Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Ohad Rodeh"'
Autor:
John Penn, Ohad Rodeh, Xiaodong Bai, William J Salerno, Olga Krasheninina, Jeffrey G. Reid, Michael F. Lin
As ever-larger cohorts of human genomes are collected in pursuit of genotype/phenotype associations, sequencing informatics must scale up to yield complete and accurate genotypes from vast raw datasets. Joint variant calling, a data processing step e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a4685ec0d0c2815e703cca4114ccc3cd
Publikováno v:
ACM Transactions on Storage. 11:1-18
Massive block IO systems are the workhorses powering many of today’s largest applications. Databases, health care systems, and virtual machine images are examples for block storage applications. The massive scale of these workloads, and the complex
Publikováno v:
ACM Transactions on Storage. 9:1-32
BTRFS is a Linux filesystem that has been adopted as the default filesystem in some popular versions of Linux. It is based on copy-on-write, allowing for efficient snapshots and clones. It uses B-trees as its main on-disk data structure. The design g
Publikováno v:
IBM Journal of Research and Development. 52:401-411
Object-based storage is the natural evolution of the block storage interface, aimed at efficiently and effectively meeting the performance, reliability, security, and service requirements demanded by current and future applications. The object-based
Autor:
Ohad Rodeh
Publikováno v:
ACM Transactions on Storage. 3:1-27
B-trees are used by many file systems to represent files and directories. They provide guaranteed logarithmic time key-search, insert, and remove. File systems like WAFL and ZFS use shadowing, or copy-on-write, to implement snapshots, crash recovery,
Publikováno v:
International Journal of Information Security. 1:84-99
In this paper we describe an efficient algorithm for the management of group-keys for Group Communication Systems. Our algorithm is based on the notion of key-graphs, previously used for managing keys in large IP-multicast groups. The standard protoc
Publikováno v:
ICDCS
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all honest destinations receive the same message, despite the malicious efforts of fewer than a third of them, including the sender. This has
Publikováno v:
ICDE
Deduplicating in-line data on primary storage is hampered by the disk bottleneck problem, an issue which results from the need to keep an index mapping portions of data to hash values in memory in order to detect duplicate data without paying the per
Publikováno v:
2005 IEEE International Symposium on Mass Storage Systems and Technology.
The concept of object storage was introduced in the early 1990's by the research community. Since then it has greatly matured and is now in its early stages of adoption by the industry. Yet, object storage is still not widely accepted. Viewing object
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540326045
Haifa Verification Conference
Haifa Verification Conference
Developers often describe testing as being tedious and boring. This work challenges this notion; we describe tools and methodologies crafted to test object-based storage devices (OSDs) for correctness and compliance with the T10 OSD standard. A speci
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6aa3b3d0873c95f4d6ad199a81722c87
https://doi.org/10.1007/11678779_12
https://doi.org/10.1007/11678779_12