applications, how to improve the resource retrieval and discovery for P2P file sharing applications in ...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
SISW
2005
IEEE
13 years 11 months ago
Lazy Revocation in Cryptographic File Systems
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management s...
Michael Backes, Christian Cachin, Alina Oprea
CN
1999
87views more  CN 1999»
13 years 5 months ago
The Gecko NFS Web Proxy
The World-Wide Web provides remote access to pages using its own naming scheme (URLs), transfer protocol (HTTP), and cache algorithms. Not only does using these special-purpose me...
Scott M. Baker, John H. Hartman
PDPTA
2000
13 years 6 months ago
The PODOS File System - Exploiting the High-Speed Communication Subsystem
Performance Oriented Distributed Operating System (PODOS) is a clustering environment, being built on a monolithic Linux kernel. PODOS augments very few components to the Linux ke...
Sudharshan Vazhkudai, P. Tobin Maginnis
WWW
2007
ACM
14 years 6 months ago
On ranking techniques for desktop search
This paper addresses the desktop search problem by considering various techniques for ranking results of a search query over the file system. First, basic ranking techniques, whic...
Sara Cohen, Carmel Domshlak, Naama Zwerdling