Filters








26 Hits in 7.7 sec

The techniques and challenges of immutable storage with applications in multimedia

Ragib Hasan, Joseph Tucek, Paul Stanton, William Yurcik, Larry Brumbaugh, Jeff Rosendale, Roelof Boonstra, Rainer W. Lienhart, Noboru Babaguchi, Edward Y. Chang
2005 Storage and Retrieval Methods and Applications for Multimedia 2005  
One of the primary problems to ensuring the integrity of storage systems is to make sure a file cannot be changed without proper authorization.  ...  Immutable storage is storage whose content cannot be changed once it has been written.  ...  It includes a magnetic disk based cache mechanism that enables faster file access while accumulating changes to be subsequently written to the jukebox.  ... 
doi:10.1117/12.588103 dblp:conf/spieSR/HasanTSYBRB05 fatcat:33dnt4ppmzhe3bqtseyvdjtwuy

Streaming video over the Internet: approaches and directions

Dapeng Wu, Y.T. Hou, Wenwu Zhu, Ya-Qin Zhang, J.M. Peha
2001 IEEE transactions on circuits and systems for video technology (Print)  
To keep the storage cost down, tertiary storage (e.g., an automated tape library or CD-ROM jukebox) must be added.  ...  access and control functions for file storage and retrieval [23] .  ... 
doi:10.1109/76.911156 fatcat:aputdwikj5as7g7jxa4vg5qxzy

Clustered Multimedia Servers: Architectures and Storage Systems [chapter]

Guang Tan, Hai Jin, Song Wu
2003 Annual Review of Scalable Computing  
To keep the storage cut down, tertiary storage must be added such as automated tape libraries and optical jukebox. Hierarchical storage architecture can be used to reduce the overall cost.  ...  They take into account the effect of caching by expressing it as load reduction imposed on the disk.  ... 
doi:10.1142/9789812775498_0004 fatcat:hx2w57qexvemjgxnjrrvlbti5q

A Comprehensive Study of the Past, Present, and Future of Data Deduplication

Wen Xia, Hong Jiang, Dan Feng, Fred Douglis, Philip Shilane, Yu Hua, Min Fu, Yucheng Zhang, Yukun Zhou
2016 Proceedings of the IEEE  
It eliminates redundant data at the file or subfile level and identifies duplicate content by its cryptographically secure hash signature (i.e., collision-resistant fingerprint), which is shown to be much  ...  more computationally efficient than the traditional compression approaches in large-scale storage systems.  ...  Zadok for valuable discussions about deduplicated storage literature.  ... 
doi:10.1109/jproc.2016.2571298 fatcat:krfdbgm5pjemnmaswml7k4uv4e

Peer-to-Peer-Based Social Networks: A Comprehensive Survey

Newton Masinde, Kalman Graffi
2020 SN Computer Science  
Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage  ...  These platforms offer services that support interactions via messaging, chatting or audio/video conferencing, and also sharing of content.  ...  Caching is usually performed near the file owners or the file requestors or along a query path from a requestor to an owner [129] .  ... 
doi:10.1007/s42979-020-00315-8 fatcat:iwktgohkjbdalmalaj5h3lulri

Peer-to-Peer based Social Networks: A Comprehensive Survey [article]

Newton Masinde, Kalman Graffi
2020 arXiv   pre-print
Secondly, it elaborates on the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure  ...  Caching is usually performed near the file owners or the file requestors or along a query path from a requestor to an owner [131] .  ...  File granularity techniques include full file replication, block level replication and erasure code replication [138] , [139] .  ... 
arXiv:2001.02611v2 fatcat:nrvp45dy3rbnhmajtvqiect3ty

Building Digital Libraries: An Overview
ENGLISH

Jagdish Arora
2001 DESIDOC Bulletin of Information Technology  
The article describes optical character recognition (OCR) and advocates for hybrid solution for preservation of digital information.  ...  With the technology available at an effordable cost, the libraries are initiating small digitisation projects as an individual library or as a group of libraries.  ...  jukeboxes and tape library systems.  ... 
doi:10.14429/dbit.21.6.3547 fatcat:ejfql6tlyvg6fgzol2ra34iiku

Finding a Winning Strategy Against the MP3 Invasion: Supplemental Measures the Recording Industry Must Take to Curb Online Piracy

Robert T. Baker
2000 UCLA Entertainment Law Review  
As mentioned in section III, the DMCA groups the activity of ISPs into four categories: (1) transmission and routing, (2) system caching, (3) system storage, and (4) information location. 72 The court  ...  Finally, the files are neither cached nor modified as they travel from one subscriber to another. Thus, at least one of the DMCA's 69 2000] tests seems to release Napster from liability.  ... 
doi:10.5070/lr881027011 fatcat:d3xwlxm6ujgv5gos2aasmxgi6u

Storage and Enterprise Archiving [chapter]

Paul G. Nagy, Thomas J. Schultz
PACS  
Advances in molecular imaging, multispectral imaging, and physiologic imaging suggest that the rate of growth in storage requirements will only accelerate in the future.  ...  Sitting between an application and the low-level block access storage system lies the file system, as shown in Figure 16 File system. card catalog of a storage system and knows where files are stored  ...  The file system remains on the computer, but low-level block-level access is routed through an external network of storage devices.  ... 
doi:10.1007/0-387-31070-3_16 fatcat:bdapa2gk5bakbetw5zf35ptbfq

Impromptu

Chris Schmandt, Kwan Hong Lee, Jang Kim, Mark Ackerman
2004 Proceedings of the 2nd international conference on Mobile systems, applications, and services - MobiSYS '04  
Since mobile processing is still significantly more expensive than server based, and speech services can be shared by multiple clients, providing these services in networked servers is a cost effective  ...  Existing "hybrid" products basically glue a mobile phone onto a PDA.  ... 
doi:10.1145/990064.990074 dblp:conf/mobisys/SchmandtLKA04 fatcat:oqbubd4tszdqhmiqdfcidpjyxu

Video Communication Networks [chapter]

Dan Schonfeld
2009 The Essential Guide to Video Processing  
Efficient storage and communication requires video data to be represented in compressed form. Numerous video compression standards have been developed by industrial organizations.  ...  The basic techniques used for video communication are illustrated over a variety of communication networks: Hybrid Fiber-Coax, Digital Subscriber Loop, Wireless, ATM, and Internet Protocol networks.  ...  Thus, it is reserved only for those applications that require the fastest service at all cost. A RAM cache is used to store the most popular movies.  ... 
doi:10.1016/b978-0-12-374456-2.00019-0 fatcat:cubhwpxid5fs5lzat5632dl76u

Video Communication Networks [chapter]

Dan Schonfeld
2005 Handbook of Image and Video Processing  
Efficient storage and communication requires video data to be represented in compressed form. Numerous video compression standards have been developed by industrial organizations.  ...  The basic techniques used for video communication are illustrated over a variety of communication networks: Hybrid Fiber-Coax, Digital Subscriber Loop, Wireless, ATM, and Internet Protocol networks.  ...  Thus, it is reserved only for those applications that require the fastest service at all cost. A RAM cache is used to store the most popular movies.  ... 
doi:10.1016/b978-012119792-6/50123-6 fatcat:mikq5fxikzb2lapuhnuogybs6e

A Middleware-Based Application Framework for Active Space Applications [chapter]

Manuel Román, Roy H. Campbell
2003 Lecture Notes in Computer Science  
File servers may be located locally or remotely to export storage to the local space.  ...  It also listens for changes in the file system (new files added or removed) and automatically updates its cache and sends a notification to the listeners.  ... 
doi:10.1007/3-540-44892-6_22 fatcat:puihavm5hnekrbbu7pclsj26xu

Toward timely, predictable and cost-effective data analytics

Renata Borovica-Gajic
2016
expose storage via the Swift interface [192] .  ...  Once a disk block of the raw file has been processed during a scan, PostgresRaw caches the needed binary data immediately.  ...  Similarly, adaptive data caches as the one exploited in Chapter 7 could adjust their layout to the workload as well, since the decision among row-oriented, columnoriented or hybrid caches could further  ... 
doi:10.5075/epfl-thesis-7140 fatcat:l6a3aotacngw3ocwrdczywwnde

Full Issue PDF

2014 SMPTE Motion Imaging Journal  
Three strategies for laser illumination are now being pursued either in the marketplace or in R@D laboratories ® Cost-effective replacement of xenon projectors based on total cost of ownership, ® High-luminance  ...  However, deployment of UHDT\ has been slow due to high production and storage costs, lack of a terrestrial transmission standard, uncertainty of spectrum avail ability after the FCC UHF spectrum auction  ... 
doi:10.5594/j18459 fatcat:yyo344zs6fad3olb56kowws7ke
« Previous Showing results 1 — 15 out of 26 results