-
1
-
-
79955995661
-
HYDRAstor: A scalable secondary storage
-
Cezary Dubnicki, Leszek Gryz, Lukasz Heldt, Michal Kaczmarczyk, Wojciech Kilian, Przemyslaw Strzelczak, Jerzy Szczepkowski, Cristian Ungureanu, and Michal Welnicki, "HYDRAstor: A scalable secondary storage", In Proceedings of the 7th USENIX Conference on File and Storage Conference, pp.197-210, 2009.
-
(2009)
Proceedings of the 7th USENIX Conference On File and Storage Conference
, pp. 197-210
-
-
Dubnicki, C.1
Gryz, L.2
Heldt, L.3
Kaczmarczyk, M.4
Kilian, W.5
Strzelczak, P.6
Szczepkowski, J.7
Ungureanu, C.8
Welnicki, M.9
-
2
-
-
76349109236
-
Extreme Binning: Scalable, Parallel Deduplication for Chunk-based File Backup
-
Deepavali Bhagwat, Kave Eshghi, Darrell D.E. Long, and Mark Lillibridge, "Extreme Binning: Scalable, Parallel Deduplication for Chunk-based File Backup", In Proceedings of the 17th IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems, pp.1-9, 2009.
-
(2009)
In Proceedings of the 17th IEEE International Symposium On Modeling, Analysis & Simulation of Computer and Telecommunication Systems
, pp. 1-9
-
-
Bhagwat, D.1
Eshghi, K.2
Darrell, D.E.L.3
Lillibridge, M.4
-
3
-
-
85077072489
-
TradeOffs in Scalable Data Routing for Deduplication Clusters
-
Wei Dong, Fred Douglis, Kai Li, and Hugo Patterson, "TradeOffs in Scalable Data Routing for Deduplication Clusters", In Proceedings of the 9th USENIX Conference on File and Storage Conference, pp.15-29, 2011.
-
(2011)
In Proceedings of the 9th USENIX Conference On File and Storage Conference
, pp. 15-29
-
-
Dong, W.1
Douglis, F.2
Li, K.3
Patterson, H.4
-
4
-
-
85066881368
-
Avoiding the disk bottleneck in the Data Domain deduplication file system
-
Benjamin Zhu, Kai Li, and Hugo Patterson, "Avoiding the disk bottleneck in the Data Domain deduplication file system", In Proceedings of the 6th USENIX Conference on File and Storage Conference, pp.269-282, 2008.
-
(2008)
In Proceedings of the 6th USENIX Conference On File and Storage Conference
, pp. 269-282
-
-
Zhu, B.1
Li, K.2
Patterson, H.3
-
5
-
-
33144461692
-
The NIST cryptographic workshop on hash functions
-
C. Rechberger, V. Rijmen, and N. Sklavos, "The NIST cryptographic workshop on hash functions", IEEE Security & Privacy, vol.4, no.1, pp.54-56, 2006.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.1
, pp. 54-56
-
-
Rechberger, C.1
Rijmen, V.2
Sklavos, N.3
-
6
-
-
0014814325
-
Space/Time Trade-offs in Hash Coding with Allowable Errors
-
Burton H. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors", Communications of the ACM, vol.13, no.7, pp.422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Burton, H.B.1
-
7
-
-
70450232823
-
Network Applications of Bloom Filters: A Survey
-
Andrei Broder and Michael Mitzenmacher, "Network Applications of Bloom Filters: A Survey", Internet Mathematics, vol. 1, no.4, pp. 485-509, 2005.
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
8
-
-
78649596156
-
SAM: A Semantic-Aware Multi-Tiered Source De-duplication Framework for Cloud Backup
-
Yujuan. Tan, Hong. Jiang, Dan. Feng, Lei. Tian, Zhichao Yan, and Guohui. Zhou, "SAM: A Semantic-Aware Multi-Tiered Source De-duplication Framework for Cloud Backup", In Proceedings of the 39th International Conference on Parallel Processing, pp.614-623, 2010.
-
(2010)
In Proceedings of the 39th International Conference On Parallel Processing
, pp. 614-623
-
-
Tan, Y.1
Hong, J.2
Dan, F.3
Lei, T.4
Yan, Z.5
Guohui, Z.6
-
9
-
-
79958029472
-
The Design and Evaluation of a Hybrid Compression Technique (HCT) for Wireless Sensor Network
-
Zaid A. Ali Al-Marhabi, LiRen Fa, FanZi Zeng, and Ayeda G. Ali Al-Hamdi, "The Design and Evaluation of a Hybrid Compression Technique (HCT) for Wireless Sensor Network", International Journal of Digital Content Technology and its Applications, Vol. 5, No. 5, pp. 201-207, 2011.
-
(2011)
International Journal of Digital Content Technology and Its Applications
, vol.5
, Issue.5
, pp. 201-207
-
-
Al-Marhabi, Z.A.A.1
Fa, L.2
Zeng, F.3
Al-Hamdi, A.G.A.4
-
10
-
-
80555144081
-
Design of Virtual Memory Compression System for the Embedded System
-
Seung-Ju Jang, "Design of Virtual Memory Compression System for the Embedded System", Journal of Convergence Information Technology, Vol. 2, No. 4, pp. 56-62, 2007.
-
(2007)
Journal of Convergence Information Technology
, vol.2
, Issue.4
, pp. 56-62
-
-
Jang, S.-J.1
-
11
-
-
0034206002
-
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
-
Li Fan, Pei Cao, Jussara Almeida, and Andrei Z. Broder, "Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol", IEEE/ACM Transaction on Networking, vol.8, no.3, pp.281-293, 2000.
-
(2000)
IEEE/ACM Transaction On Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Li, F.1
Cao, P.2
Almeida, J.3
Broder Andrei, Z.4
-
12
-
-
34247558495
-
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
-
Ronaldo A. Ferreira, Murali K. Ramanathan, Ananth Grama, and Suresh Jagannathan, "Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems", IEEE Transactions on Parallel and Distributed Systems, vol.18, no.5, pp.686-696, 2007.
-
(2007)
IEEE Transactions On Parallel and Distributed Systems
, vol.18
, Issue.5
, pp. 686-696
-
-
Ronaldo, A.F.1
Murali, K.R.2
Grama, A.3
Jagannathan, S.4
-
14
-
-
33846663173
-
Improving Duplicate Elimination in Storage systems
-
Deepak R. Bobbarjung, Suresh Jagannathan, and Cezary Dubnicki, "Improving Duplicate Elimination in Storage systems", ACM Transactions on Storage, vol. 2, no.4, pp.424-448, 2006.
-
(2006)
ACM Transactions On Storage
, vol.2
, Issue.4
, pp. 424-448
-
-
Deepak, R.B.1
Jagannathan, S.2
Dubnicki, C.3
-
15
-
-
79251543620
-
Reliability Analysis of Deduplicated and Erasure-Coded Storage
-
Xiaozhou Li, Mark Lillibridge, and Mustafal Uysal, "Reliability Analysis of Deduplicated and Erasure-Coded Storage", ACM SIGMETRICS Performance Evaluation Review, vol.38, no.3, pp.4-9, 1970.
-
(1970)
ACM SIGMETRICS Performance Evaluation Review
, vol.38
, Issue.3
, pp. 4-9
-
-
Li, X.1
Lillibridge, M.2
Uysal, M.3
-
16
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin Theimer, and Roger P. Wattenhofer, "FARSITE: Federated, available, and reliable storage for an incompletely trusted environment", ACM SIGOPS Operating Systems Review, vol.36, no.SI, pp.1-14, 2002.
-
(2002)
ACM SIGOPS Operating Systems Review, Vol.36, No.SI
, pp. 1-14
-
-
Adya, A.1
William, J.B.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
John, R.D.6
Howell, J.7
Jacob, R.L.8
Theimer, M.9
Roger, P.W.10
-
17
-
-
85077057432
-
SiLo: A Similarity-Locality based Near-Exact Deduplication Scheme with Low RAM Overhead and High Throughput
-
Wen. Xia, Hong. Jiang, Dan Feng, and Yu. Hua, "SiLo: A Similarity-Locality based Near-Exact Deduplication Scheme with Low RAM Overhead and High Throughput", In Proceedings of the 2011 USENIX annual technical conference, pp.285-298, 2011.
-
(2011)
In Proceedings of the 2011 USENIX Annual Technical Conference
, pp. 285-298
-
-
Xia, W.1
Jiang, H.2
Feng, D.3
Hua, Y.4
-
18
-
-
73849139655
-
Cumulus: Filesystem Backup to the Cloud
-
Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, "Cumulus: Filesystem Backup to the Cloud", ACM Transactions on Storage, vol. 5, no.4, pp.1-28, 2009.
-
(2009)
ACM Transactions On Storage
, vol.5
, Issue.4
, pp. 1-28
-
-
Vrable, M.1
Savage, S.2
Geoffrey, M.V.3
-
19
-
-
77954489760
-
Scalable high performance de-duplication backup via hash join
-
Tianming Yang, Dan Feng, Zhongying Niu, and Yaping Wan, "Scalable high performance de-duplication backup via hash join", Journal of Zhejiang University-Science C, vol.11, no.5, pp.315-327, 2010.
-
(2010)
Journal of Zhejiang University-Science C
, vol.11
, Issue.5
, pp. 315-327
-
-
Yang, T.1
Feng, D.2
Niu, Z.3
Wan, Y.4
|