-
1
-
-
0029254192
-
An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures
-
EVENODD:, February
-
Mario Blaum, Jim Brady, Jehoshua Bruck, and Jai Menon, EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures. IEEE Transactions on Computers, 44(2): 192-202, February 1995.
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.2
, pp. 192-202
-
-
Blaum, M.1
Brady, J.2
Bruck, J.3
Menon, J.4
-
2
-
-
0028444938
-
High-performance, reliable secondary storage
-
RAID
-
Peter M. Chen, Edward K. Lee, Garth A. Gibson, Randy H. Katz, and David A. Patterson, RAID: High-performance, reliable secondary storage, ACM Computing Surveys, 26(2): 145-185, 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.2
, pp. 145-185
-
-
Chen, P.M.1
Lee, E.K.2
Gibson, G.A.3
Katz, R.H.4
Patterson, D.A.5
-
3
-
-
84949189366
-
-
Juan A. Garay, Rosario Gennaro, Charanjit Jutla, and Tal Rabin. Secure distributed storage and retrieval, In Mavronicolas, M. and Tsigas, Ph., editors, Lecture Notes in Computer Science: Distributed Algorithms, Proc. of 11th International Workshop, WDAG'97, Saarbrucken, Germany, 1320, pages 275-289, Springer, September 1997.
-
Juan A. Garay, Rosario Gennaro, Charanjit Jutla, and Tal Rabin. Secure distributed storage and retrieval, In Mavronicolas, M. and Tsigas, Ph., editors, Lecture Notes in Computer Science: Distributed Algorithms, Proc. of 11th International Workshop, WDAG'97, Saarbrucken, Germany, volume 1320, pages 275-289, Springer, September 1997.
-
-
-
-
6
-
-
84951914156
-
-
C. Huang and L. Xu. STAR: An Efficient Coding Scheme for Correcting Triple Storage Node Failures, In 2005 USENIX Conference on File and Storage Technologies (FAST 2005), San Francisco, CA, Dec 2005.
-
C. Huang and L. Xu. STAR: An Efficient Coding Scheme for Correcting Triple Storage Node Failures, In 2005 USENIX Conference on File and Storage Technologies (FAST 2005), San Francisco, CA, Dec 2005.
-
-
-
-
7
-
-
0027838927
-
Distributed fingerprints and secure information dispersal
-
New York, NY, USA, ACM Press
-
Hugo Krawczyk. Distributed fingerprints and secure information dispersal. In PODC '93: Proceedings of the twelfth annual. ACM symposium on Principles: of distributed computing, pages 207-218, New York, NY, USA, 1993. ACM Press.
-
(1993)
PODC '93: Proceedings of the twelfth annual. ACM symposium on Principles: of distributed computing
, pp. 207-218
-
-
Krawczyk, H.1
-
9
-
-
27544464868
-
Small Parity-Check Erasure Codes - Exploration and Observations
-
Yokohama, Japan, IEEE
-
J. S. Plank, A. L. Buchsbaurn, R. L. Collins, and M. G. Thomason, Small Parity-Check Erasure Codes - Exploration and Observations. In PSN-05: International Conference on Dependable Systems and Networks, Yokohama, Japan, 2005, IEEE.
-
(2005)
PSN-05: International Conference on Dependable Systems and Networks
-
-
Plank, J.S.1
Buchsbaurn, A.L.2
Collins, R.L.3
Thomason, M.G.4
-
10
-
-
33845876464
-
Thomason. On the Practical Use of LDPC Erasure Codes for Distributed Storage Applications
-
CS-03-510, University of Tennessee, September
-
J. S. Plank and M. G:. Thomason. On the Practical Use of LDPC Erasure Codes for Distributed Storage Applications. Technical/Report CS-03-510, University of Tennessee, September 2003.
-
(2003)
Technical/Report
-
-
Plank, J.S.1
Thomason, M.G.2
-
11
-
-
34247250849
-
Plank and Lihao Xu. Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications
-
Washington, DC, USA, IEEE Computer Society
-
James S, Plank and Lihao Xu. Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications. In NCA '06: Proceedings of the Fifth IEEE: International Symposium on Network Computing and Applications, pages 173-180, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
NCA '06: Proceedings of the Fifth IEEE: International Symposium on Network Computing and Applications
, pp. 173-180
-
-
James, S.1
-
12
-
-
0024641589
-
Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance
-
Michael O, Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM, 36(2):335-348, 1989.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Michael, O.1
|