-
3
-
-
85077321992
-
Capture, conversion, and analysis of an intense NFS workload
-
E. Anderson, "Capture, conversion, and analysis of an intense NFS workload," in Proc. 7th Conf. on File and Storage Technologies, 2009, pp. 139-152.
-
Proc. 7th Conf. on File and Storage Technologies, 2009
, pp. 139-152
-
-
Anderson, E.1
-
4
-
-
77952285203
-
DataSeries: An efficient, flexible data format for structured serial data
-
January
-
E. Anderson et al., "DataSeries: an efficient, flexible data format for structured serial data," SIGOPS Operating System Review, vol. 43, pp. 70-75, January 2009.
-
(2009)
SIGOPS Operating System Review
, vol.43
, pp. 70-75
-
-
Anderson, E.1
-
7
-
-
84864253433
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2011-21, Mar
-
Y. Chen et al., "The case for evaluating MapReduce performance using workload suites," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2011-21, Mar 2011.
-
(2011)
The Case for Evaluating MapReduce Performance Using Workload Suites
-
-
Chen, Y.1
-
9
-
-
84892356132
-
Workflow management in Condor
-
I. J. Taylor et al., Eds.
-
P. Couvares et al., "Workflow management in Condor," in Workflows for e-Science, I. J. Taylor et al., Eds., 2007, pp. 357-375.
-
(2007)
Workflows for E-Science
, pp. 357-375
-
-
Couvares, P.1
-
10
-
-
78650804208
-
A firm foundation for private data analysis
-
January
-
C. Dwork, "A firm foundation for private data analysis," Communications of the ACM, vol. 54, pp. 86-95, January 2011.
-
(2011)
Communications of the ACM
, vol.54
, pp. 86-95
-
-
Dwork, C.1
-
20
-
-
24344507334
-
Remote physical device fingerprinting
-
April
-
T. Kohno, A. Broido, and K. C. Claffy, "Remote physical device fingerprinting," IEEE Trans. Dependable Secur. Comput., vol. 2, pp. 93-108, April 2005.
-
(2005)
IEEE Trans. Dependable Secur. Comput.
, vol.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
21
-
-
79551477737
-
NapSAC: Design and implementation of a power-proportional web cluster
-
A. Krioukov et al., "NapSAC: design and implementation of a power-proportional web cluster," ACM SIGCOMM Computer Communication Review, vol. 41, no. 1, pp. 102-108, 2011.
-
(2011)
ACM SIGCOMM Computer Communication Review
, vol.41
, Issue.1
, pp. 102-108
-
-
Krioukov, A.1
-
23
-
-
77956293777
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
September
-
F. McSherry, "Privacy integrated queries: an extensible platform for privacy-preserving data analysis," Communications of the ACM, vol. 53, pp. 89-97, September 2010.
-
(2010)
Communications of the ACM
, vol.53
, pp. 89-97
-
-
McSherry, F.1
-
25
-
-
77953213147
-
Myths and fallacies of 'personally identifiable information'
-
June
-
--, "Myths and fallacies of 'personally identifiable information'," Communications of the ACM, vol. 53, pp. 24-26, June 2010.
-
(2010)
Communications of the ACM
, vol.53
, pp. 24-26
-
-
Narayanan, A.1
Shmatikov, V.2
-
28
-
-
33847256529
-
The devil and packet trace anonymization
-
January
-
R. Pang et al., "The devil and packet trace anonymization," SIGCOMM Computer Communication Review, vol. 36, pp. 29-38, January 2006.
-
(2006)
SIGCOMM Computer Communication Review
, vol.36
, pp. 29-38
-
-
Pang, R.1
-
32
-
-
82155186219
-
Modeling and synthesizing task placement constraints in Google compute clusters
-
ACM
-
B. Sharma, V. Chudnovsky, J. Hellerstein, R. Rifaat, and C. Das, "Modeling and synthesizing task placement constraints in Google compute clusters," in Proc. 2nd ACM Symposium on Cloud Computing. ACM, 2011.
-
(2011)
Proc. 2nd ACM Symposium on Cloud Computing
-
-
Sharma, B.1
Chudnovsky, V.2
Hellerstein, J.3
Rifaat, R.4
Das, C.5
-
33
-
-
84864233862
-
-
Available
-
Storage Networking Industry Association, "SNIA IOTTA repository." [Online]. Available: http://iotta.snia.org/traces/list
-
"SNIA IOTTA Repository." [Online]
-
-
-
34
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Q. Sun et al., "Statistical identification of encrypted web browsing traffic," in Proc. IEEE Symp. on Security and Privacy, 2002, pp. 19-30.
-
Proc. IEEE Symp. on Security and Privacy, 2002
, pp. 19-30
-
-
Sun, Q.1
-
35
-
-
84868325513
-
Hive: A warehousing solution over a map-reduce framework
-
August
-
A. Thusoo et al., "Hive: a warehousing solution over a map-reduce framework," Proc. VLDB Endowment, vol. 2, pp. 1626-1629, August 2009.
-
(2009)
Proc. VLDB Endowment
, vol.2
, pp. 1626-1629
-
-
Thusoo, A.1
-
36
-
-
85077073185
-
The SCADS director: Scaling a distributed storage system under stringent performance requirements
-
B. Trushkowsky et al., "The SCADS director: scaling a distributed storage system under stringent performance requirements," in Proc. 9th USENIX Conf. on File and Storage Technologies, 2011, pp. 12-12.
-
Proc. 9th USENIX Conf. on File and Storage Technologies, 2011
, pp. 12-12
-
-
Trushkowsky, B.1
-
37
-
-
84864256003
-
-
Private communication
-
J. Wilkes, Private communication.
-
-
-
Wilkes, J.1
-
39
-
-
84904883732
-
Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
J. Xu et al., "Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme," in Proc. 10th IEEE Int. Conf. on Network Protocols, 2002, pp. 280-289.
-
Proc. 10th IEEE Int. Conf. on Network Protocols, 2002
, pp. 280-289
-
-
Xu, J.1
|