575
click to vote
SIGOPSE
15 years 10 months ago
2004 ACM
Building reliable data storage from unreliable components presents many challenges and is of particular interest for peer-to-peer storage systems. Recent work has examined the tra...
233
Voted
DFG
15 years 10 months ago
2004 Springer 207
click to vote
SIGOPSE
15 years 10 months ago
2004 ACM
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
187
click to vote
LISA
15 years 6 months ago
2004
It is often difficult and time-consuming to manage computer `moves, adds, and changes' that take place in a switched, subnetted environment. It is even more difficult when th...
182
click to vote
USENIX
15 years 6 months ago
2004
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
|