A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
The techniques and challenges of immutable storage with applications in multimedia
2005
Storage and Retrieval Methods and Applications for Multimedia 2005
One of the primary problems to ensuring the integrity of storage systems is to make sure a file cannot be changed without proper authorization. ...
Immutable storage is storage whose content cannot be changed once it has been written. ...
It includes a magnetic disk based cache mechanism that enables faster file access while accumulating changes to be subsequently written to the jukebox. ...
doi:10.1117/12.588103
dblp:conf/spieSR/HasanTSYBRB05
fatcat:33dnt4ppmzhe3bqtseyvdjtwuy
Streaming video over the Internet: approaches and directions
2001
IEEE transactions on circuits and systems for video technology (Print)
To keep the storage cost down, tertiary storage (e.g., an automated tape library or CD-ROM jukebox) must be added. ...
access and control functions for file storage and retrieval [23] . ...
doi:10.1109/76.911156
fatcat:aputdwikj5as7g7jxa4vg5qxzy
Clustered Multimedia Servers: Architectures and Storage Systems
[chapter]
2003
Annual Review of Scalable Computing
To keep the storage cut down, tertiary storage must be added such as automated tape libraries and optical jukebox. Hierarchical storage architecture can be used to reduce the overall cost. ...
They take into account the effect of caching by expressing it as load reduction imposed on the disk. ...
doi:10.1142/9789812775498_0004
fatcat:hx2w57qexvemjgxnjrrvlbti5q
A Comprehensive Study of the Past, Present, and Future of Data Deduplication
2016
Proceedings of the IEEE
It eliminates redundant data at the file or subfile level and identifies duplicate content by its cryptographically secure hash signature (i.e., collision-resistant fingerprint), which is shown to be much ...
more computationally efficient than the traditional compression approaches in large-scale storage systems. ...
Zadok for valuable discussions about deduplicated storage literature. ...
doi:10.1109/jproc.2016.2571298
fatcat:krfdbgm5pjemnmaswml7k4uv4e
Peer-to-Peer-Based Social Networks: A Comprehensive Survey
2020
SN Computer Science
Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage ...
These platforms offer services that support interactions via messaging, chatting or audio/video conferencing, and also sharing of content. ...
Caching is usually performed near the file owners or the file requestors or along a query path from a requestor to an owner [129] . ...
doi:10.1007/s42979-020-00315-8
fatcat:iwktgohkjbdalmalaj5h3lulri
Peer-to-Peer based Social Networks: A Comprehensive Survey
[article]
2020
arXiv
pre-print
Secondly, it elaborates on the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure ...
Caching is usually performed near the file owners or the file requestors or along a query path from a requestor to an owner [131] . ...
File granularity techniques include full file replication, block level replication and erasure code replication [138] , [139] . ...
arXiv:2001.02611v2
fatcat:nrvp45dy3rbnhmajtvqiect3ty
Building Digital Libraries: An Overview
ENGLISH
2001
DESIDOC Bulletin of Information Technology
ENGLISH
The article describes optical character recognition (OCR) and advocates for hybrid solution for preservation of digital information. ...
With the technology available at an effordable cost, the libraries are initiating small digitisation projects as an individual library or as a group of libraries. ...
jukeboxes and tape library systems. ...
doi:10.14429/dbit.21.6.3547
fatcat:ejfql6tlyvg6fgzol2ra34iiku
Finding a Winning Strategy Against the MP3 Invasion: Supplemental Measures the Recording Industry Must Take to Curb Online Piracy
2000
UCLA Entertainment Law Review
As mentioned in section III, the DMCA groups the activity of ISPs into four categories: (1) transmission and routing, (2) system caching, (3) system storage, and (4) information location. 72 The court ...
Finally, the files are neither cached nor modified as they travel from one subscriber to another. Thus, at least one of the DMCA's 69
2000] tests seems to release Napster from liability. ...
doi:10.5070/lr881027011
fatcat:d3xwlxm6ujgv5gos2aasmxgi6u
Storage and Enterprise Archiving
[chapter]
PACS
Advances in molecular imaging, multispectral imaging, and physiologic imaging suggest that the rate of growth in storage requirements will only accelerate in the future. ...
Sitting between an application and the low-level block access storage system lies the file system, as shown in Figure 16 File system. card catalog of a storage system and knows where files are stored ...
The file system remains on the computer, but low-level block-level access is routed through an external network of storage devices. ...
doi:10.1007/0-387-31070-3_16
fatcat:bdapa2gk5bakbetw5zf35ptbfq
Impromptu
2004
Proceedings of the 2nd international conference on Mobile systems, applications, and services - MobiSYS '04
Since mobile processing is still significantly more expensive than server based, and speech services can be shared by multiple clients, providing these services in networked servers is a cost effective ...
Existing "hybrid" products basically glue a mobile phone onto a PDA. ...
doi:10.1145/990064.990074
dblp:conf/mobisys/SchmandtLKA04
fatcat:oqbubd4tszdqhmiqdfcidpjyxu
Video Communication Networks
[chapter]
2009
The Essential Guide to Video Processing
Efficient storage and communication requires video data to be represented in compressed form. Numerous video compression standards have been developed by industrial organizations. ...
The basic techniques used for video communication are illustrated over a variety of communication networks: Hybrid Fiber-Coax, Digital Subscriber Loop, Wireless, ATM, and Internet Protocol networks. ...
Thus, it is reserved only for those applications that require the fastest service at all cost. A RAM cache is used to store the most popular movies. ...
doi:10.1016/b978-0-12-374456-2.00019-0
fatcat:cubhwpxid5fs5lzat5632dl76u
Video Communication Networks
[chapter]
2005
Handbook of Image and Video Processing
Efficient storage and communication requires video data to be represented in compressed form. Numerous video compression standards have been developed by industrial organizations. ...
The basic techniques used for video communication are illustrated over a variety of communication networks: Hybrid Fiber-Coax, Digital Subscriber Loop, Wireless, ATM, and Internet Protocol networks. ...
Thus, it is reserved only for those applications that require the fastest service at all cost. A RAM cache is used to store the most popular movies. ...
doi:10.1016/b978-012119792-6/50123-6
fatcat:mikq5fxikzb2lapuhnuogybs6e
A Middleware-Based Application Framework for Active Space Applications
[chapter]
2003
Lecture Notes in Computer Science
File servers may be located locally or remotely to export storage to the local space. ...
It also listens for changes in the file system (new files added or removed) and automatically updates its cache and sends a notification to the listeners. ...
doi:10.1007/3-540-44892-6_22
fatcat:puihavm5hnekrbbu7pclsj26xu
Toward timely, predictable and cost-effective data analytics
2016
expose storage via the Swift interface [192] . ...
Once a disk block of the raw file has been processed during a scan, PostgresRaw caches the needed binary data immediately. ...
Similarly, adaptive data caches as the one exploited in Chapter 7 could adjust their layout to the workload as well, since the decision among row-oriented, columnoriented or hybrid caches could further ...
doi:10.5075/epfl-thesis-7140
fatcat:l6a3aotacngw3ocwrdczywwnde
Full Issue PDF
2014
SMPTE Motion Imaging Journal
Three strategies for laser illumination are now being pursued either in the marketplace or in R@D laboratories
® Cost-effective replacement of xenon projectors based on total
cost of ownership, ® High-luminance ...
However, deployment of UHDT\ has been slow due to high production and storage costs, lack of a terrestrial transmission standard, uncertainty of spectrum avail ability after the FCC UHF spectrum auction ...
doi:10.5594/j18459
fatcat:yyo344zs6fad3olb56kowws7ke
« Previous
Showing results 1 — 15 out of 26 results