Sciweavers

2746 search results - page 37 / 550
» Application performance on the Direct Access File System
Sort
View
158
Voted
CCS
2008
ACM
15 years 5 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
127
Voted
EDM
2009
175views Data Mining» more  EDM 2009»
15 years 1 months ago
Detecting Symptoms of Low Performance Using Production Rules
E-Learning systems offer students innovative and attractive ways of learning through augmentation or substitution of traditional lectures and exercises with online learning materia...
Javier Bravo Agapito, Alvaro Ortigosa
124
Voted
DSN
2007
IEEE
15 years 7 months ago
Portable and Efficient Continuous Data Protection for Network File Servers
Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
Ningning Zhu, Tzi-cker Chiueh
163
Voted
GLOBECOM
2010
IEEE
15 years 24 days ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
125
Voted
HCW
2000
IEEE
15 years 7 months ago
Reliable Cluster Computing with a New Checkpointing RAID-x Architecture
In a serverless cluster of PCs or workstations, the cluster must allow remote file accesses or parallel I/O directly performed over disks distributed to all client nodes. We intro...
Kai Hwang, Hai Jin, Roy S. C. Ho, Wonwoo Ro