Search
Search Results
-
A disk I/O optimized system for concurrent graph processing jobs
In order to analyze and process the large graphs with high cost efficiency, researchers have developed a number of out-of-core graph processing...
-
Disk Configuration
When running any operating system over a long time, one functional thing generally tends to happen. Storage space runs out. In this chapter, we will... -
Disk, File and Database Encryption
Disk, file, and database encryption are technologies that protect data confidentiality when stored. Full disk encryption encrypts all data on a disk... -
Efficient usage of web forensics, disk forensics and email forensics in successful investigation of cyber crime
This paper is a fusion of a survey of different existing research related to web forensics, disk forensics, and email forensics and the...
-
Porting disk-based spatial index structures to flash-based solid state drives
Indexing data on flash-based Solid State Drives (SSDs) is an important paradigm recently applied in spatial data management. During last years, the...
-
Spring Data Access with JdbcTemplate
It’s time we started looking at how we actually access data. Spring has multiple ways of accessing data; here, we’re going to look at JdbcTemplate, a... -
Disk I/O Overload in Kafka: Diagnosing and Overcoming Challenges
Disk I/O overload can create significant challenges in Kafka clusters, affecting both consumers and producers. Consumers may accumulate a backlog... -
Computer Access (1980–)
With the advent of the personal computer, the Trace Center’s primary focus shifted from communication to computer access. -
Algorithms and Turing Kernels for Detecting and Counting Small Patterns in Unit Disk Graphs
In this paper we investigate the parameterized complexity of the task of counting and detecting occurrences of small patterns in unit disk graphs:... -
DRPS: efficient disk-resident parameter servers for distributed machine learning
Parameter server (PS) as the state-of-the-art distributed framework for large-scale iterative machine learning tasks has been extensively studied....
-
Informed Memory Access Monitoring
Memory monitoring is of critical use in understanding applications and evaluating systems. Due to the dynamic nature in programs’ memory accesses,... -
Disk IO
In the preceding chapters, we've done everything we possibly could to avoid disk IO. By optimizing our database design and tuning queries, we... -
IMRSim: A Disk Simulator for Interlaced Magnetic Recording Technology
The emerging interlaced magnetic recording (IMR) technology achieves a higher areal density for hard disk drive (HDD) over the conventional magnetic... -
Blind Auditing and Probabilistic Access Controls
Kee** audit logs about past activities in any computer system is one of the requirements regulated decades ago. However, there is no clear... -
Research on Data Fault-Tolerance Method Based on Disk Bad Track Isolation
Disk is not only an important carrier to save data, but also a key component of storage system. It is of great significance to improve the... -
StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control
Access control is a fundamental component of any data management system, ensuring the prevention of unauthorized data access. Within the realm of...
-
Small files access efficiency in hadoop distributed file system a case study performed on British library text files
In today’s world storing a large amount of data, large datasets, handling data in various forms is a challenging task. Data is getting produced...
-
Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks
With the rapid convergence of the Internet of Things (IoT) and command and control communication networks, there is a swift surge in...
-
Encryption with access policy and cloud data selection for secure and energy-efficient cloud computing
With the rapid advancements in technology, cloud computing has emerged as a prominent paradigm for efficient data storage and processing. However,...
-
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment
The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized...