-
1
-
-
84871167483
-
-
Amazon Web Services, 2012, http://aws.amazon.com/s3/.
-
(2012)
-
-
-
2
-
-
70349950116
-
-
Google Inc., 2012, Google Docs. http://docs.google.com/.
-
(2012)
Google Docs
-
-
-
3
-
-
84871126280
-
-
Dropbox Inc., 2012, Dropbox. http://www.dropbox.com/.
-
(2012)
Dropbox
-
-
-
4
-
-
84871116743
-
-
Amazon Web Services, 2012, Pricing. http://aws.amazon.com/s3/#pricing.
-
(2012)
Pricing
-
-
-
5
-
-
84871147557
-
-
J. Kincaid, 2011, Dropbox security bug. http://techcrunch.com/2011/06/20/ dropbox-security-bug-made-passwords-optional-for-four-hours/.
-
(2011)
Dropbox Security Bug
-
-
Kincaid, J.1
-
6
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow and et al., "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proc. of ACM CCSW, 2009.
-
Proc. of ACM CCSW, 2009
-
-
Chow, R.1
-
7
-
-
34948902663
-
Obfuscating java: The most pain for the least gain
-
Compiler Construction, ser. S. Krishnamurthi and M. Odersky, Eds. Springer
-
M. Batchelder and L. Hendren, "Obfuscating java: The most pain for the least gain," in Compiler Construction, ser. Lecture Notes in Computer Science, S. Krishnamurthi and M. Odersky, Eds. Springer, 2007, vol. 4420, pp. 96-110.
-
(2007)
Lecture Notes in Computer Science
, vol.4420
, pp. 96-110
-
-
Batchelder, M.1
Hendren, L.2
-
8
-
-
84870435238
-
-
Wireshark Foundation, 2012, Wireshark. http://www.wireshark.org/.
-
(2012)
Wireshark
-
-
-
12
-
-
84871125126
-
-
Maxmind Inc, 2012, Geolocation database. http://www.maxmind.com/.
-
(2012)
Geolocation Database
-
-
-
14
-
-
84944041103
-
A Case for Redundant Arrays of Inexpensive Disks (RAID)
-
D. A. Patterson, G. Gibson, and R. H. Katz, "A Case for Redundant Arrays of Inexpensive Disks (RAID)," in Proc. of SIGMOD, Chicago, IL, Jun. 1988, pp. 109-116.
-
Proc. of SIGMOD, Chicago, IL, Jun. 1988
, pp. 109-116
-
-
Patterson, D.A.1
Gibson, G.2
Katz, R.H.3
-
15
-
-
25844511502
-
Total recall: System support for automated availability management
-
R. Bhagwan and et al., "Total recall: system support for automated availability management," in Proc. of USENIX NSDI, 2004.
-
Proc. of USENIX NSDI, 2004
-
-
Bhagwan, R.1
-
18
-
-
38949169175
-
Cryptree: A folder tree structure for cryptographic file systems
-
D. Grolimund and et al., "Cryptree: A folder tree structure for cryptographic file systems." in Proc. of IEEE SRDS, 2006.
-
Proc. of IEEE SRDS, 2006
-
-
Grolimund, D.1
-
19
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system," in Proc. of ICDCS, 2002.
-
Proc. of ICDCS, 2002
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
21
-
-
47249131447
-
Exploiting availability prediction in distributed systems
-
ser. NSDI'06. Berkeley, CA, USA: USENIX Association
-
J. W. Mickens and B. D. Noble, "Exploiting availability prediction in distributed systems," in Proc. of NSDI - Volume 3, ser. NSDI'06. Berkeley, CA, USA: USENIX Association, 2006, pp. 6-6.
-
(2006)
Proc. of NSDI
, vol.3
, pp. 6
-
-
Mickens, J.W.1
Noble, B.D.2
-
22
-
-
84870373940
-
-
Personal Communication with from Wuala, Feb.
-
Personal Communication with Luzius Meisser from Wuala, Feb. 2012.
-
(2012)
-
-
Meisser, L.1
-
23
-
-
16244421152
-
Are file swapping networks cacheable? Characterizing p2p traffic
-
N. Leibowitz, A. Bergman, R. Ben-shaul, and A. Shavit, "Are file swapping networks cacheable? characterizing p2p traffic," in Proc. of WWW Caching Workshop, 2002.
-
Proc. of WWW Caching Workshop, 2002
-
-
Leibowitz, N.1
Bergman, A.2
Ben-shaul, R.3
Shavit, A.4
-
25
-
-
84871129752
-
Kiss: Stochastic packet inspection
-
A. Finamore et al., "Kiss: Stochastic packet inspection," in Proc. of TMA, 2009.
-
Proc. of TMA, 2009
-
-
Finamore, A.1
-
26
-
-
36749039325
-
Understanding the power of pull-based streaming protocol: Can we do better
-
M. Zhang, Q. Zhang, L. Sun, and S. Yang, "Understanding the power of pull-based streaming protocol: Can we do better," IEEE JSAC, vol. 25, 2007.
-
(2007)
IEEE JSAC
, vol.25
-
-
Zhang, M.1
Zhang, Q.2
Sun, L.3
Yang, S.4
-
27
-
-
84871120729
-
-
LaCie AG
-
LaCie AG, 2012, Wuala Changelog. http://bugs.wuala.com/changelog-page. php.
-
(2012)
Wuala Changelog
-
-
-
28
-
-
51049097230
-
-
Eclipse Foundation, 2012, Jetty Web Server. http://www.eclipse.org/jetty/ .
-
(2012)
Jetty Web Server
-
-
-
29
-
-
84855401484
-
-
Spring
-
Sandvine, Global Internet Phenomena Report, Spring 2011. http://www.sandvine.com/downloads/documents/05-17-2011-phenomena/ Sandvine%20Global%20Internet%20Phenomena%20Report.pdf/.
-
(2011)
Global Internet Phenomena Report
-
-
-
30
-
-
70450064414
-
Dynamo: Amazon's highly available key-value store
-
Oct.
-
G. DeCandia et al., "Dynamo: amazon's highly available key-value store," SIGOPS Oper. Syst. Rev., vol. 41, no. 6, pp. 205-220, Oct. 2007.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, Issue.6
, pp. 205-220
-
-
DeCandia, G.1
-
31
-
-
85092898866
-
High availability, scalable storage, dynamic peer networks: Pick two
-
Berkeley, CA, USA: USENIX Association
-
C. Blake and R. Rodrigues, "High availability, scalable storage, dynamic peer networks: pick two," in Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9. Berkeley, CA, USA: USENIX Association, 2003, pp. 1-1.
-
(2003)
Proceedings of the 9th Conference on Hot Topics in Operating Systems
, vol.9
, pp. 1
-
-
Blake, C.1
Rodrigues, R.2
|