共 9 条
[1]
Improving duplicate elimination in storage systems[J] . Deepak R. Bobbarjung,Suresh Jagannathan,Cezary Dubnicki.ACM Transactions on Storage (TOS) . 2006 (4)
[3]
Effective erasure codes for reliable computer communication protocols[J] . Luigi Rizzo.ACM SIGCOMM Computer Communication Review . 1997 (2)
[4]
RAID: high-performance, reliable secondary storage[J] . Peter M. Chen,Edward K. Lee,Garth A. Gibson,Randy H. Katz,David A. Patterson.ACM Computing Surveys (CSUR) . 1994 (2)
[5]
THE STRING-TO-STRING CORRECTION PROBLEM WITH BLOCK MOVES
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1984, 2 (04)
:309-321
[6]
A fast algorithm for computing longest common subsequences[J] . James W. Hunt,Thomas G. Szymanski.Communications of the ACM . 1977 (5)
[8]
Secure Hash Standard,Federal Information Processing Standard(FIPs)Publication180-2 .2 National Institute of Standards and Technology(NIST). . 2002
[9]
Providing high reliability in a minimum redundancy archival storage system .2 Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,Paris JF. Proc.of the14th Int’l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems(MASCOTS2006) . 2006