Search Results - "24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)"

Refine Results
  1. 1

    Modeling the Impact of Checkpoints on Next-Generation Systems by Oldfield, R.A., Arunagiri, S., Teller, P.J., Seelam, S., Varela, M.R., Riesen, R., Roth, P.C.

    “…The next generation of capability-class, massively parallel processing (MPP) systems is expected to have hundreds of thousands of processors. For…”
    Get full text
    Conference Proceeding
  2. 2

    RAIF: Redundant Array of Independent Filesystems by Joukov, N., Krishnakumar, A.M., Patti, C., Rai, A., Satnur, S., Traeger, A., Zadok, E.

    “…Storage virtualization and data management are well known problems for individual users as well as large organizations. Existing storage-virtualization systems…”
    Get full text
    Conference Proceeding
  3. 3

    CASTOR: A Distributed Storage Resource Facility for High Performance Data Processing at CERN by Lo Presti, Giuseppe, Barring, Olof, Earl, Alasdair, Rioja, Rosa Maria Garcia, Ponce, Sebastien, Taurelli, Giulia, Waldron, Dennis, Santos, Miguel Coelho Dos

    “…Mass storage systems at CERN have evolved over time to meet growing requirements, in terms of both scalability and fault resiliency. The CERN advanced storage…”
    Get full text
    Conference Proceeding
  4. 4

    Efficient Logging and Replication Techniques for Comprehensive Data Protection by Maohua Lu, Shibiao Lin, Tzi-cker Chiueh

    “…Mariner is an iSCSI-based storage system that is designed to provide comprehensive data protection on commodity ATA disk and gigabit Ethernet technologies…”
    Get full text
    Conference Proceeding
  5. 5

    Providing Quality of Service Support in Object-Based File System by Wu, J.C., Brandt, S.A.

    “…Bourbon is a quality of service framework designed to work with the Ceph object-based storage system. Ceph is a highly scalable distributed file system that…”
    Get full text
    Conference Proceeding
  6. 6

    Cryptographic Security for a High-Performance Distributed File System by Pletka, R., Cachin, C.

    “…Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity…”
    Get full text
    Conference Proceeding
  7. 7
  8. 8

    Preservation DataStores: Architecture for Preservation Aware Storage by Factor, M., Naor, D., Rabinovici-Cohen, S., Ramati, L., Reshef, P., Satran, J., Giaretta, D.L.

    “…The volumes of digital information are growing continuously and most of today's information is "born digital". Alongside this trend, business, scientific,…”
    Get full text
    Conference Proceeding
  9. 9

    Implementing and Evaluating Security Controls for an Object-Based Storage System by Niu, Zhongying, Zhou, Ke, Feng, Dan, Jiang, Hong, Wang, Frank, Chai, Hua, Xiao, Wei, Li, Chunhua

    “…This paper presents the implementation and performance evaluation of a real, secure object-based storage system compliant to the T10 OSD standard. In contrast…”
    Get full text
    Conference Proceeding
  10. 10

    Attribute Storage Design for Object-based Storage Devices by Devulapalli, A., Dalessandro, D., Wyckoff, P., Ali, N.

    “…As storage systems grow larger and more complex, the traditional block-based design of current disks can no longer satisfy workloads that are increasingly…”
    Get full text
    Conference Proceeding
  11. 11

    Implementation and Evaluation of a Popularity-Based Reconstruction Optimization Algorithm in Availability-Oriented Disk Arrays by Tian, Lei, Jiang, Hong, Feng, Dan, Xin, Qin, Shu, Xing

    “…In this paper, we implement the incorporation of a popularity-based multi-threaded reconstruction optimization algorithm, PRO, into the recovery mechanism of…”
    Get full text
    Conference Proceeding
  12. 12

    Capability based Secure Access Control to Networked Storage Devices by Factor, M., Naor, D., Rom, E., Satran, J.

    “…Today, access control security for storage area networks (zoning and masking) is implemented by mechanisms that are inherently insecure, and are tied to the…”
    Get full text
    Conference Proceeding
  13. 13

    Performance Evaluation of Multiple TCP connections in iSCSI by Kancherla, B.K., Narayan, G.M., Gopinath, K.

    “…Storage area networks (SANs) based on fibre channel have been used extensively in the last decade while iSCSI is fast becoming a serious contender due to its…”
    Get full text
    Conference Proceeding
  14. 14

    Grid-Enabled Standards-based Data Management by Abadie, L., Badino, P., Baud, J.-P., Casey, J., Frohner, A., Grosdidier, G., Lemaitre, S., Mccance, G., Mollon, R., Nienartowicz, K., Smith, D., Tedesco, P.

    “…The world's largest scientific machine - the large hadron collider (LHC), situated outside Geneva, Switzerland - will generate some 15PB of data at rates up to…”
    Get full text
    Conference Proceeding
  15. 15

    Flushing Policies for NVCache Enabled Hard Disks by Bisson, T., Brandt, S.A.

    “…One of the goals of upcoming hybrid hard disks is to reduce power consumption by adding a small amount of non-volatile flash memory (NVCache) to the drive…”
    Get full text
    Conference Proceeding
  16. 16

    Quota enforcement for high-performance distributed storage systems by Pollack, K.T., Long, D.D.E., Golding, R.A., Becker-Szendy, R.A., Reed, B.

    “…Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is…”
    Get full text
    Conference Proceeding
  17. 17

    The RAM Enhanced Disk Cache Project (REDCAP) by Gonzalez-Ferez, Pilar, Piernas, Juan, Cortes, Toni

    “…This paper presents the RAM enhanced disk cache project, REDCAP, a new cache of disk blocks which reduces the read I/O time by using a small portion of the…”
    Get full text
    Conference Proceeding
  18. 18

    GreenStor: Application-Aided Energy-Efficient Storage by Mandagere, N., Diehl, J., Du, D.

    “…The volume of online data content has shown an unprecedented growth in recent years. Fueling this growth are new federal regulations which warrant longer data…”
    Get full text
    Conference Proceeding
  19. 19

    Tornado Codes for MAID Archival Storage by Woitaszek, M., Tufo, H.M.

    “…This paper examines the application of Tornado codes, a class of low density parity check (LDPC) erasure codes, to archival storage systems based on massive…”
    Get full text
    Conference Proceeding
  20. 20

    Message from the Chairs

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding