-
1
-
-
0004190197
-
-
Addison-Wesley, Reading, MA
-
A. V. Aho, J. E. Hopcroft, and J. D. Ullman. Data Structures and Algorithms. Addison-Wesley, Reading, MA, 1983.
-
(1983)
Data Structures and Algorithms
-
-
Aho, A.V.1
Hopcroft, J.E.2
Ullman, J.D.3
-
2
-
-
84962752982
-
A two layered approach for securing an object store network
-
A. Azagury, R. Canetti, M. Factor, S. Halevi, E. Henis, D. Naor, N. Rinetzky, O. Rodeh, and J. Satran. A two layered approach for securing an object store network. IEEE International Security In Storage Workshop, 2002.
-
IEEE International Security In Storage Workshop, 2002
-
-
Azagury, A.1
Canetti, R.2
Factor, M.3
Halevi, S.4
Henis, E.5
Naor, D.6
Rinetzky, N.7
Rodeh, O.8
Satran, J.9
-
4
-
-
0038618923
-
-
Technical report, Cluster File Systems, Inc.
-
P. J. Braam. The Lustre storage architecture. Technical report, Cluster File Systems, Inc., 2002. http://www.lustre.org/docs/lustre.pdf.
-
(2002)
The Lustre Storage Architecture
-
-
Braam, P.J.1
-
8
-
-
0037942769
-
-
Technical report, IBM Haifa Research Labs
-
Z. Dubitzky, I. Gold, E. Henis, J. Satran, and D. Sheinwald. DSF: Data sharing facility. Technical report, IBM Haifa Research Labs, 2002.
-
(2002)
DSF: Data Sharing Facility
-
-
Dubitzky, Z.1
Gold, I.2
Henis, E.3
Satran, J.4
Sheinwald, D.5
-
9
-
-
84943563999
-
-
Ext2fs home page. http://e2fsprogs.sourceforge.net/ext2.html.
-
Ext2fs Home Page
-
-
-
10
-
-
44949270518
-
Competitive paging algorithms
-
A. Fiat, R. M. Karp, M. Luby, L. A. McGeoch, D. D. Sleator, and N. E. Young. Competitive paging algorithms. J. Algorithms, 12(4):685-699, 1991.
-
(1991)
J. Algorithms
, vol.12
, Issue.4
, pp. 685-699
-
-
Fiat, A.1
Karp, R.M.2
Luby, M.3
McGeoch, L.A.4
Sleator, D.D.5
Young, N.E.6
-
11
-
-
0031611082
-
A cost-effective, high-bandwidth storage architecture
-
G. Gibson, D. Nagle, K. Amiri, J. Butler, F. Chang, H. Gobioff, C. Hardin, E. Riedel, D. Rochberg, and J. Zelenka. A cost-effective, high-bandwidth storage architecture. International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pages 92-103, 1998.
-
(1998)
International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
, pp. 92-103
-
-
Gibson, G.1
Nagle, D.2
Amiri, K.3
Butler, J.4
Chang, F.5
Gobioff, H.6
Hardin, C.7
Riedel, E.8
Rochberg, D.9
Zelenka, J.10
-
12
-
-
0002340950
-
File server scaling with network-attached secure disks
-
G. Gibson, D. Nagle, K. Amiri, F. Chang, E. Feinberg, H. Gobioff, C. Lee, B. Ozceri, E. Riedel, D. Rochberg, and J. Zelenka. File server scaling with network-attached secure disks. Proceedings of the ACM International Conference on Measurement and Modelling of Computer System, Seattle, WA, June 1996.
-
Proceedings of the ACM International Conference on Measurement and Modelling of Computer System, Seattle, WA, June 1996
-
-
Gibson, G.1
Nagle, D.2
Amiri, K.3
Chang, F.4
Feinberg, E.5
Gobioff, H.6
Lee, C.7
Ozceri, B.8
Riedel, E.9
Rochberg, D.10
Zelenka, J.11
-
13
-
-
0003569870
-
-
G. Gibson, D. Nagle, K. Amiri, F. Chang, H. Gobioff, E. Riedel, D. Rochberg, and J. Zelenka. Filesystems for network-attached secure disks, 1997.
-
(1997)
Filesystems for Network-attached Secure Disks
-
-
Gibson, G.1
Nagle, D.2
Amiri, K.3
Chang, F.4
Gobioff, H.5
Riedel, E.6
Rochberg, D.7
Zelenka, J.8
-
14
-
-
0005970563
-
-
Technical Report CMU
-
G. A. Gibson, D. P. Nagle, K. Amiri, F. W. Chang, E. Feinberg, H. G. C. Lee, B. Ozceri, E. Riedel, and D. Rochberg. A case for network-attached secure disks. Technical Report CMU-CS-96-142, CMU, 1996.
-
(1996)
A Case for Network-attached Secure Disks
-
-
Gibson, G.A.1
Nagle, D.P.2
Amiri, K.3
Chang, F.W.4
Feinberg, E.5
Lee, H.G.C.6
Ozceri, B.7
Riedel, E.8
Rochberg, D.9
-
16
-
-
1542696363
-
High-performance network- and channel-attached storage
-
August
-
R. H. Katz. High-performance network- and channel-attached storage. Proceedings of the IEEE, 80(8), August 1992.
-
(1992)
Proceedings of the IEEE
, vol.80
, Issue.8
-
-
Katz, R.H.1
-
20
-
-
0033906295
-
Authenticating network-attached storage
-
January
-
B. C. Reed, E. G. Chron, R. C. Burns, and D. D. Long. Authenticating network-attached storage. IEEE Micro, 20(1):49-57, January 2000.
-
(2000)
IEEE Micro
, vol.20
, Issue.1
, pp. 49-57
-
-
Reed, B.C.1
Chron, E.G.2
Burns, R.C.3
Long, D.D.4
-
23
-
-
0001846174
-
Active storage for large-scale data mining and multimedia
-
E. Riedel, G. A. Gibson, and C. Faloutsos. Active storage for large-scale data mining and multimedia. In Proc. 24th Int. Conf. Very Large Data Bases, VLDB, pages 62-73, 1998.
-
(1998)
Proc. 24th Int. Conf. Very Large Data Bases, VLDB
, pp. 62-73
-
-
Riedel, E.1
Gibson, G.A.2
Faloutsos, C.3
-
25
-
-
0042305742
-
-
IETF, draft-ietf-ips-iscsi-17 edition, September
-
J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka, and E. Zeidner. iSCSI. IETF, draft-ietf-ips-iscsi-17 edition, September 2002.
-
(2002)
ISCSI
-
-
Satran, J.1
Meth, K.2
Sapuntzakis, C.3
Chadalapaka, M.4
Zeidner, E.5
|