A Dependable Two-Level Mapping Scheme in Distributed Storage System
A Dependable Two-Level Mapping Scheme in Distributed Storage System
出处
《通讯和计算机(中英文版)》
2010年第10期8-13,共6页
Journal of Communication and Computer
基金
Acknowledgments The authors wish to thank the HuBei Natural Science Foundation under Grant NO.2007ABA376 and Hubei Education Foundation under Grant NO.D200717005 under which the present work was possible.
参考文献9
-
1A.Thomasian, Clustered RAID Arrays and Their Access Costs, The Computer Journal 48 (2005) 702-713.
-
2K. Surugucchi, J.L. Hafner, R.A. Golding, Reliability for networked storage nodes, in: Proceedings of 2006 International Conference on Dependable Systems and Networks - Dependable Computing and Communications Symposium, Philadelphia: Sheraton Society Hill, 2006, pp.589-596.
-
3J.S. Plank, L.H. Xu, Optimizing Cauchy Reed-Solomon codes for fault-tolerant network storage applications, Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications NCA -06, IEEE Comouter Society, 2006, PP. 173-180.
-
4J.L. Hafner, Weaver codes: highly fault tolerant erasure codes for storage systems, Proceedings of the 4th USENIX Conference on File and Storage Technologies (FST'05), USENIX Association, 2005, pp.211-224.
-
5J.L. Hafner, Hover erasure codes for disk arrays, Proceedings of the International Conference on Dependable Systems and Networks (DSN'06), IEEE Computer Society, 2006, pp. 217-226.
-
6A.Thomasian, Multi-level RAID for very large disk arrays, ACM SIGMETRICS Performance Evaluation Review 33 (2006) 17-22.
-
7M. Hu, M.H. Jiang, RAID5x-based storage complexity analysis, Proceedings of The 10th IEEE International Conference on High Performance Computing and Communications, IEEE Computer Society, 2008, pp. 976- 980.
-
8R. Anderson, Security Engineer: A Guide to Building Dependable Distributed Systems, John Wiley & Sons, 2001.
-
9M. Hu, Y. Wang, The collision rate tests of two known message digest algorithms, 2009 International Conference on Computational Intelligence and Security, IEEE Computer Society, 2009, pp. 319-323.
-
1Ceph集成入SUSE Cloud[J].办公自动化(办公设备与耗材),2013(2):27-27.
-
2Chen Baihong,Zhong Yifang,Liu Jihong,Xiao Renbin,Zhou Ji (CAD Center of Huazhong University of Science & Technology, Wuhan 430074, PR.China).Research on Approaches of Multidisciplinary Design Optimization for Non-hierarchic Systems[J].Computer Aided Drafting,Design and Manufacturing,2000,10(1):84-94.
-
3LIAO XiaoFei LI He JIN Hai HOU HaiXiang JIANG Yue & LIU HaiKun.VMStore: Distributed storage system for multiple virtual machines[J].Science China(Information Sciences),2011,54(6):1104-1118. 被引量:3
-
4LUOWenfei,GAoLianru.Two-level parallel independent component analysis endmember extraction algorithms[J].遥感学报,2011,15(6):1202-1214. 被引量:1
-
5金海,Ran,Longbo,Wang,Zhiping,Huang,Chen,Chen,Yong,Zhou,Runsong,Jia,Yongjie.Architecture Design of Global Distributed Storage System for Data Grid[J].High Technology Letters,2003,9(4):1-4. 被引量:6
-
6YANG Xiaohui DU Ruizhong TIAN Junfeng.The Reliability Design and Availability Analysis of a Distributed Storage System[J].Wuhan University Journal of Natural Sciences,2006,11(6):1919-1922.
-
7毕军,刘冰洋,吴建平,沈燕.Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method[J].Tsinghua Science and Technology,2009,14(4):413-422. 被引量:2
-
8CAI Feng,GUO Wangmei.Construction of Minimum Bandwidth Regenerating Codes with Combinatorial Design[J].Wuhan University Journal of Natural Sciences,2016,21(3):229-234. 被引量:1
-
9张志锋,范乃梅.基于两层协同主动学习策略的分类算法[J].青岛科技大学学报(自然科学版),2013,34(5):528-531.
-
10李庆文.移动数据库的多信道广播策略研究[J].湖南工业大学学报,2009,23(1):46-49.