A management architecture for client‐defined cloud storage services
暂无分享,去创建一个
[1] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[2] James S. Plank,et al. AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.
[3] Michalis Faloutsos,et al. Transport layer identification of P2P traffic , 2004, IMC '04.
[4] James Won-Ki Hong,et al. An effective similarity metric for application traffic classification , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[5] Jason Lango,et al. Toward Software-defined SLAs , 2013 .
[6] Adrian Farrel,et al. A PCE-Based Architecture for Application-Based Network Operations , 2015, RFC.
[7] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[8] Erik Brynjolfsson,et al. Information technology, incentives and the optimal number of suppliers , 1993, Proceedings of ELECTRO '94.
[9] Anirban Mahanti,et al. Traffic classification using clustering algorithms , 2006, MineNet '06.
[10] Michael K. Reiter,et al. Secure and scalable replication in Phalanx , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[11] Hans Peter Luhn,et al. A Statistical Approach to Mechanized Encoding and Searching of Literary Information , 1957, IBM J. Res. Dev..
[12] Michael Dahlin,et al. Minimal Byzantine Storage , 2002, DISC.
[13] Jérôme Darmont,et al. Sharing-based Privacy and Availability of Cloud Data Warehouses , 2013, EDA.
[14] James Won-Ki Hong,et al. Automated classifier generation for application-level mobile traffic identification , 2012, 2012 IEEE Network Operations and Management Symposium.
[15] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[16] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[17] James Won-Ki Hong,et al. Traffic Classification Based on Flow Similarity , 2009, IPOM.
[18] Jian Li,et al. On the design and implementation of a home energy management system , 2011, International Symposium on Wireless and Pervasive Computing.
[19] Catherine D. Schuman,et al. A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries for Storage , 2009, FAST.
[20] Jin Li,et al. ChunkStash: Speeding Up Inline Storage Deduplication Using Flash Memory , 2010, USENIX Annual Technical Conference.
[21] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[22] James Won-Ki Hong,et al. Application traffic identification based on remote subnet grouping , 2012, 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS).
[23] Miguel Correia,et al. SCFS: A Shared Cloud-backed File System , 2014, USENIX Annual Technical Conference.
[24] Luis Velasco,et al. In-operation network planning , 2014, IEEE Commun. Mag..
[25] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[26] Konstantina Papagiannaki,et al. Toward the Accurate Identification of Network Applications , 2005, PAM.
[27] James Won-Ki Hong,et al. CYRUS: towards client-defined cloud storage , 2015, EuroSys.
[28] James Won-Ki Hong,et al. Fine‐grained traffic classification based on functional separation , 2013, Int. J. Netw. Manag..
[29] Anwitaman Datta,et al. InterCloud RAIDer: A Do-It-Yourself Multi-cloud Private Data Backup System , 2014, ICDCN.
[30] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[31] Werner Vogels,et al. Dynamo: amazon's highly available key-value store , 2007, SOSP.
[32] Michael K. Reiter,et al. Efficient Byzantine-tolerant erasure-coded storage , 2004, International Conference on Dependable Systems and Networks, 2004.
[33] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[34] Stefano Tessaro,et al. Optimal Resilience for Erasure-Coded Byzantine Distributed Storage , 2005, DISC.
[35] Karl Aberer,et al. Scalia: An adaptive scheme for efficient multi-cloud storage , 2012, 2012 International Conference for High Performance Computing, Networking, Storage and Analysis.
[36] Sean Matthew Dorward,et al. Awarded Best Paper! - Venti: A New Approach to Archival Data Storage , 2002 .
[37] James Won-Ki Hong,et al. Measurement analysis of mobile traffic in enterprise networks , 2011, APNOMS 2011.
[38] Aiko Pras,et al. Inside dropbox: understanding personal cloud storage services , 2012, Internet Measurement Conference.
[39] Guilherme Sperb Machado,et al. A Cloud Storage overlay to aggregate heterogeneous Cloud services , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[40] 이상훈,et al. 트위터 트랜딩 토픽을 이용한 HBase 기반 자동 요약 시스템 , 2014 .
[41] Reinaldo Penno,et al. Application-Layer Traffic Optimization (ALTO) Protocol , 2014, RFC.
[42] Carlos Maltzahn,et al. Ceph: a scalable, high-performance distributed file system , 2006, OSDI '06.
[43] KyoungSoo Park,et al. Supporting Practical Content-Addressable Caching with CZIP Compression , 2007, USENIX Annual Technical Conference.
[44] JoAnne Yates,et al. Electronic markets and electronic hierarchies , 1987, CACM.
[45] Adi Shamir,et al. How to share a secret , 1979, CACM.
[46] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[47] Taesang Choi,et al. Content-aware Internet application traffic measurement and analysis , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[48] James Won-Ki Hong,et al. The Design of a Quality of Experience Model for Providing High Quality Multimedia Services , 2010, MACE.
[49] Sakir Sezer,et al. Queen ' s University Belfast-Research Portal Are We Ready for SDN ? Implementation Challenges for Software-Defined Networks , 2016 .
[50] James Won-Ki Hong,et al. Monitoring and detecting abnormal behavior in mobile cloud infrastructure , 2012, 2012 IEEE Network Operations and Management Symposium.
[51] Hakim Weatherspoon,et al. RACS: a case for cloud storage diversity , 2010, SoCC '10.
[52] Fulvio Risso,et al. Lightweight, Payload-Based Traffic Classification: An Experimental Evaluation , 2008, 2008 IEEE International Conference on Communications.
[53] James Won-Ki Hong,et al. Towards automated application signature generation for traffic identification , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.