Design and Implementation of Deduplication Storage Server Using Stride Scheme
暂无分享,去创建一个
Young Woong Ko | Jin Kim | Ho Min Jung | Jin Haeng Cho | Jin Kim | Y. Ko | H. Jung | J. H. Cho
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Brian D. Noble,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .
[3] Sean Quinlan,et al. Venti: A New Approach to Archival Storage , 2002, FAST.
[4] Fred Douglis,et al. USENIX Association Proceedings of the General Track : 2003 USENIX Annual , 2003 .
[5] David Mazières,et al. A low-bandwidth network file system , 2001, SOSP.
[6] Suresh Jagannathan,et al. Improving duplicate elimination in storage systems , 2006, TOS.
[7] Cynthia E. Irvine,et al. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.
[8] Fred Douglis,et al. Redundancy Elimination Within Large Collections of Files , 2004, USENIX Annual Technical Conference, General Track.
[9] Sean Matthew Dorward,et al. Awarded Best Paper! - Venti: A New Approach to Archival Data Storage , 2002 .
[10] Andrew Tridgell,et al. Efficient Algorithms for Sorting and Synchronization , 1999 .
[11] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.