-
2
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. Douceur, J. Howell, J. Lorch, M. Theimer, and R. Wattenhofer. Farsite: Federated, available, and reliable storage for an incompletely trusted environment. ACM SIGOPS Operating Systems Review, 36(SI):1-14, 2002.
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.6
Howell, J.7
Lorch, J.8
Theimer, M.9
Wattenhofer, R.10
-
3
-
-
70350393266
-
Hash, displace, and compress
-
D. Belazzougui, F. C. Botelho, and M. Dietzfelbinger. Hash, displace, and compress. In Proceedings of the 17th Annual European Symposium on Algorithms, ESA09, pages 682-693, 2009.
-
(2009)
Proceedings of the 17th Annual European Symposium on Algorithms, ESA09
, pp. 682-693
-
-
Belazzougui, D.1
Botelho, F.C.2
Dietzfelbinger, M.3
-
4
-
-
84873108209
-
Dont thrash: How to cache your hash on flash
-
M. A. Bender, M. Farach-Colton, R. Johnson, R. Kraner, B. C. Kuszmaul, D. Medjedovic, P. Montes, P. Shetty, R. P. Spillane, and E. Zadok. Dont thrash: How to cache your hash on flash. In Proceedings of the 38th International Conference on Very Large Data Bases, 2012.
-
(2012)
Proceedings of the 38th International Conference on Very Large Data Bases
-
-
Bender, M.A.1
Farach-Colton, M.2
Johnson, R.3
Kraner, R.4
Kuszmaul, B.C.5
Medjedovic, D.6
Montes, P.7
Shetty, P.8
Spillane, R.P.9
Zadok, E.10
-
5
-
-
76349109236
-
Extreme binning: Scalable, parallel deduplication for chunk-based file backup
-
Sept
-
D. Bhagwat, K. Eshghi, D. D. Long, and M. Lillibridge. Extreme binning: scalable, parallel deduplication for chunk-based file backup. In Proceedings of the 17th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Sept. 2009.
-
(2009)
Proceedings of the 17th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems
-
-
Bhagwat, D.1
Eshghi, K.2
Long, D.D.3
Lillibridge, M.4
-
6
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, July 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
7
-
-
79953843470
-
Minimal perfect hashing: A competitive method for indexing internal memory
-
F. C. Botelho, A. Lacerda, G. V. Menezes, and N. Ziviani. Minimal perfect hashing: A competitive method for indexing internal memory. Information Sciences, 181(13):2608-2625, 2011.
-
(2011)
Information Sciences
, vol.181
, Issue.13
, pp. 2608-2625
-
-
Botelho, F.C.1
Lacerda, A.2
Menezes, G.V.3
Ziviani, N.4
-
8
-
-
84869238649
-
Practical perfect hashing in nearly optimal space
-
June
-
F. C. Botelho, R. Pagh, and N. Ziviani. Practical perfect hashing in nearly optimal space. Information Systems, June 2012. http://dx.doi.org/10.1016/j.is.2012.06.002.
-
(2012)
Information Systems
-
-
Botelho, F.C.1
Pagh, R.2
Ziviani, N.3
-
9
-
-
84857341375
-
Cores of random r-partite hypergraphs
-
F. C. Botelho, N. C. Wormald, and N. Ziviani. Cores of random r-partite hypergraphs. Information Processing Letters, 112(8-9):314-319, 2012.
-
(2012)
Information Processing Letters
, vol.112
, Issue.8-9
, pp. 314-319
-
-
Botelho, F.C.1
Wormald, N.C.2
Ziviani, N.3
-
10
-
-
70450232823
-
Network applications of Bloom filters: A survey
-
A. Broder and M. Mitzenmacher. Network applications of Bloom filters: A survey. Internet Mathematics, 1(4):485-509, 2005.
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
11
-
-
1842473700
-
The bloomier filter: An efficient data structure for static support lookup tables
-
B. Chazelle, J. Kilian, R. Rubinfeld, and A. Tal. The bloomier filter: an efficient data structure for static support lookup tables. In Proceedings of the 15th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA04), pages 30-39, 2004.
-
(2004)
Proceedings of the 15th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA04)
, pp. 30-39
-
-
Chazelle, B.1
Kilian, J.2
Rubinfeld, R.3
Tal, A.4
-
14
-
-
85110007026
-
-
Z. Deng, E. Yenilmez, J. Leu, J. Hoffman, E. Straver, H. Dai, and K. Moler. Metal-coated carbon nanotube tips for magnetic force microscopy. 85(25), 2004.
-
(2004)
Metal-coated Carbon Nanotube Tips for Magnetic Force Microscopy
, vol.85
, Issue.25
-
-
Deng, Z.1
Yenilmez, E.2
Leu, J.3
Hoffman, J.4
Straver, E.5
Dai, H.6
Moler, K.7
-
15
-
-
49049109270
-
Succinct data structures for retrieval and approximate membership
-
Springer-Verlag
-
M. Dietzfelbinger and R. Pagh. Succinct data structures for retrieval and approximate membership. In Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part I, ICALP 08, pages 385-396. Springer-Verlag, 2008.
-
(2008)
Proceedings of the 35th International Colloquium on Automata, Languages and Programming, Part I, ICALP 08
, pp. 385-396
-
-
Dietzfelbinger, M.1
Pagh, R.2
-
17
-
-
79955995661
-
Hydrastor: A scalable secondary storage
-
C. Dubnicki, L. G. L. Heldt, M. Kaczmarczyk, P. S. Wojciech Kilian, J. Szczepkowski, C. Ungureanu, and M. Welnicki. Hydrastor: A scalable secondary storage. In Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009.
-
(2009)
Proceedings of the 7th USENIX Conference on File and Storage Technologies
-
-
Dubnicki, C.1
Heldt, L.G.L.2
Kaczmarczyk, M.3
Wojciech Kilian, P.S.4
Szczepkowski, J.5
Ungureanu, C.6
Welnicki, M.7
-
18
-
-
85109940313
-
-
EMC Corporation
-
EMC Corporation. Data Domain. http:// www.emc.com/backup-and-recovery/ data-domain/data-domain.htm/, 2012.
-
(2012)
Data Domain
-
-
-
19
-
-
85109798307
-
-
Eraser
-
Eraser. http://eraser.heidi.ie/.
-
-
-
-
20
-
-
0002302934
-
On the size of separating systems and families of perfect hashing functions
-
M. L. Fredman and J. Komlós. On the size of separating systems and families of perfect hashing functions. SIAM Journal on Algebraic and Discrete Methods, 5:61-68, 1984.
-
(1984)
M Journal on Algebraic and Discrete Methods
, vol.5
, pp. 61-68
-
-
Fredman, M.L.1
Komlós, J.2
-
23
-
-
3042825662
-
Remembrance of data passed: A study of disk sanitization practices
-
S. Garfinkel and A. Shelat. Remembrance of data passed: a study of disk sanitization practices. IEEE Security & Privacy, 1(1):17-27.
-
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 17-27
-
-
Garfinkel, S.1
Shelat, A.2
-
28
-
-
78651527509
-
-
Recommendations of the National Institute of Standards and Technology, Computer Security Division September
-
R. Kissel, M. Scholl, S. Skolochenko, and X. Li. Guidelines for Media Sanitization: Special Publication 800-88, Recommendations of the National Institute of Standards and Technology, Computer Security Division, September 2006.
-
(2006)
Guidelines for Media Sanitization: Special Publication 800-88
-
-
Kissel, R.1
Scholl, M.2
Skolochenko, S.3
Li, X.4
-
29
-
-
84933071250
-
Sparse indexing: Large scale, inline deduplication using sampling and locality
-
M. Lillibridge, K. Eshghi, D. Bhagwat, V. Deolalikar, G. Trezise, and P. Camble. Sparse indexing: large scale, inline deduplication using sampling and locality. In Proceedings of the 7th USENIX Conference on File and Storage Technologies, pages 111-123, 2009.
-
(2009)
Proceedings of the 7th USENIX Conference on File and Storage Technologies
, pp. 111-123
-
-
Lillibridge, M.1
Eshghi, K.2
Bhagwat, D.3
Deolalikar, V.4
Trezise, G.5
Camble, P.6
-
30
-
-
85109921840
-
-
LSoft Technologies Inc. Active@KillDisk
-
LSoft Technologies Inc. Active@KillDisk. http: //www.killdisk.com/.
-
-
-
-
34
-
-
85109841403
-
-
National Security Agency Central Security Service
-
National Security Agency Central Security Service. Evaluated Products List-Degausser, 2012.
-
(2012)
Evaluated Products List-Degausser
-
-
-
35
-
-
85109978874
-
-
NetApp
-
NetApp. NetApp ONTAP. http: //www.netapp.com/us/products/ platform-os/dedupe.html, 2012.
-
(2012)
NetApp ONTAP
-
-
-
38
-
-
0025507834
-
The spatial complexity of oblivious k-probe hash functions
-
October
-
J. P. Schmidt and A. Siegel. The spatial complexity of oblivious k-probe hash functions. SIAM Journal on Computing, 19(5):775-786, October 1990.
-
(1990)
SIAM Journal on Computing
, vol.19
, Issue.5
, pp. 775-786
-
-
Schmidt, J.P.1
Siegel, A.2
-
40
-
-
70349237760
-
Secure data deduplication
-
ACM
-
M. Storer, K. Greenan, D. Long, and E. Miller. Secure data deduplication. In Proceedings of the 4th ACM international workshop on Storage security and survivability, pages 1-10. ACM, 2008.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability
, pp. 1-10
-
-
Storer, M.1
Greenan, K.2
Long, D.3
Miller, E.4
-
42
-
-
85109978713
-
-
Symantec
-
Symantec. Symantec NetBackup Pure-Disk. http://www.symantec.com/ netbackup-puredisk, 2012.
-
(2012)
Symantec NetBackup Pure-Disk
-
-
-
43
-
-
84885890734
-
Fade: Secure overlay cloud storage with file assured deletion
-
Y. Tang, P. Lee, J. Lui, and R. Perlman. Fade: Secure overlay cloud storage with file assured deletion. Security and Privacy in Communication Networks, pages 380-397, 2010.
-
(2010)
Security and Privacy in Communication Networks
, pp. 380-397
-
-
Tang, Y.1
Lee, P.2
Lui, J.3
Perlman, R.4
-
44
-
-
85110029897
-
-
US Department of Defense National Industrial Security Program. U.S. National Industrial Security Program Operating Manual (DoD 5220.22-M) 2006
-
US Department of Defense National Industrial Security Program. U.S. National Industrial Security Program Operating Manual (DoD 5220.22-M), 2006.
-
-
-
-
47
-
-
85077122692
-
Characteristics of backup workloads in production systems
-
G. Wallace, F. Douglis, H. Qian, P. Shilane, S. Smaldone, M. Chamness, and W. Hsu. Characteristics of backup workloads in production systems. In Proceedings of the 10th USENIX Conference on File and Storage Technologies, 2012.
-
(2012)
Proceedings of the 10th USENIX Conference on File and Storage Technologies
-
-
Wallace, G.1
Douglis, F.2
Qian, H.3
Shilane, P.4
Smaldone, S.5
Chamness, M.6
Hsu, W.7
|