-
1
-
-
85080733114
-
-
http://th.informatik.uni-mannheim.de/people/lucks/hashcollisions/.
-
-
-
-
2
-
-
85080732396
-
-
Rsync http://rsync.samba.org
-
Rsync http://rsync.samba.org.
-
-
-
-
3
-
-
10444279524
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
Dec
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In OSDI, Dec. 2002.
-
(2002)
OSDI
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422–426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
5
-
-
0031346696
-
On the resemblance and containment of documents
-
A. Z. Broder. On the resemblance and containment of documents. In SEQUENCES, 1997.
-
(1997)
SEQUENCES
-
-
Broder, A.Z.1
-
6
-
-
79956075292
-
Identifying and filtering near-duplicate documents
-
A. Z. Broder. Identifying and filtering near-duplicate documents. In COM, pages 1–10, 2000.
-
(2000)
COM
, pp. 1-10
-
-
Broder, A.Z.1
-
8
-
-
33644905483
-
Network applications of bloom filters: A survey
-
A. Z. Broder and M. Mitzenmacher. Network applications of Bloom filters: A survey. In Allerton, 2002.
-
(2002)
Allerton
-
-
Broder, A.Z.1
Mitzenmacher, M.2
-
9
-
-
84945137687
-
On the evolution of clusters of near-duplicate web pages
-
D. Fetterly, M. Manasse, and M. Najork. On the evolution of clusters of near-duplicate web pages. In LA-WEB, 2003.
-
(2003)
LA-WEB
-
-
Fetterly, D.1
Manasse, M.2
Najork, M.3
-
10
-
-
85092942164
-
An analysis of compare-by-hash
-
V. Henson. An analysis of compare-by-hash. In HotOS IX, 2003.
-
(2003)
HotOS IX
-
-
Henson, V.1
-
12
-
-
35348864044
-
Hierarchical substring caching for efficient content distribution to low-bandwidth clients
-
U. Irmak and T. Suel. Hierarchical substring caching for efficient content distribution to low-bandwidth clients. In WWW, 2005.
-
(2005)
WWW
-
-
Irmak, U.1
Suel, T.2
-
15
-
-
85091109842
-
Redundancy elimination within large collections of files
-
P. Kulkarni, F. Douglis, J. D. LaVoie, and J. M. Tracey. Redundancy elimination within large collections of files. In USENIX Annual Technical Conference, General Track, pages 59–72, 2004.
-
(2004)
USENIX Annual Technical Conference, General Track
, pp. 59-72
-
-
Kulkarni, P.1
Douglis, F.2
LaVoie, J.D.3
Tracey, J.M.4
-
16
-
-
2442462975
-
-
Unpublished manuscript
-
J. Langford. Multiround rsync. Unpublished manuscript. http://www-2.cs.cmu.edu/~jcl/research/mrsync/mrsync.ps.
-
Multiround Rsync
-
-
Langford, J.1
-
18
-
-
0036806148
-
Compressed bloom filters
-
M. Mitzenmacher. Compressed Bloom filters. IEEE/ACM Trans. Netw., 10(5):604–612, 2002.
-
(2002)
IEEE/ACM Trans. Netw.
, vol.10
, Issue.5
, pp. 604-612
-
-
Mitzenmacher, M.1
-
19
-
-
84866604072
-
Design, implementation, and evaluation of duplicate transfer detection in HTTP
-
J. C. Mogul, Y.-M. Chan, and T. Kelly. Design, implementation, and evaluation of duplicate transfer detection in HTTP. In NSDI, 2004.
-
(2004)
NSDI
-
-
Mogul, J.C.1
Chan, Y.-M.2
Kelly, T.3
-
21
-
-
85084160673
-
Venti: A new approach to archival storage
-
S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In FAST, 2002.
-
(2002)
FAST
-
-
Quinlan, S.1
Dorward, S.2
-
23
-
-
84880498563
-
Value-based web caching
-
S. C. Rhea, K. Liang, and E. Brewer. Value-based web caching. In WWW, pages 619–628, 2003.
-
(2003)
WWW
, pp. 619-628
-
-
Rhea, S.C.1
Liang, K.2
Brewer, E.3
-
24
-
-
3242754339
-
Optimizing the migration of virtual computers
-
Dec
-
C. P. Sapuntzakis, R. Chandra, B. Pfaff, J. Chow, M. S. Lam, and M. Rosenblum. Optimizing the migration of virtual computers. In OSDI, Dec. 2002.
-
(2002)
OSDI
-
-
Sapuntzakis, C.P.1
Chandra, R.2
Pfaff, B.3
Chow, J.4
Lam, M.S.5
Rosenblum, M.6
-
26
-
-
33646754186
-
Finding collisions in the full SHA1
-
X. Wang, Y. Yin, and H. Yu. Finding collisions in the full SHA1. In Crypto, 2005.
-
(2005)
Crypto
-
-
Wang, X.1
Yin, Y.2
Yu, H.3
-
27
-
-
28444469734
-
Deep store: An archival storage system architecture
-
L. You, K. Pollack, and D. D. E. Long. Deep store: an archival storage system architecture. In ICDE, pages 804–815, 2005.
-
(2005)
ICDE
, pp. 804-815
-
-
You, L.1
Pollack, K.2
Long, D.D.E.3
|