Sciweavers

1402 search results - page 54 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
146
Voted
STORAGESS
2005
ACM
15 years 9 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
178
Voted
OSDI
2006
ACM
16 years 3 months ago
Ceph: A Scalable, High-Performance Distributed File System
We have developed Ceph, a distributed file system that provides excellent performance, reliability, and scalability. Ceph maximizes the separation between data and metadata manage...
Sage A. Weil, Scott A. Brandt, Ethan L. Miller, Da...
145
Voted
ENTCS
2008
118views more  ENTCS 2008»
15 years 1 months ago
Shared Hash Tables in Parallel Model Checking
In light of recent shift towards shared-memory systems in parallel explicit model checking, we explore relative advantages and disadvantages of shared versus private hash tables. ...
Jiri Barnat, Petr Rockai
IPPS
2006
IEEE
15 years 9 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
131
Voted
ISSTA
2004
ACM
15 years 8 months ago
Model checking XML manipulating software
The use of XML as the de facto data exchange standard has allowed integration of heterogeneous web based software systems regardless of implementation platforms and programming la...
Xiang Fu, Tevfik Bultan, Jianwen Su