-
3
-
-
85080727924
-
-
VMware VIX API. http://www.vmware.com/support/developer/vix-api/, 2007.
-
(2007)
VMware VIX API
-
-
-
5
-
-
85077032626
-
Compare-by-hash: A reasoned analysis
-
J. Black. Compare-by-hash: A reasoned analysis. In USENIX Annual Tech. Conf., 2006.
-
(2006)
USENIX Annual Tech. Conf.
-
-
Black, J.1
-
6
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422–426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
8
-
-
85080644524
-
Getting out of DLL hell
-
Jan
-
R. Chen. Getting out of DLL Hell. Microsoft TechNet, Jan. 2007.
-
(2007)
Microsoft TechNet
-
-
Chen, R.1
-
9
-
-
85065163256
-
ReMus: High availability via asynchronous virtual machine replication
-
B. Cully et al. Remus: High availability via asynchronous virtual machine replication. In NSDI, 2008.
-
(2008)
NSDI
-
-
Cully, B.1
-
10
-
-
85093096041
-
Secondsite: Disaster protection for the common server
-
B. Cully and A. Warfield. SecondSite: disaster protection for the common server. In HotDep, 2006.
-
(2006)
HotDep
-
-
Cully, B.1
Warfield, A.2
-
13
-
-
70449696425
-
VXA: A virtual architecture for durable compressed archives
-
B. Ford. VXA: A virtual architecture for durable compressed archives. In FAST, 2005.
-
(2005)
FAST
-
-
Ford, B.1
-
14
-
-
33745204826
-
Mylifebits: A personal database for everything
-
Jan
-
J. Gemmell, G. Bell, and R. Lueder. MyLifeBits: a personal database for everything. CACM, 49(1):88–95, Jan. 2006.
-
(2006)
CACM
, vol.49
, Issue.1
, pp. 88-95
-
-
Gemmell, J.1
Bell, G.2
Lueder, R.3
-
15
-
-
0002128979
-
Emulation as a digital preservation strategy
-
Oct
-
S. Granger. Emulation as a digital preservation strategy. D-Lib Magazine, 6(10), Oct. 2000.
-
(2000)
D-Lib Magazine
, vol.6
, Issue.10
-
-
Granger, S.1
-
16
-
-
85092942164
-
An analysis of compare-by-hash
-
V. Henson. An analysis of compare-by-hash. In HotOS, 2003.
-
(2003)
HotOS
-
-
Henson, V.1
-
17
-
-
0042484692
-
File system design for an NFS file server appliance
-
D. Hitz, J. Lau, and M. Malcolm. File system design for an NFS file server appliance. In USENIX Winter Conf., 1994.
-
(1994)
USENIX Winter Conf
-
-
Hitz, D.1
Lau, J.2
Malcolm, M.3
-
19
-
-
0009052794
-
Logical vs. Physical file system backup
-
N. Hutchinson et al. Logical vs. physical file system backup. In OSDI, 1999.
-
(1999)
OSDI
-
-
Hutchinson, N.1
-
20
-
-
51849088753
-
Peabody: The time travelling disk
-
C. B. M. III and
-
C. B. M. III and D. Grunwald. Peabody: The time travelling disk. In MSST, 2003.
-
(2003)
MSST
-
-
Grunwald, D.1
-
21
-
-
85080732190
-
Content based block caching
-
C. B. M. III and
-
C. B. M. III and D. Grunwald. Content based block caching. In MSST, 2006.
-
(2006)
MSST
-
-
Grunwald, D.1
-
23
-
-
36849093233
-
A digital dark ages? challenges in the preservation of electronic information
-
T. Kuny. A digital dark ages? Challenges in the preservation of electronic information. In 63rd IFLA General Conference, 1997.
-
(1997)
63rd IFLA General Conference
-
-
Kuny, T.1
-
24
-
-
0036270690
-
The state of the art and practice in digital preservation
-
Jan–Feb
-
K.-H. Lee, O. Slattery, R. Lu, X. Tang, and V. McCrary. The state of the art and practice in digital preservation. Journal of Research of the NIST, 107(1):93–106, Jan–Feb 2002.
-
(2002)
Journal of Research of the NIST
, vol.107
, Issue.1
, pp. 93-106
-
-
Lee, K.-H.1
Slattery, O.2
Lu, R.3
Tang, X.4
McCrary, V.5
-
25
-
-
79955703007
-
-
A. Lewis. LVM HOWTO. http://tldp.org/HOWTO/LVM-HOWTO/, 2006.
-
(2006)
LVM HOWTO
-
-
Lewis, A.1
-
28
-
-
42149169631
-
Evaluating personal archiving strategies for internet-based information
-
C. Marshall, F. McCown, and M. Nelson. Evaluating personal archiving strategies for Internet-based information. In IS&T Archiving, 2006.
-
(2006)
IS&T Archiving
-
-
Marshall, C.1
McCown, F.2
Nelson, M.3
-
29
-
-
0002586876
-
A digital signature based on a conventional encryption function
-
R. Merkle. A digital signature based on a conventional encryption function. In CRYPTO, 1988.
-
(1988)
CRYPTO
-
-
Merkle, R.1
-
31
-
-
85080690008
-
-
OpenSolaris. What is ZFS? http://opensolaris.org/os/community/zfs/whatis/, 2007.
-
(2007)
What Is ZFS?
-
-
-
32
-
-
0001300585
-
Plan 9 from bell labs
-
Summer
-
R. Pike et al. Plan 9 from Bell Labs. Computing Systems, 8(3):221–254, Summer 1995.
-
(1995)
Computing Systems
, vol.8
, Issue.3
, pp. 221-254
-
-
Pike, R.1
-
33
-
-
0026384886
-
A cached WORM file system
-
S. Quinlan. A cached WORM file system. Software—Practice and Experience, 21(12):1289–1299, 1991.
-
(1991)
Software—Practice and Experience
, vol.21
, Issue.12
, pp. 1289-1299
-
-
Quinlan, S.1
-
34
-
-
85084160673
-
Venti: A new approach to archival storage
-
S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In FAST, 2002.
-
(2002)
FAST
-
-
Quinlan, S.1
Dorward, S.2
-
35
-
-
34247251391
-
Quantifying software requirements for supporting archived office documents using emulation
-
T. Reichherzer and G. Brown. Quantifying software requirements for supporting archived office documents using emulation. In ICDL, 2006.
-
(2006)
ICDL
-
-
Reichherzer, T.1
Brown, G.2
-
36
-
-
0026812659
-
The design and implementation of a log-structured file system
-
M. Rosenblum and J. K. Ousterhout. The design and implementation of a log-structured file system. ACM Trans. Comput. Syst., 10(1):26–52, 1992.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.1
, pp. 26-52
-
-
Rosenblum, M.1
Ousterhout, J.K.2
-
37
-
-
14744287255
-
Transparent format migration of preserved web content
-
Jan
-
D. Rosenthal, T. Lipkis, T. Robertson, and S. Morabito. Transparent format migration of preserved web content. D-Lib Magazine, 11(1), Jan. 2005.
-
(2005)
D-Lib Magazine
, vol.11
, Issue.1
-
-
Rosenthal, D.1
Lipkis, T.2
Robertson, T.3
Morabito, S.4
-
38
-
-
0029232981
-
Ensuring the longevity of digital documents
-
Jan
-
J. Rothenberg. Ensuring the longevity of digital documents. Scientific American, 272(1):42–47, Jan. 1995.
-
(1995)
Scientific American
, vol.272
, Issue.1
, pp. 42-47
-
-
Rothenberg, J.1
-
39
-
-
47249105152
-
Deciding when to forget in the elephant file system
-
D. Santry et al. Deciding when to forget in the Elephant file system. In SOSP, 1999.
-
(1999)
SOSP
-
-
Santry, D.1
-
41
-
-
36349036896
-
Eternal bits
-
July
-
M. Smith. Eternal bits. IEEE Spectrum, 42(7):22–27, July 2005.
-
(2005)
IEEE Spectrum
, vol.42
, Issue.7
, pp. 22-27
-
-
Smith, M.1
-
43
-
-
34548713398
-
Machine bank: Own your virtual personal computer
-
S. Tang, Y. Chen, and Z. Zhang. Machine Bank: Own your virtual personal computer. In IPDPS, 2007.
-
(2007)
IPDPS
-
-
Tang, S.1
Chen, Y.2
Zhang, Z.3
-
44
-
-
33646387893
-
-
Technical Report NOTE-drp-19970825, W3C
-
A. van Hoff, J. Giannandrea, M. Hapner, S. Carter, and M. Medin. The HTTP distribution and replication protocol. Technical Report NOTE-drp-19970825, W3C, 1997.
-
(1997)
The HTTP Distribution and Replication Protocol
-
-
van Hoff, A.1
Giannandrea, J.2
Hapner, M.3
Carter, S.4
Medin, M.5
-
45
-
-
34548028878
-
Configuration debugging as search: Finding the needle in the haystack
-
A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration debugging as search: finding the needle in the haystack. In OSDI, 2004.
-
(2004)
OSDI
-
-
Whitaker, A.1
Cox, R.S.2
Gribble, S.D.3
|