2,843 Hits in 4.3 sec

A cached WORM file system

Sean Quinlan
1991 Software, Practice & Experience  
This paper describes a general-purpose file system that uses a writeonce-read-many (WORM) optical disk accessed via a magnetic disk cache.  ...  These snapshots reside entirely on the WORM, are accessible to the user via a second read-only file system, do not contain multiple copies of unchanged data, and can be used to rebuild the file system  ...  Acknowledgements Ken Thompson suggested the idea of using the WORM address space for the file system and the algorithm for the dump command. He also provided much help with the implementation.  ... 
doi:10.1002/spe.4380211203 fatcat:lghdbypbefc3thx2aotkvfqt3q

The Megadoc Image Document Management System

Jan B. te Kiefte, Bob Hasenaar, Joop W. Mevius, Theo M. van Hunnik
1993 Digital technical journal of Digital Equipment Corporation  
Although each of the component technologies may be fairly mature, combining them into easy-tocustomize solutions presented a significant systems engineering challenge.  ...  Megadoc image document management solutions are the result of a systems engineering effort that combined several disciplines, ranging from optical disk hardware to an image application framework.  ...  a UNIX file system interface for WORM disks.  ... 
dblp:journals/dtj/KiefteHMH93 fatcat:mdcpyqg4g5fu7dyjtfysfrh6sm

Simulating non-scanning worms on peer-to-peer networks

Guanling Chen, Robert S. Gray
2006 Proceedings of the 1st international conference on Scalable information systems - InfoScale '06  
In this paper, we identify three strategies a non-scanning worm could use to propagate through P2P systems.  ...  end systems.  ...  A small cache (10) enables a proactive worm to infect almost 90% population at time 50.  ... 
doi:10.1145/1146847.1146876 dblp:conf/infoscale/ChenG06 fatcat:lcspvqwe6fcuhcaqvjcadvji44


Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
2006 Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems - ANCS '06  
The fast spreading worm is becoming one of the most serious threats to today's networked information systems. A fast spreading worm could infect hundreds of thousands of hosts within a few minutes.  ...  In order to stop a fast spreading worm, we need the capability to detect and contain worms automatically in real-time.  ...  For example, in BitTorrent-like systems, after a peer finishes downloading a file piece, it may simultaneously upload the file piece to several other peers.  ... 
doi:10.1145/1185347.1185371 dblp:conf/ancs/ChenWLZ06 fatcat:3vrvqzi25zasdhfbvuk5v76pey

A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment

Songqing Chen, Lei Liu, Xinyuan Wang, Xinwen Zhang, Zhao Zhang
2014 ACM Transactions on Autonomous and Adaptive Systems  
The fast-spreading worm, which immediately propagates itself after a successful infection, is becoming one of the most serious threats to today's networked information systems.  ...  A host-based approach for unknown fastspreading worm detection and containment.  ...  For example, in Bit-Torrent like systems, after a peer finishes downloading a file piece, it may simultaneously upload to several other peers, a pattern that worm propagation also exhibits.  ... 
doi:10.1145/2555615 fatcat:ipdkowmcxzfpbhpxvaj6tdkxsy

EOS architectural evolution and strategic development directions

Georgios Bitzes, Fabio Luchetti, Andrea Manzi, Mihai Patrascoiu, Andreas Joachim Peters, Michal Kamil Simon, Elvin Alin Sindrilaru, C. Doglioni, D. Kim, G.A. Stewart, L. Silvestris, P. Jackson (+1 others)
2020 EPJ Web of Conferences  
of the components like draining, LRU engine, file system consistency check and others, to ensure a stable and predictable performance.  ...  Some of these changes have far-reaching effects and are aimed at simplifying both the deployment model but more importantly the operational load when dealing with (non/)transient errors in a system managing  ...  EOS has been extended with a synchronous notification interface to inform CTA about changes in the disk cache. In a CTA enabled instance data is write-once read-many (WORM).  ... 
doi:10.1051/epjconf/202024504009 fatcat:s3ynlm3xozbynjqtmybqoxib5e

Large quantity discrimination by North Island robins (Petroica longipes)

Alexis Garland, Jason Low, Kevin C. Burns
2012 Animal Cognition  
While robins shared with other species a ratio-based representation system for representing very large values, they also appeared to have developed an object indexing system with an extended upper limit  ...  In Experiment 1, robins were tested on a range of numerical values of up to 14 versus 16 items, which were sequentially presented and hidden.  ...  Non-linguistic number sense is understood to exist in humans and animals in two distinct systems: an indexing system, which processes or stores ''object files'' with a strict capacity limit of three to  ... 
doi:10.1007/s10071-012-0537-3 pmid:22825034 fatcat:mrerat3defd3nd2mdhojd4rjyi

FUSE: Fusing STT-MRAM into GPUs to Alleviate Off-Chip Memory Access Overheads [article]

Jie Zhang, Myoungsoo Jung, Mahmut Taylan Kandemir
2019 arXiv   pre-print
In this work, we propose FUSE, a novel GPU cache system that integrates spin-transfer torque magnetic random-access memory (STT-MRAM) into the on-chip L1D cache.  ...  data blocks over a small portion of SRAM in the L1D cache.  ...  register files).  ... 
arXiv:1903.01776v2 fatcat:7ahl2bxwp5axvinzfccixwbvqu

Trustworthy Keyword Search for Regulatory-Compliant Record Retention

Soumyadeb Mitra, Windsor W. Hsu, Marianne Winslett
2006 Very Large Data Bases Conference  
Recent litigation and intense regulatory focus on secure retention of electronic records have spurred a rush to introduce Write-Once-Read-Many (WORM) storage devices for retaining business records such  ...  However, simply storing records in WORM storage is insufficient to ensure that the records are trustworthy, i.e., able to provide irrefutable proof and accurate details of past events.  ...  We emulated the storage cache by caching in software and disabling file system caching (forcing all writes to disk).  ... 
dblp:conf/vldb/MitraHW06 fatcat:n4vjbn4edveazkyyfqhgr65jue

An electric fence for kernel buffers

Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok
2005 Proceedings of the 2005 ACM workshop on Storage security and survivability - StorageSS '05  
Kefence is especially applicable to file system code because file systems operate at a high level of abstraction and require no direct access to the physical memory.  ...  At the same time, file systems use a large number of kernel buffers and file system errors are most harmful for users because users' persistent data can be corrupted.  ...  Wrapfs is a wrapper file system that just redirects the Virtual File System (VFS) calls to a lower-level file system. The vanilla Wrapfs uses kmallocs for allocation.  ... 
doi:10.1145/1103780.1103786 dblp:conf/storagess/JoukovKSZ05 fatcat:vxhrvsk5vjevzpbv7oh7axg2si

An operating system independent WORM archival system

Guido Russo, Stefano Russo, Ben??it Pirenne
1995 Software, Practice & Experience  
We describe the organization of a general purpose data archival system for Write-Once, Read-Many (WORM) optical disks.  ...  which can be rebuilt immediately in case of a crash, to speed up file retrieval.  ...  ACKNOWLEDGEMENTS The following persons have contributed to define the format of the file system: Rudy Albrecht, ST-ECF; Francois Ochsenbein, CDS; Peter Shames, ST-ScI.  ... 
doi:10.1002/spe.4380250504 fatcat:oi5w3eykqvd6bbmltzzbjnvsvq

Secure deletion from inverted indexes on compliance storage

Soumyadeb Mitra, Marianne Winslett
2006 Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06  
A file committed to a WORM device cannot be deleted even by a super-user and hence is secure from attacks originating from company insiders.  ...  Since most of the modern WORM devices are built on top of magnetic media, they also support a secure deletion operation by associating expiration time with files.  ...  As explained above, each posting list can be maintained as a separate file on WORM.  ... 
doi:10.1145/1179559.1179572 dblp:conf/storagess/MitraW06 fatcat:bx73dztmlvh3nilkc5cuz2blfe

Client-Side Detection of XSS Worms by Monitoring Payload Propagation [chapter]

Fangqi Sun, Liang Xu, Zhendong Su
2009 Lecture Notes in Computer Science  
Cross-site scripting (XSS) vulnerabilities make it possible for worms to spread quickly to a broad range of users on popular Web sites.  ...  We have implemented a cross-platform Firefox extension that is able to detect all existing self-replicating XSS worms that propagate on the client side.  ...  the DOM tree and contents of cached external files.  ... 
doi:10.1007/978-3-642-04444-1_33 fatcat:7go7hj5rtvgelikmqy5bgcbvva

An Architecture for Regulatory Compliant Database Management

Soumyadeb Mitra, Marianne Winslett, Richard T. Snodgrass, Shashank Yaduvanshi, Sumedh Ambokar
2009 Proceedings / International Conference on Data Engineering  
These servers preserve unstructured and semi-structured data at a file-level granularity: email, spreadsheets, reports, instant messages.  ...  We propose a compliant DBMS architecture and two refinements that illustrate the additional security that one can gain with only a slight performance penalty, with almost no modifications to the DBMS kernel  ...  file on WORM.  ... 
doi:10.1109/icde.2009.69 dblp:conf/icde/MitraWSYA09 fatcat:vopgonn3lna7vgq4mxs3o6db6m

Evaluating delayed write in a multilevel caching file system

1996 Proceedings of IFIP/IEEE International Conference on Distributed Platforms  
Delayed write in a multilevel file system cache hierarchy offers a way to improve performance in diverse client/server scenarios, such as integrating mass store into a distributed file system or providing  ...  Similarly, a high cache hit rate is necessary for users accessing file systems via low-speed links, where a delayed write intermediate caching server can mediate traffic to make better use of available  ...  [27] and Korner [28] investigate alternatives to LRU caching for a distributed file system. We may perform simulations using their suggested caching schemes in the context of multilevel caching.  ... 
doi:10.1109/icdp.1996.864218 fatcat:4a4hspvjgjdq3m2m3sxuhn7xha
« Previous Showing results 1 — 15 out of 2,843 results