Search
Now showing items 1-8 of 8
Intelligent Virtual Archiving for Accessing News Article Repositories
(
IEEE
, 2008 , Conference Paper)
This paper proposes a news article archiving solution that addresses many of today's systems limitations for effective storage and management of unstructured data items. The proposed system employs formal concept analysis ...
The similarity-aware relational intersect database operator
(
Springer International Publishing
, 2014 , Conference Paper)
Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
Candidate MDS array codes for tolerating three disk failures in RAID-7 architectures
(
Association for Computing Machinery, Inc
, 2017 , Conference Paper)
Current storage systems use RAID-5 and RAID-6 architectures to provide protection against one and two disk failures, respectively. However, as the size of storage system grows rapidly three concurrent disk failures are ...
Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
An Enhanced Dynamic-programming Technique For Finding Approximate Overlaps
(
Hamad bin Khalifa University Press (HBKU Press)
, 2014 , Conference Paper)
The next generation sequencing technology creates a huge number of sequences (reads), which constitute the input for genome assemblers. After prefiltering the sequences, it is required to detect exact overlaps between the ...
Implementing and Analyzing a Recursive Technique for Building Path Oblivious RAM
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
It has been demonstrated that encrypting confidential data before storing it is not sufficient because data access patterns can leak significant information about the data itself (Goldreich & Ostrovsky, 1996). Oblivious ...
Identifying contextual properties of software architecture in cloud computing
(
IEEE
, 2011 , Conference Paper)
This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ...
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...