Sciweavers

1368 search results - page 29 / 274
» Designing a Self-Maintaining Storage System
Sort
View
ACSAC
2002
IEEE
15 years 6 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
SIGMOD
2008
ACM
193views Database» more  SIGMOD 2008»
16 years 2 months ago
Efficient provenance storage
Scientific workflow systems are increasingly used to automate complex data analyses, largely due to their benefits over traditional approaches for workflow design, optimization, a...
Adriane Chapman, H. V. Jagadish, Prakash Ramanan
SIGMETRICS
2010
ACM
113views Hardware» more  SIGMETRICS 2010»
14 years 8 months ago
Reliability analysis of deduplicated and erasure-coded storage
Space efficiency and data reliability are two primary concerns for modern storage systems. Chunk-based deduplication, which breaks up data objects into single-instance chunks that...
Xiaozhou Li, Mark Lillibridge, Mustafa Uysal
FAST
2009
14 years 11 months ago
Minuet: Rethinking Concurrency Control in Storage Area Networks
Clustered applications in storage area networks (SANs), widely adopted in enterprise datacenters, have traditionally relied on distributed locking protocols to coordinate concurre...
Andrey Ermolinskiy, Daekyeong Moon, Byung-Gon Chun...
TVLSI
2010
14 years 8 months ago
Improving Multi-Level NAND Flash Memory Storage Reliability Using Concatenated BCH-TCM Coding
By storing more than one bit in each memory cell, multi-level per cell (MLC) NAND flash memories are dominating global flash memory market due to their appealing storage density ad...
Shu Li, Tong Zhang