Sciweavers

313 search results - page 17 / 63
» Redundancy Elimination for LF
Sort
View
CCS
2009
ACM
15 years 4 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
FAST
2011
14 years 1 months ago
A Study of Practical Deduplication
We collected file system content data from 857 desktop computers at Microsoft over a span of 4 weeks. We analyzed the data to determine the relative efficacy of data deduplication...
Dutch T. Meyer, William J. Bolosky
82
Voted
USENIX
1996
14 years 10 months ago
AFRAID - A Frequently Redundant Array of Independent Disks
Disk arrays are commonly designed to ensure that stored data will always be able to withstand a disk failure, but meeting this goal comes at a significant cost in performance. We ...
Stefan Savage, John Wilkes
CIS
2007
Springer
15 years 3 months ago
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks
ct This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant ...
Shih-I Huang, Shiuhpyng Shieh
64
Voted
CAI
2004
Springer
14 years 9 months ago
A Generic Dual Core Architecture with Error Containment
The dual core strategy allows to construct a fail-silent processor from two instances (master/checker) of any arbitrary standard processor. Its main drawbacks are its vulnerability...
Thomas Kottke, Andreas Steininger