Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,465 Full-Text Articles 3,568 Authors 519,867 Downloads 119 Institutions

All Articles in Data Storage Systems

Faceted Search

1,465 full-text articles. Page 64 of 69.

Vsfs: A Versatile Searchable File System For Hpc Analytics, Lei Xu, Ziling Huang, Hong Jiang, Lei Tian, David Swanson 2013 University of Nebraska-Lincoln

Vsfs: A Versatile Searchable File System For Hpc Analytics, Lei Xu, Ziling Huang, Hong Jiang, Lei Tian, David Swanson

CSE Technical Reports

Big-data/HPC analytics applications have urgent needs for file-search services to drastically reduce the scale of the input data to accelerate analytics. Unfortunately, the existing solutions either are poorly scalable for large-scale systems, or lack well-integrated interface to allow applications to easily use them. We propose a distributed searchable file system, VSFS, which provide a novel and flexible POSIX-compatible searchable file system namespace that can be seamlessly integrate with any legacy code without modification. Additionally, to provide real-time indexing and searching performance, VSFS uses DRAM-based distributed consistent hashing ring to manages all file-index. The results of our evaluation show that VSFS …


Predicting Sql Injection And Cross Site Scripting Vulnerabilities Through Mining Input Sanitization Patterns, Lwin Khin SHAR, Hee Beng Kuan TAN 2013 Singapore Management University

Predicting Sql Injection And Cross Site Scripting Vulnerabilities Through Mining Input Sanitization Patterns, Lwin Khin Shar, Hee Beng Kuan Tan

Research Collection School Of Computing and Information Systems

ContextSQL injection (SQLI) and cross site scripting (XSS) are the two most common and serious web application vulnerabilities for the past decade. To mitigate these two security threats, many vulnerability detection approaches based on static and dynamic taint analysis techniques have been proposed. Alternatively, there are also vulnerability prediction approaches based on machine learning techniques, which showed that static code attributes such as code complexity measures are cheap and useful predictors. However, current prediction approaches target general vulnerabilities. And most of these approaches locate vulnerable code only at software component or file levels. Some approaches also involve process attributes that …


Circular Reranking For Visual Search, Ting YAO, Chong-wah NGO 2013 Singapore Management University

Circular Reranking For Visual Search, Ting Yao, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Search reranking is regarded as a common way to boost retrieval precision. The problem nevertheless is not trivial especially when there are multiple features or modalities to be considered for search, which often happens in image and video retrieval. This paper proposes a new reranking algorithm, named circular reranking, that reinforces the mutual exchange of information across multiple modalities for improving search performance, following the philosophy that strong performing modality could learn from weaker ones, while weak modality does benefit from interacting with stronger ones. Technically, circular reranking conducts multiple runs of random walks through exchanging the ranking scores among …


Searching Visual Instances With Topology Checking And Context Modeling, Wei ZHANG, Chong-wah NGO 2013 Singapore Management University

Searching Visual Instances With Topology Checking And Context Modeling, Wei Zhang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Instance Search (INS) is a realistic problem initiated by TRECVID, which is to retrieve all occurrences of the querying object, location, or person from a large video collection. It is a fundamental problem with many applications, and also a challenging problem different from the traditional concept or near-duplicate (ND) search, since the relevancy is defined at instance level. True responses could exhibit various visual variations, such as being small on the image with different background, or showing a non-homography spatial configuration. Based on the Bag-of-Words model, we propose two techniques tailored for Instance Search. Specifically, we explore the use of …


Maximize Your Decision-Making: A Review Of Emerging Technology Trends, Carol Watson 2013 University of Georgia School of Law Library

Maximize Your Decision-Making: A Review Of Emerging Technology Trends, Carol Watson

Continuing Legal Education Presentations

Provides overview of new technologies (both software and hardware) that could become the "next big thing."


Cloud Computing Trace Characterization And Synthetic Workload Generation, Salvatore Capra 2013 Air Force Institute of Technology

Cloud Computing Trace Characterization And Synthetic Workload Generation, Salvatore Capra

Theses and Dissertations

This thesis researches cloud computing workload characteristics and synthetic workload generation. A heuristic presented in the work guides the process of workload trace characterization and synthetic workload generation. Analysis of a cloud trace provides insight into client request behaviors and statistical parameters. A versatile workload generation tool creates client connections, controls request rates, defines number of jobs, produces tasks within each job, and manages task durations. The test system consists of multiple clients creating workloads and a server receiving request, all contained within a virtual machine environment. Statistical analysis verifies the synthetic workload experimental results are consistent with real workload …


Semi-Supervised Heterogeneous Fusion For Multimedia Data Co-Clustering, Lei MENG, Ah-hwee TAN, Dong XU 2013 Singapore Management University

Semi-Supervised Heterogeneous Fusion For Multimedia Data Co-Clustering, Lei Meng, Ah-Hwee Tan, Dong Xu

Research Collection School Of Computing and Information Systems

Co-clustering is a commonly used technique for tapping the rich meta-information of multimedia web documents, including category, annotation, and description, for associative discovery. However, most co-clustering methods proposed for heterogeneous data do not consider the representation problem of short and noisy text and their performance is limited by the empirical weighting of the multi-modal features. In this paper, we propose a generalized form of Heterogeneous Fusion Adaptive Resonance Theory, called GHF-ART, for co-clustering of large-scale web multimedia documents. By extending the two-channel Heterogeneous Fusion ART (HF-ART) to multiple channels, GHF-ART is designed to handle multimedia data with an arbitrarily rich …


A Quantitative Analysis Of Memory Controller Page Policies, Matthew Blackmore 2013 Portland State University

A Quantitative Analysis Of Memory Controller Page Policies, Matthew Blackmore

Dissertations and Theses

Two common goals in computing system design are increasing performance and decreasing power consumption. DRAM-based memory subsystems are a major component of both system performance and power consumption. Memory controllers employ strategies to efficiently schedule DRAM operations to reduce latency and to utilize DRAM low power modes when possible. One of the most important of these is the page policy, which determines when to close pages in DRAM. An effective DRAM memory controller page policy is important to minimizing power consumption and increasing system performance. This thesis explores the impact memory controller page policy has on performance as measured by …


Using Plankton Imaging Technology And Computer Science For Biological Oceanographic Advancement And Education, Adam T. Greer 2013 University of Miami

Using Plankton Imaging Technology And Computer Science For Biological Oceanographic Advancement And Education, Adam T. Greer

Adam T. Greer

Oceanography is an inherently interdisciplinary subject that combines observations of physics, biology, chemistry, and their interactions. While most physical and chemical measurements can be made on small scales (cm to m) through the use of sensors (temperature, salinity, pH, etc.), traditional tools to understand the biology of the ocean have only allowed for coarse sampling resolution (i.e., plankton nets sample large portions of the water column). New imaging technology enables the biological component of the ocean to be sampled on the same scale as the physical and chemical, allowing scientists to finally address the interactions among different oceanographic processes. Image …


Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis EZ 2013 Seoul National University

Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez

Emmanouil Alexander Zografakis EZ

Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …


Design Of An Open-Source Sata Core For Virtex-4 Fpgas, Cory Gorman 2013 University of Massachusetts Amherst

Design Of An Open-Source Sata Core For Virtex-4 Fpgas, Cory Gorman

Masters Theses 1911 - February 2014

Many hard drives manufactured today use the Serial ATA (SATA) protocol to communicate with the host machine, typically a PC. SATA is a much faster and much more robust protocol than its predecessor, ATA (also referred to as Parallel ATA or IDE). Many hardware designs, including those using Field-Programmable Gate Arrays (FPGAs), have a need for a long-term storage solution, and a hard drive would be ideal. One such design is the high-speed Data Acquisition System (DAS) created for the NASA Surface Water and Ocean Topography mission. This system utilizes a Xilinx Virtex-4 FPGA. Although the DAS includes a SATA …


A Brief Look At Computer Data Backup, James Gross 2013 Drexel University

A Brief Look At Computer Data Backup, James Gross

James Gross

Article discusses the advantages of periodically backing up your computer files.


Exploring Spatial Business Data: A Roa Based Ecampus Application, Thanh Thoa Pham Thi, Linh Truong- Hong, Junjun Yin, James Carswell 2013 Technological University Dublin

Exploring Spatial Business Data: A Roa Based Ecampus Application, Thanh Thoa Pham Thi, Linh Truong- Hong, Junjun Yin, James Carswell

Conference papers

In "Smart" environments development, providing users with search utilities for interacting efficiently with web and wireless devices is a key goal. At smaller scales, Google Maps and Google Earth with satellite and street views have helped users for querying general information at specific locations. However, at larger local scales, where detailed 3D geometries linked to business data are needed, there is a recognized lack of related information and functionality for in depth exploration of an area. Linking spatial data and business data helps to enrich the user experience by fulfilling more task specific user needs. This paper presents an eCampus …


An Efficient Algorithm To Solve High-Dimensional Data Clustering: Candidate Subspace Clustering Algorithm, Chin-Chieh Kao 2013 California State University, San Bernardino

An Efficient Algorithm To Solve High-Dimensional Data Clustering: Candidate Subspace Clustering Algorithm, Chin-Chieh Kao

Theses Digitization Project

For this project, a comprehensive literature review on high dimensional data clustering is conducted and a novel density-algorithm to perform high dimensional data clustering is developed.


Dependence On Cyberscribes - Issues In E-Security, Thomas R. McLean, Alexander B. McLean 2013 University of Maryland Francis King Carey School of Law

Dependence On Cyberscribes - Issues In E-Security, Thomas R. Mclean, Alexander B. Mclean

Journal of Business & Technology Law

No abstract provided.


A New Simplified Federated Single Sign-On System, Chen Liang 2013 Technological University Dublin

A New Simplified Federated Single Sign-On System, Chen Liang

Masters

The work presented in this MPhil thesis addresses this challenge by developing a new simplified FSSO system that allows end-users to access desktop systems, web-based services/applications and non-web based services/applications using one authentication process. This new system achieves this using two major components: an “Authentication Infrastructure Integration Program (AIIP)" and an “Integration of Desktop Authentication and Web-based Authentication (IDAWA)." The AIIP acquires Kerberos tickets (for end-users who have been authenticated by a Kerberos single sign-on system in one net- work domain) from Kerberos single sign-on systems in different network domains without establishing trust between these Kerberos single sign-on systems. The …


Accelerated Data Delivery Architecture, Michael L. Grecol 2013 Georgia Southern University

Accelerated Data Delivery Architecture, Michael L. Grecol

Electronic Theses and Dissertations

This paper introduces the Accelerated Data Delivery Architecture (ADDA). ADDA establishes a framework to distribute transactional data and control consistency to achieve fast access to data, distributed scalability and non-blocking concurrency control by using a clean declarative interface. It is designed to be used with web-based business applications. This framework uses a combination of traditional Relational Database Management System (RDBMS) combined with a distributed Not Only SQL (NoSQL) database and a browser-based database. It uses a single physical and conceptual database schema designed for a standard RDBMS driven application. The design allows the architect to assign consistency levels to entities …


Application Of Self-Monitoring For Situational Awareness, Christopher Trickler 2013 Georgia Southern University

Application Of Self-Monitoring For Situational Awareness, Christopher Trickler

Electronic Theses and Dissertations

Self-monitoring devices and services are used for physical wellness, personal tracking and self-improvement. These individual devices and services can only provide information based on what they can measure directly or historically without an intermediate system. This paper proposes a self-monitoring system to perform situational awareness which may extend into providing insight into predictable behaviors. Knowing an individual’s current state and likelihood of particular behaviors occurring is a general solution. This knowledge-based solution derived from sensory data has many applications. The proposed system could monitor current individual situational status, automatically provide personal status as it changes, aid personal improvement, contribute to …


Performance Evaluation Of Linq To Hpc And Hadoop For Big Data, Ravishankar Sivasubramaniam 2013 University of North Florida

Performance Evaluation Of Linq To Hpc And Hadoop For Big Data, Ravishankar Sivasubramaniam

UNF Graduate Theses and Dissertations

There is currently considerable enthusiasm around the MapReduce paradigm, and the distributed computing paradigm for analysis of large volumes of data. The Apache Hadoop is the most popular open source implementation of MapReduce model and LINQ to HPC is Microsoft's alternative to open source Hadoop. In this thesis, the performance of LINQ to HPC and Hadoop are compared using different benchmarks.

To this end, we identified four benchmarks (Grep, Word Count, Read and Write) that we have run on LINQ to HPC as well as on Hadoop. For each benchmark, we measured each system’s performance metrics (Execution Time, Average CPU …


Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero 2012 California Polytechnic State University, San Luis Obispo

Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero

Master's Theses

Amaethon is a web application that is designed for enterprise farm management. It takes a job typically performed with spreadsheets, paper, or custom software and puts it on the web. Farm administration personnel may use it to schedule farm operations and manage their resources and equipment. A survey was con- ducted to assess Amaethon’s user interface design. Participants in the survey were two groups of students and a small group of agriculture professionals. Among other results, the survey indicated that a calendar interface inside Amaethon was preferred, and statistically no less effective, than a map interface. This is despite the …


Digital Commons powered by bepress