185
click to vote
SIGOPSE
15 years 8 months ago
2004 ACM
Building reliable data storage from unreliable components presents many challenges and is of particular interest for peer-to-peer storage systems. Recent work has examined the tra...
175
click to vote
SIGOPSE
15 years 8 months ago
2004 ACM
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
160
click to vote
LISA
15 years 4 months ago
2004
It is often difficult and time-consuming to manage computer `moves, adds, and changes' that take place in a switched, subnetted environment. It is even more difficult when th...
159
click to vote
USENIX
15 years 4 months ago
2004
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
|