161
click to vote
SRDS
15 years 11 months ago
2006 IEEE
We present Cryptree, a cryptographic tree structure which facilitates access control in file systems operating on untrusted storage. Cryptree leverages the file system’s folde...
164
click to vote
ISDA
15 years 11 months ago
2006 IEEE
We present in this paper a modification of Lumer and Faieta’s algorithm for data clustering. This algorithm discovers automatically clusters in numerical data without prior kno...
138
click to vote
SRDS
15 years 11 months ago
2006 IEEE
Availability prediction in a telecommunication system plays a crucial role in its management, either by alerting the operator to potential failures or by proactively initiating pr...
166
click to vote
ISDA
15 years 11 months ago
2006 IEEE
In this paper, we present a novel approach for face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity image...
196
click to vote
OSDI
16 years 5 months ago
2006 ACM
We have developed Ceph, a distributed file system that provides excellent performance, reliability, and scalability. Ceph maximizes the separation between data and metadata manage...
|