A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Exploiting type-awareness in a self-recovering disk
2007
Proceedings of the 2007 ACM workshop on Storage security and survivability - StorageSS '07
We have designed and implemented a prototype disk system that automatically ensures the integrity of stored data, and transparently recovers vital data in the event of integrity violations. ...
We also show how semantics-aware replication of blocks can help improve the recoverability of data in the event of partial disk errors with small space overheads. ...
We have extended Type-Safe Disks to be more robust to disk errors. We call our modified disk system Self-Recovering Disks (SRDs). ...
doi:10.1145/1314313.1314321
dblp:conf/storagess/VijayasankarSSZ07
fatcat:xmxc4nzeszchrlsnckas47utim
Protection Preserving Public Supportable System In Cluster Based Distributed Storage
2016
International Journal Of Engineering And Computer Science
The ABCT will recover the issue of time delayness and makes the system more efficient. We randomize the encode coefficients with a pseudorandom capacity to protect information security. ...
In this project an open examining plan for the recovering code based distributed storage is proposed and also Attribute Based Clustering Technique (ABCT) For Distributed Data. ...
exploiting application awareness. ...
doi:10.18535/ijecs/v5i6.17
fatcat:yemmjpewejh63fibp3r5mjqfzu
The Impact of Hard Disk Firmware Steganography on Computer Forensics
2009
Journal of Digital Forensics, Security and Law
The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. ...
In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially ...
However the authors are aware of two major commercial products available for this type of analysis and modification/repair of hard disk drives. ...
doi:10.15394/jdfsl.2009.1059
fatcat:lvm4wcamgzfw7ixonvpsddvc5e
Remembrance of data passed: a study of disk sanitization practices
2003
IEEE Security and Privacy
Professors Hal Abelson and Charles Leiserson have also been a source of encouragement and moral support. ...
Another drive (#21) contained 3,722 credit card numbers (some of them repeated) in a different type of log format. ...
Level 3 Retained data blocks Data that can be recovered from a disk, but which does not obviously belong to a named file. ...
doi:10.1109/msecp.2003.1176992
fatcat:pywpqoexbnccxf6ltonih6nfzm
Self-awareness of Cloud Applications
[chapter]
2017
Self-Aware Computing Systems
A much shorter, revised version of this material will be available in print, as part of a Springer book on "Self-Aware Computing". The book is due to appear in 2017. ...
Last, we propose a roadmap for addressing open challenges in self-aware cloud and datacenter applications. ...
by the Dutch STW/NWO Veni personal grant @large(#11881) and Vidi personal grant MagnaData, by the Dutch national program COM-MIT and COMMissioner sub-project, by the Dutch KIEM project KIESA, and by a ...
doi:10.1007/978-3-319-47474-8_20
fatcat:ckcxfmjmvvas5bhg7wp5qfmehy
ORAID: An Intelligent and Fault-Tolerant Object Storage Device
[chapter]
2005
Lecture Notes in Computer Science
In ORAID, storage object is stored in form of original block fragments and their XOR verification fragments are among the disks of the device. ...
ORAID consolidates disk space of individual disk into a single storage spool and implements object-sharing and fault-tolerance through the object-interface. ...
If we use a uniform style to contain attributes for any type of object, more disk space may be wasted while saving objects with their attributes in disks. ...
doi:10.1007/11596042_42
fatcat:euu42kvjvbar3bxp6fk42dfjfy
A self-supervised, physics-aware, Bayesian neural network architecture for modelling galaxy emission-line kinematics
[article]
2021
arXiv
pre-print
In order to assist in the timely exploitation of these vast datasets we explore the use of a self-supervised, physics aware neural network capable of Bayesian kinematic modelling of galaxies. ...
This work shows the promising use of machine learning, and in particular self-supervised neural networks, in the context of kinematically modelling galaxies. ...
ALMA is a partnership of the ESO (representing its member states), NSF (USA), and NINS (Japan), together with the NRC (Canada), NSC, ASIAA (Taiwan), and KASI (Republic of Korea), in cooperation with the ...
arXiv:2102.05520v1
fatcat:5kax3nqm3bcnzit4lh67cwgh6e
A Survey on Mobile Networks for Disaster Management
2018
International Journal for Research in Applied Science and Engineering Technology
Such a class of smart phones with this facility can ascend and pass out messages in case of exigency with the region and spot details so that it is helpful the rescue operation. ...
The self-rescue system sorts, plans and position the survivors. ...
The teamphone comprising of messaging and self-rescue system aids rescue operation with different type of message transmission by bonding the three types of network. ...
doi:10.22214/ijraset.2018.2126
fatcat:7wnhy4hgrrd7feekeujo2dljyy
Secondary spectrum access networks
2009
IEEE Vehicular Technology Magazine
As illustrated in Figure 1 , an exclusive region is defi ned as a circular disk centered at a primary receiver with a radius L. ...
A well-known example of the spatial white spaces is in TV bands where multiple TV channels are interleaved to avoid self-interference so that a single channel is only used sparsely in disjoint regions. ...
doi:10.1109/mvt.2009.932543
fatcat:i5r5hkt2t5adbhzloihduqvpxa
An operating system independent WORM archival system
1995
Software, Practice & Experience
The archival system is independent of the operating system, flat, self-consistent, does not use any write cache on magnetic disk, and allows the exploitation of auxiliary information on magnetic disk, ...
A library in C language, called pODLIB, has been implemented as a portable interface to the archival system. ...
fully exploited in their potential application areas. ...
doi:10.1002/spe.4380250504
fatcat:oi5w3eykqvd6bbmltzzbjnvsvq
Best Practices on Standards, Policies and Quality Assurance in Digital Repositories for Long Term Preservation
2012
Zenodo
These have played a key role in the understanding of the subsequent risks and the definition of standards in this domain. ...
During the past twenty years, the long-term preservation of digital information has only been a matter under consideration for a few scientific or patrimonial institutions. ...
A syntactic description is used to know how the data are organised in the file (primitive types, size, position in a table, etc., are some examples). ...
doi:10.5281/zenodo.6302916
fatcat:4acvglwwfrblfmt4hbxcazgmrq
Forensic Analysis of BIOS Chips
[chapter]
2006
IFIP Advances in Information and Communication Technology
Data can be hidden in BIOS chips without hindering computer performance. This feature has been exploited by virus writers and computer game enthusiasts. ...
It demonstrates how data may be concealed within BIOS free space and modules in a manner that makes it accessible using operating system commands. ...
A BIOS Savior device can be used to recover from a data hiding attempt that results in a corrupted BIOS. ...
doi:10.1007/0-387-36891-4_24
fatcat:ntebokfbc5glpcp346qbyalwlq
Software that Learns from its Own Failures
[article]
2015
arXiv
pre-print
Instead, I propose a new paradigm in which software systems learn from their own failures. By using an advanced monitoring system they have a constant awareness of their own state and health. ...
Their recovery capabilities are assessed by self-injection of controlled failures; this process produces knowledge in prevision of future unanticipated failures. ...
Conclusion In this paper, I have sketched vision of software that learns to self-improve from its own failures. ...
arXiv:1502.00821v1
fatcat:afflzserk5fgflqcpziqktoeqe
caching policies to each type. ...
The data placement decisions in DHIS are made in an online fashion, during data creation. ...
In the rest of this section, we detail the basic design aspects of operating such a hierarchical storage system in a type-aware storage setup as described in Section 2.2. ...
doi:10.1145/1534530.1534543
dblp:conf/systor/YalamanchiliVZS09
fatcat:tgzvgrpdu5fmjlylmf4nuqsbaa
Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware
2013
2013 IEEE 7th International Conference on Software Security and Reliability
The uncertain factors play the major role in the VM-awareness detection. To reduce uncertain factors causing false positives, a method is proposed for VM-aware detection. ...
Virtualized execution has become an effective mechanism to analyze malware in a dynamic way. ...
Table 1 . 1 The known VM-aware samples Categories
VM-aware Samples
Addresses
of
branches
in a VM
check
Target
Hardware fin-
gerprint
check
QEMU hard disk
check
0x42e8e4
0x42dbd4
QEMU ...
doi:10.1109/sere.2013.23
dblp:conf/ssiri/HsuFCS13
fatcat:wjuk4wr73facbch7scwsbqjija
« Previous
Showing results 1 — 15 out of 6,975 results