[1]
Christopher Lum, Jiri Schindler, Gregory R. Ganger, David F. Nagle, and Erik Riedel. Towards higher disk head utilization: Extracting \free" bandwidth from busy disk drives. Symposium on Operating Systems Design and Implementation (San Deigo, CA, 23-25 October 2000). ACM, October (2000).
DOI: 10.21236/ada382318
Google Scholar
[2]
Josh MacDonald. File system support for delta compression. Masters thesis. Department of Electrical Engineering and Computer Science, University of California at Berkeley, (2000).
Google Scholar
[3]
John D. Strunk, Garth R. Goodson, Adam G. Pennington, Craig A.N. Soules, Gregory R. Ganger. Intrusion Detection, Diagnosis, and Recovery with Self-Securing Storage. CMU-CS-02-140. May (2002).
DOI: 10.21236/ada461216
Google Scholar
[4]
Craig A. N. Soules, Garth R. Goodson, John D. Strunk, and Gregory R. Ganger. Metadata efficiency in a comprehensive versioning file system. Technical report CMU–CS–02–145. Carnegie Mellon University, (2002).
DOI: 10.21236/ada461077
Google Scholar
[5]
Butler K. McLanghlin S, McDaniel P. Non-volatile Memory and Disks: Avenues for Policy Architectures[C]. Proc of the 1st Computer Security Architecture Workshop. Alexandria, VA, USA: IEEE Computer Society, 2007: 51-57.
DOI: 10.1145/1314466.1314479
Google Scholar
[6]
Strunk J D. Self-securing Storage: Protecting Data in Compromised Systems[C]. Proc of the 4th Symposium on Operating Systems Design and Implementation[S. 1. ]: IEEE Computer Society 2000: 195-209.
Google Scholar
[7]
S. Chen, B. Mulgrew, and P. M. Grant, A clustering technique for digital communications channel equalization using radial basis function networks, IEEE Trans. on Neural Networks, vol. 4, pp.570-578, July (1993).
DOI: 10.1109/72.238312
Google Scholar
[8]
J. U. Duncombe, Infrared navigation—Part I: An assessment of feasibility, IEEE Trans. Electron Devices, vol. ED-11, pp.34-39, Jan. (1959).
Google Scholar
[9]
C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, and M. Miller, Rotation, scale, and translation resilient public watermarking for images, IEEE Trans. Image Process., vol. 10, no. 5, pp.767-782, May (2001).
DOI: 10.1109/83.918569
Google Scholar
[10]
WYLIE J J, BIGRIGGMW, STRUNK JD, et al. Survivable information storage systems[ J]. IEEE Computer Society, 2000, 33(8): 61-68.
Google Scholar
[11]
WYLIE J J, BAKKALOGLUM, PANDURANGAN V, et al. Selecting the right data distribution scheme for a survivable storage system, CMU-CS-01-120 [ R ]. Pittsburgh: Carnegie Mellon University, 2001: 1-10.
Google Scholar
[12]
PENNINGTON A, STRUNK J, GRIFFIN J, et al. Storage-based intrusion detection: watching storage activity for suspicious behavior, CMU-CS-02-179[R]. Pittsburgh: Carnegie Mellon University, 2002: 1-11.
DOI: 10.21236/ada461142
Google Scholar
[13]
STRUNK JD, GOODSONG R, PENNINGTONAG, et al. Intrusion detection, diagnosis, and recovery with self-securing storage, CMU-CS-02-140[R]. Pittsburgh: Carnegie Mellon University, 2002: 1-9.
Google Scholar
[14]
RIEDEL E, FALOUTSOS C, GIBSON G A, et al. Active disks for large-scale data processing[J]. Computer, 2001, 34(6): 68-74.
DOI: 10.1109/2.928624
Google Scholar
[15]
RIEDEL E, FALOUTSOS C, NAGLE D. Active disk architecture for databases, CMU-CS-00-145 [R]. Pittsburgh: Carnegie Mellon University, 2002: 1-12.
Google Scholar
[16]
RUEDEL E, FALOUTSOS C, GANGER G R, etal. Data mining on an OLTP system (nearly) for free[ J]. ACM S IGMOD Record, 2000, 29(2): 13-21.
DOI: 10.1145/335191.335375
Google Scholar
[17]
RIEDEL E, GIBSON G. Active disks-remote execution for network-attached storage, CMU-CS-99-177[R]. Pittsburgh: Carnegie Mellon University, 1999: 1-11.
DOI: 10.21236/ada341735
Google Scholar
[18]
RIEDEL E, GIBSON G. Active storage for large-scale data mining and multimedia[C] /Proc of the 24th International Conference on Very Large Databases. San Francisco: Morgan Kaufmann Publishers, 1998: 62-73.
Google Scholar
[19]
RIEDEL E, GIBSON G. Active disks: remote execution for network-attached storage, CMU-CS-97-198[R]. Pittsburgh: Carnegie Mellon University, 1997: 1-9.
DOI: 10.21236/ada341735
Google Scholar