Results 31 to 40 of about 444,586 (306)
Distributed Caching in Networked File Systems [PDF]
JUCS - Journal of Universal Computer Science Volume Nr.
Klauser,Artur, Posch,Reinhard
openaire +3 more sources
Blockchain-Based Decentralized Architecture for Software Version Control
Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. Following the success of bitcoin,
Muhammad Hammad +8 more
doaj +1 more source
Large-scale high performance computing (HPC) systems typically consist of many thousands of CPUs and storage units used by hundreds to thousands of users simultaneously.
Sunggon Kim +4 more
doaj +1 more source
The streamflow data acquisition with various techniques and dispersing of River’s locations demand improvement of reliability and frequency aspects. One of the reliability measurement characteristics is data ownership.
Muhammad Hussain Mughal +4 more
doaj +1 more source
Hybrid Encryption Algorithm for Big Data Security in the Hadoop Distributed File System
A large amount of structured and unstructured data is collectively termed big data. The recent technological development streamlined several companies to handle massive data and interpret future trends and requirements.
T. Mohanraj, R. Santhosh
doaj +1 more source
Distributed File Systems [PDF]
This chapter contains sections titled: Introduction Desirable Features of a Good Distributed File System File Models File-Accessing Models File-Sharing Semantics File-Caching Schemes File Replication Fault Tolerance Atomic Transactions Design Principles Case Study: DCE Distributed File ...
openaire +1 more source
Strong security for distributed file systems
We have developed a scheme to secure network-attached storage systems against many types of attacks. Our system uses strong cryptography to hide data from unauthorized users; someone gaining complete access to a disk cannot obtain any useful data from the system, and backups can be done without allowing the super-user access to unencrypted data.
Miller, Ethan +3 more
openaire +3 more sources
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware +13 more
wiley +1 more source
This paper investigates the problem of distributed storage of electronic documents (both metadata and files) in decentralized blockchain-based b2b systems (DApps).
Obadah Hammoud +2 more
doaj +1 more source
ABSTRACT Neuroblastoma is the most common extracranial solid tumor in early childhood. Its clinical behavior is highly variable, ranging from spontaneous regression to fatal outcome despite intensive treatment. The International Society of Pediatric Oncology Europe Neuroblastoma Group (SIOPEN) Radiology and Nuclear Medicine Specialty Committees ...
Annemieke Littooij +11 more
wiley +1 more source

