We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A disk I/O optimized system for concurrent graph processing jobs

    In order to analyze and process the large graphs with high cost efficiency, researchers have developed a number of out-of-core graph processing...

    **anghao Xu, Fang Wang, ... Peng Fang in Frontiers of Computer Science
    Article 22 January 2024
  2. Disk Configuration

    When running any operating system over a long time, one functional thing generally tends to happen. Storage space runs out. In this chapter, we will...
    Kenneth Hitchcock in The Enterprise Linux Administrator
    Chapter 2023
  3. Disk, File and Database Encryption

    Disk, file, and database encryption are technologies that protect data confidentiality when stored. Full disk encryption encrypts all data on a disk...
    Chapter Open access 2023
  4. Efficient usage of web forensics, disk forensics and email forensics in successful investigation of cyber crime

    This paper is a fusion of a survey of different existing research related to web forensics, disk forensics, and email forensics and the...

    Bishwajeet Pandey, Pushpanjali Pandey, ... Leila Rzayeva in International Journal of Information Technology
    Article 23 June 2024
  5. Porting disk-based spatial index structures to flash-based solid state drives

    Indexing data on flash-based Solid State Drives (SSDs) is an important paradigm recently applied in spatial data management. During last years, the...

    Anderson Chaves Carniel, George Roumelis, ... Cristina D. Aguiar in GeoInformatica
    Article 13 December 2021
  6. Spring Data Access with JdbcTemplate

    It’s time we started looking at how we actually access data. Spring has multiple ways of accessing data; here, we’re going to look at JdbcTemplate, a...
    Joseph B. Ottinger, Andrew Lombardi in Beginning Spring 6
    Chapter 2024
  7. Disk I/O Overload in Kafka: Diagnosing and Overcoming Challenges

    Disk I/O overload can create significant challenges in Kafka clusters, affecting both consumers and producers. Consumers may accumulate a backlog...
    Chapter 2023
  8. Computer Access (1980–)

    With the advent of the personal computer, the Trace Center’s primary focus shifted from communication to computer access.
    Gregg Vanderheiden, Jonathan Lazar, ... J. Bern Jordan in Technology and Disability
    Chapter 2023
  9. Algorithms and Turing Kernels for Detecting and Counting Small Patterns in Unit Disk Graphs

    In this paper we investigate the parameterized complexity of the task of counting and detecting occurrences of small patterns in unit disk graphs:...
    Jesper Nederlof, Krisztina Szilágyi in SOFSEM 2024: Theory and Practice of Computer Science
    Conference paper 2024
  10. DRPS: efficient disk-resident parameter servers for distributed machine learning

    Parameter server (PS) as the state-of-the-art distributed framework for large-scale iterative machine learning tasks has been extensively studied....

    Zhen Song, Yu Gu, ... Ge Yu in Frontiers of Computer Science
    Article 03 December 2021
  11. Informed Memory Access Monitoring

    Memory monitoring is of critical use in understanding applications and evaluating systems. Due to the dynamic nature in programs’ memory accesses,...
    Jidong Zhai, Yuyang **, ... Weimin Zheng in Performance Analysis of Parallel Applications for HPC
    Chapter 2023
  12. Disk IO

    In the preceding chapters, we've done everything we possibly could to avoid disk IO. By optimizing our database design and tuning queries, we...
    Guy Harrison, Michael Harrison in MongoDB Performance Tuning
    Chapter 2021
  13. IMRSim: A Disk Simulator for Interlaced Magnetic Recording Technology

    The emerging interlaced magnetic recording (IMR) technology achieves a higher areal density for hard disk drive (HDD) over the conventional magnetic...
    Zhimin Zeng, **nyu Chen, ... **hua Cui in Network and Parallel Computing
    Conference paper 2022
  14. Blind Auditing and Probabilistic Access Controls

    Kee** audit logs about past activities in any computer system is one of the requirements regulated decades ago. However, there is no clear...
    Arastoo Bozorgi, Jonathan Anderson in Security Protocols XXVIII
    Conference paper 2023
  15. Research on Data Fault-Tolerance Method Based on Disk Bad Track Isolation

    Disk is not only an important carrier to save data, but also a key component of storage system. It is of great significance to improve the...
    Xu Zhang, Li Zheng, Sujuan Zhang in Smart Computing and Communication
    Conference paper 2022
  16. StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control

    Access control is a fundamental component of any data management system, ensuring the prevention of unauthorized data access. Within the realm of...

    Shahab Safaee, Meghdad Mirabi, Ali Asghar Safaei in Cluster Computing
    Article 18 April 2024
  17. Small files access efficiency in hadoop distributed file system a case study performed on British library text files

    In today’s world storing a large amount of data, large datasets, handling data in various forms is a challenging task. Data is getting produced...

    Neeta Alange, P. Vidya Sagar in Cluster Computing
    Article 07 April 2023
  18. Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks

    With the rapid convergence of the Internet of Things (IoT) and command and control communication networks, there is a swift surge in...

    YiZhuo Yang, Hong** Zeng, ... Meng Lv in Cluster Computing
    Article 29 June 2023
  19. Encryption with access policy and cloud data selection for secure and energy-efficient cloud computing

    With the rapid advancements in technology, cloud computing has emerged as a prominent paradigm for efficient data storage and processing. However,...

    M. Indrasena Reddy, P. Venkateswara Rao, ... Srinivasa Reddy K in Multimedia Tools and Applications
    Article 18 July 2023
  20. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment

    The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized...

    Akhil Chaurasia, Alok Kumar, Udai Pratap Rao in Cluster Computing
    Article 06 July 2024
Did you find what you were looking for? Share feedback.