Search results

    Architectures for Controller Based CDP FAST '07Guy Laden, Paula Ta-Shma
    Jumbo Store: Providing Efficient Incremental Upload and Versioning for a Utility Rendering ServiceFAST '07Kave Eshghi, Mark Lillibridge, Lawrence Wilcock, Guillaume Belrose, Rycharde Hawkes
    Data ONTAP GX: A Scalable Storage Cluster FAST '07Michael Eisler, Peter Corbett, Michael Kazar, Daniel S. Nydick, J. Christopher Wagner
    //TRACE: Parallel Trace Replay with Approximate Causal Events FAST '07Michael P. Mesnier
    Karma: Know-it-All Replacement for a Multilevel CacheFAST '07Gala Yadgar, Michael Factor, Assaf Schuster
    AMP: Adaptive Multi-stream Prefetching in a Shared CacheFAST '07Binny S. Gill, Luis Angel D. Bathen
    Nache: Design and Implementation of a Caching Proxy for NFSv4 FAST '07Ajay Gulati, Manoj Naik, Renu Tewari
    TFS: A Transparent File System for Contributory StorageFAST '07James Cipar, Mark D. Corner, Emery D. Berger
    Cobalt: Separating Content Distribution from Authorization in Distributed File Systems FAST '07Kaushik Veeraraghavan, Andrew Myrick, Jason Flinn
    PARAID: A Gear-Shifting Power-Aware RAID FAST '07Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter Reiher, Geoff Kuenning
    REO: A Generic RAID Engine and OptimizerFAST '07Deepak Kenchammana-Hosekote, Dingshan He
    PRO: A Popularity-based Multi-threaded Reconstruction Optimization for RAID-Structured Storage SystemsFAST '07Lei Tian, Dan Feng, Hong Jiang, Ke Zhou, Lingfang Zeng, Jianxi Chen, Zhikun Wang, Zhenlei Song
    Privilege Messaging: An Authorization Framework over Email Infrastructure LISA '06Brent ByungHoon Kang, Gautam Singaraju, Sumeet Jain
    Securing Electronic Mail on the National Research and Academic Network of Italy LISA '06Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano
    A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack LISA '06Daniel V. Klein
    Teaching Problem Solving: You Can and You ShouldLISA '06Elizabeth Zwicky
    Sysadmins, Network Managers, and Wiretap LawLISA '06Alex Muentz
    Firewall Analysis with Policy-Based Host Classification LISA '06Robert Marmorstein, Phil Kearns
    Secure Mobile Code Execution Service LISA '06Lap-chung Lam, Yang Yu, Tzi-cker Chiueh
    FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs LISA '06Adam Slagell, Kiran Lakkaraju, Katherine Luo
    Site Reliability at Google/My First Year at GoogleLISA '06Tom Limoncelli
    Leveraging the IT CommunityLISA '06Patrick McGovern
    Centralized Security Policy Support for Virtual MachineLISA '06Nguyen Anh Quynh, Ruo Ando, Yoshiyasu Takefuji
    A Platform for RFID Security and Privacy Administration LISA '06Melanie R. Rieback, Georgi N. Gaydadjiev, Bruno Crispo, Rutger F.H. Hofman, Andrew S. Tannenbaum
    Virtualization: The Good, the Bad, the UglyLISA '06Michael Baum