Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices
暂无分享,去创建一个
Hyotaek Lim | Hui-Shyong Yeo | Hoon-Jae Lee | Xiao-Shen Phang | H. Yeo | Hyotaek Lim | Hoon-Jae Lee | Xiao-Shen Phang
[1] Jameela Al-Jaroodi,et al. A dual-direction technique for fast file downloads with dynamic load balancing in the Cloud , 2013, J. Netw. Comput. Appl..
[2] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[3] Bin Yan,et al. R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems , 2009, ICS '09.
[4] John Kubiatowicz,et al. Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.
[5] Loretta Mastroeni,et al. Cloud storage pricing: a comparison of current practices , 2013, ICPE 2013.
[6] Srdjan Capkun,et al. Home is safer than the cloud!: privacy concerns for consumer cloud storage , 2011, SOUPS.
[7] Poul-Henning Kamp. LinkedIn Password Leak: Salt Their Hide , 2012, ACM Queue.
[8] Yang Tang,et al. NCCloud: applying network coding for the storage repair in a cloud-of-clouds , 2012, FAST.
[9] K. Karuppasamy,et al. Parallel Key Encryption for CBC And Interleaved CBC , 2010 .
[10] Pablo Rodriguez,et al. Dynamic parallel access to replicated content in the internet , 2002, TNET.
[11] T. N. Vijaykumar,et al. Accelerating private-key cryptography via multithreading on symmetric multiprocessors , 2003, 2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS 2003..
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Ronny Seiger,et al. SecCSIE: A Secure Cloud Storage Integrator for Enterprises , 2011, 2011 IEEE 13th Conference on Commerce and Enterprise Computing.
[14] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[15] Remzi Seker,et al. JigDFS: A secure distributed file system , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[16] Ming Zhang,et al. Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof , 2012, EuroSys '12.
[17] Jason Flinn,et al. Proceedings of the 10th USENIX conference on File and Storage Technologies, FAST 2012, San Jose, CA, USA, February 14-17, 2012 , 2012, FAST.
[18] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[19] Avishay Traeger,et al. To Zip or not to Zip: effective resource usage for real-time compression , 2013, FAST.
[20] Christian Hanser,et al. On cloud storage and the cloud of clouds approach , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[21] Yan Han,et al. Cloud Computing: Case Studies and Total Cost of Ownership , 2011 .
[22] Hakim Weatherspoon,et al. RACS: a case for cloud storage diversity , 2010, SoCC '10.
[23] Yongwei Wu,et al. µLibCloud: Providing High Available and Uniform Accessing to Multiple Cloud Storages , 2012, 2012 ACM/IEEE 13th International Conference on Grid Computing.
[24] Catherine D. Schuman,et al. A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries for Storage , 2009, FAST.
[25] James S. Plank,et al. AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.
[26] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[27] Spiro Philopoulos. Experimental Study of Parallel Downloading Schemes for Internet Mirror Sites , 2007 .
[28] Feng Qian,et al. Profiling resource usage for mobile applications: a cross-layer approach , 2011, MobiSys '11.
[29] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[30] Josef Spillner,et al. Creating optimal cloud storage systems , 2013, Future Gener. Comput. Syst..