Sciweavers

1744 search results - page 103 / 349
» A Proof-Carrying File System
Sort
View
CSFW
2006
IEEE
15 years 4 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi
SIGOPSE
2004
ACM
15 years 3 months ago
Eluding carnivores: file sharing with strong anonymity
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
Emin Gün Sirer, Sharad Goel, Mark Robson, Dog...
QOFIS
2004
Springer
15 years 3 months ago
Performance Analysis of Peer-to-Peer Networks for File Distribution
Peer-to-peer networks have been commonly used for tasks such as file sharing or file distribution. We study a class of cooperative file distribution systems where a file is bro...
Ernst W. Biersack, Pablo Rodriguez, Pascal Felber
HOTOS
2003
IEEE
15 years 3 months ago
Towards a Semantic-Aware File Store
—Traditional hierarchical namespaces are not sufficient for representing and managing the rich semantics of today’s storage systems. In this paper, we discuss the principles o...
Zhichen Xu, Magnus Karlsson, Chunqiang Tang, Chris...
OSDI
2008
ACM
15 years 10 months ago
Predicting Computer System Failures Using Support Vector Machines
Mitigating the impact of computer failure is possible if accurate failure predictions are provided. Resources, applications, and services can be scheduled around predicted failure...
Errin W. Fulp, Glenn A. Fink, Jereme N. Haack