151
click to vote
SRDS
15 years 10 months ago
2006 IEEE
We present Cryptree, a cryptographic tree structure which facilitates access control in file systems operating on untrusted storage. Cryptree leverages the file system’s folde...
153
click to vote
ISDA
15 years 10 months ago
2006 IEEE
We present in this paper a modification of Lumer and Faieta’s algorithm for data clustering. This algorithm discovers automatically clusters in numerical data without prior kno...
131
click to vote
SRDS
15 years 10 months ago
2006 IEEE
Availability prediction in a telecommunication system plays a crucial role in its management, either by alerting the operator to potential failures or by proactively initiating pr...
155
click to vote
ISDA
15 years 10 months ago
2006 IEEE
In this paper, we present a novel approach for face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity image...
184
click to vote
OSDI
16 years 4 months ago
2006 ACM
We have developed Ceph, a distributed file system that provides excellent performance, reliability, and scalability. Ceph maximizes the separation between data and metadata manage...
|